{
    "summary": {
        "snap": {
            "added": [],
            "removed": [],
            "diff": []
        },
        "deb": {
            "added": [
                "libdebuginfod-common",
                "libdebuginfod1t64:riscv64",
                "linux-headers-6.17.0-14-generic",
                "linux-image-6.17.0-14-generic",
                "linux-modules-6.17.0-14-generic",
                "linux-riscv-6.17-headers-6.17.0-14",
                "linux-riscv-6.17-tools-6.17.0-14",
                "linux-tools-6.17.0-14-generic"
            ],
            "removed": [
                "linux-headers-6.14.0-37-generic",
                "linux-image-6.14.0-37-generic",
                "linux-modules-6.14.0-37-generic",
                "linux-riscv-6.14-headers-6.14.0-37",
                "linux-riscv-6.14-tools-6.14.0-37",
                "linux-tools-6.14.0-37-generic"
            ],
            "diff": [
                "base-files",
                "bsdextrautils",
                "bsdutils",
                "dirmngr",
                "eject",
                "fdisk",
                "fwupd",
                "gir1.2-glib-2.0:riscv64",
                "gnupg",
                "gnupg-l10n",
                "gnupg-utils",
                "gpg",
                "gpg-agent",
                "gpg-wks-client",
                "gpgconf",
                "gpgsm",
                "gpgv",
                "inetutils-telnet",
                "initramfs-tools",
                "initramfs-tools-bin",
                "initramfs-tools-core",
                "keyboxd",
                "klibc-utils",
                "kpartx",
                "libblkid1:riscv64",
                "libc-bin",
                "libc-dev-bin",
                "libc-devtools",
                "libc6:riscv64",
                "libc6-dev:riscv64",
                "libdrm-common",
                "libdrm2:riscv64",
                "libfdisk1:riscv64",
                "libfwupd2:riscv64",
                "libglib2.0-0t64:riscv64",
                "libglib2.0-bin",
                "libglib2.0-data",
                "libheif-plugin-aomdec:riscv64",
                "libheif-plugin-aomenc:riscv64",
                "libheif-plugin-libde265:riscv64",
                "libheif1:riscv64",
                "libklibc:riscv64",
                "libldap-common",
                "libldap2:riscv64",
                "libmbim-glib4:riscv64",
                "libmbim-proxy",
                "libmbim-utils",
                "libmount1:riscv64",
                "libnss-systemd:riscv64",
                "libnuma1:riscv64",
                "libpam-systemd:riscv64",
                "libpng16-16t64:riscv64",
                "libpython3.12-minimal:riscv64",
                "libpython3.12-stdlib:riscv64",
                "libpython3.12t64:riscv64",
                "libsmartcols1:riscv64",
                "libsodium23:riscv64",
                "libssl3t64:riscv64",
                "libsystemd-shared:riscv64",
                "libsystemd0:riscv64",
                "libtasn1-6:riscv64",
                "libudev1:riscv64",
                "libuuid1:riscv64",
                "libxml2:riscv64",
                "linux-headers-generic",
                "linux-headers-virtual",
                "linux-image-virtual",
                "linux-libc-dev:riscv64",
                "linux-tools-common",
                "linux-virtual",
                "locales",
                "motd-news-config",
                "mount",
                "multipath-tools",
                "numactl",
                "openssl",
                "python-apt-common",
                "python3-apt",
                "python3-distupgrade",
                "python3-pyasn1",
                "python3-urllib3",
                "python3.12",
                "python3.12-minimal",
                "screen",
                "snapd",
                "systemd",
                "systemd-dev",
                "systemd-resolved",
                "systemd-sysv",
                "systemd-timesyncd",
                "telnet",
                "ubuntu-release-upgrader-core",
                "udev",
                "util-linux",
                "uuid-runtime"
            ]
        }
    },
    "diff": {
        "deb": [
            {
                "name": "base-files",
                "from_version": {
                    "source_package_name": "base-files",
                    "source_package_version": "13ubuntu10.3",
                    "version": "13ubuntu10.3"
                },
                "to_version": {
                    "source_package_name": "base-files",
                    "source_package_version": "13ubuntu10.4",
                    "version": "13ubuntu10.4"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2140756
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * /etc/issue{,.net}, /etc/{lsb,os}-release: bump version to 24.04.4",
                            "    (LP: #2140756)",
                            ""
                        ],
                        "package": "base-files",
                        "version": "13ubuntu10.4",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2140756
                        ],
                        "author": "Florent 'Skia' Jacquet <skia@ubuntu.com>",
                        "date": "Fri, 06 Feb 2026 08:23:01 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "bsdextrautils",
                "from_version": {
                    "source_package_name": "util-linux",
                    "source_package_version": "2.39.3-9ubuntu6.3",
                    "version": "2.39.3-9ubuntu6.3"
                },
                "to_version": {
                    "source_package_name": "util-linux",
                    "source_package_version": "2.39.3-9ubuntu6.4",
                    "version": "2.39.3-9ubuntu6.4"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2123886
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Add ARM core support for Vera systems (LP: #2123886)",
                            "    - d/p/ubuntu/lp-2123886-add-missing-arm-cores.patch",
                            ""
                        ],
                        "package": "util-linux",
                        "version": "2.39.3-9ubuntu6.4",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2123886
                        ],
                        "author": "Joao Andre Simioni <joao.simioni@canonical.com>",
                        "date": "Mon, 15 Sep 2025 21:08:02 -0300"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "bsdutils",
                "from_version": {
                    "source_package_name": "util-linux",
                    "source_package_version": "2.39.3-9ubuntu6.3",
                    "version": "1:2.39.3-9ubuntu6.3"
                },
                "to_version": {
                    "source_package_name": "util-linux",
                    "source_package_version": "2.39.3-9ubuntu6.4",
                    "version": "1:2.39.3-9ubuntu6.4"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2123886
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Add ARM core support for Vera systems (LP: #2123886)",
                            "    - d/p/ubuntu/lp-2123886-add-missing-arm-cores.patch",
                            ""
                        ],
                        "package": "util-linux",
                        "version": "2.39.3-9ubuntu6.4",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2123886
                        ],
                        "author": "Joao Andre Simioni <joao.simioni@canonical.com>",
                        "date": "Mon, 15 Sep 2025 21:08:02 -0300"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "dirmngr",
                "from_version": {
                    "source_package_name": "gnupg2",
                    "source_package_version": "2.4.4-2ubuntu17.3",
                    "version": "2.4.4-2ubuntu17.3"
                },
                "to_version": {
                    "source_package_name": "gnupg2",
                    "source_package_version": "2.4.4-2ubuntu17.4",
                    "version": "2.4.4-2ubuntu17.4"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-68973",
                        "url": "https://ubuntu.com/security/CVE-2025-68973",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-68973",
                                "url": "https://ubuntu.com/security/CVE-2025-68973",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Remote Code Execution",
                            "    - debian/patches/CVE-2025-68973.patch: gpg: Fix possible memory",
                            "    corruption in the armor parser.",
                            "    - CVE-2025-68973",
                            ""
                        ],
                        "package": "gnupg2",
                        "version": "2.4.4-2ubuntu17.4",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Allen Huang <allen.huang@canonical.com>",
                        "date": "Mon, 05 Jan 2026 22:01:39 +0000"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "eject",
                "from_version": {
                    "source_package_name": "util-linux",
                    "source_package_version": "2.39.3-9ubuntu6.3",
                    "version": "2.39.3-9ubuntu6.3"
                },
                "to_version": {
                    "source_package_name": "util-linux",
                    "source_package_version": "2.39.3-9ubuntu6.4",
                    "version": "2.39.3-9ubuntu6.4"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2123886
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Add ARM core support for Vera systems (LP: #2123886)",
                            "    - d/p/ubuntu/lp-2123886-add-missing-arm-cores.patch",
                            ""
                        ],
                        "package": "util-linux",
                        "version": "2.39.3-9ubuntu6.4",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2123886
                        ],
                        "author": "Joao Andre Simioni <joao.simioni@canonical.com>",
                        "date": "Mon, 15 Sep 2025 21:08:02 -0300"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "fdisk",
                "from_version": {
                    "source_package_name": "util-linux",
                    "source_package_version": "2.39.3-9ubuntu6.3",
                    "version": "2.39.3-9ubuntu6.3"
                },
                "to_version": {
                    "source_package_name": "util-linux",
                    "source_package_version": "2.39.3-9ubuntu6.4",
                    "version": "2.39.3-9ubuntu6.4"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2123886
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Add ARM core support for Vera systems (LP: #2123886)",
                            "    - d/p/ubuntu/lp-2123886-add-missing-arm-cores.patch",
                            ""
                        ],
                        "package": "util-linux",
                        "version": "2.39.3-9ubuntu6.4",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2123886
                        ],
                        "author": "Joao Andre Simioni <joao.simioni@canonical.com>",
                        "date": "Mon, 15 Sep 2025 21:08:02 -0300"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "fwupd",
                "from_version": {
                    "source_package_name": "fwupd",
                    "source_package_version": "1.9.31-0ubuntu1~24.04.1",
                    "version": "1.9.31-0ubuntu1~24.04.1"
                },
                "to_version": {
                    "source_package_name": "fwupd",
                    "source_package_version": "1.9.33-0ubuntu1~24.04.1ubuntu1",
                    "version": "1.9.33-0ubuntu1~24.04.1ubuntu1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2131001
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * New upstream version (1.9.31)",
                            "    - Add PS5512 usb firmware update (LP: #2131001)",
                            ""
                        ],
                        "package": "fwupd",
                        "version": "1.9.33-0ubuntu1~24.04.1ubuntu1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2131001
                        ],
                        "author": "Mario Limonciello <superm1@ubuntu.com>",
                        "date": "Sun, 30 Nov 2025 07:12:14 -0600"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "gir1.2-glib-2.0:riscv64",
                "from_version": {
                    "source_package_name": "glib2.0",
                    "source_package_version": "2.80.0-6ubuntu3.5",
                    "version": "2.80.0-6ubuntu3.5"
                },
                "to_version": {
                    "source_package_name": "glib2.0",
                    "source_package_version": "2.80.0-6ubuntu3.8",
                    "version": "2.80.0-6ubuntu3.8"
                },
                "cves": [
                    {
                        "cve": "CVE-2026-1484",
                        "url": "https://ubuntu.com/security/CVE-2026-1484",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-1485",
                        "url": "https://ubuntu.com/security/CVE-2026-1485",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-1489",
                        "url": "https://ubuntu.com/security/CVE-2026-1489",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-0988",
                        "url": "https://ubuntu.com/security/CVE-2026-0988",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-3360",
                        "url": "https://ubuntu.com/security/CVE-2025-3360",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-6052",
                        "url": "https://ubuntu.com/security/CVE-2025-6052",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-7039",
                        "url": "https://ubuntu.com/security/CVE-2025-7039",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-13601",
                        "url": "https://ubuntu.com/security/CVE-2025-13601",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-14087",
                        "url": "https://ubuntu.com/security/CVE-2025-14087",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2026-1484",
                                "url": "https://ubuntu.com/security/CVE-2026-1484",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-1485",
                                "url": "https://ubuntu.com/security/CVE-2026-1485",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-1489",
                                "url": "https://ubuntu.com/security/CVE-2026-1489",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: integer overflow in Base64 encoding",
                            "    - debian/patches/CVE-2026-1484-1.patch: use gsize to prevent potential",
                            "      overflow in glib/gbase64.c.",
                            "    - debian/patches/CVE-2026-1484-2.patch: ensure that the out value is",
                            "      within allocated size in glib/gbase64.c.",
                            "    - CVE-2026-1484",
                            "  * SECURITY UPDATE: buffer underflow via header length",
                            "    - debian/patches/CVE-2026-1485.patch: do not overflow if header is",
                            "      longer than MAXINT in gio/gcontenttype.c.",
                            "    - CVE-2026-1485",
                            "  * SECURITY UPDATE: integer overflow via Unicode case conversion",
                            "    - debian/patches/CVE-2026-1489-1.patch: use size_t for output_marks",
                            "      length in glib/guniprop.c.",
                            "    - debian/patches/CVE-2026-1489-2.patch: do not convert size_t to gint",
                            "      in glib/guniprop.c.",
                            "    - debian/patches/CVE-2026-1489-3.patch: ensure we do not overflow size",
                            "      in glib/guniprop.c.",
                            "    - debian/patches/CVE-2026-1489-4.patch: add test debug information when",
                            "      parsing input files in glib/tests/unicode.c.",
                            "    - CVE-2026-1489",
                            ""
                        ],
                        "package": "glib2.0",
                        "version": "2.80.0-6ubuntu3.8",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Wed, 28 Jan 2026 12:53:07 -0500"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2026-0988",
                                "url": "https://ubuntu.com/security/CVE-2026-0988",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Integer overflow in g_buffered_input_stream_peek()",
                            "    - debian/patches/CVE-2026-0988.patch: fix a potential integer overflow",
                            "      in peek() in gio/gbufferedinputstream.c,",
                            "      gio/tests/buffered-input-stream.c.",
                            "    - CVE-2026-0988",
                            ""
                        ],
                        "package": "glib2.0",
                        "version": "2.80.0-6ubuntu3.7",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Tue, 20 Jan 2026 08:08:27 -0500"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-3360",
                                "url": "https://ubuntu.com/security/CVE-2025-3360",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-6052",
                                "url": "https://ubuntu.com/security/CVE-2025-6052",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-7039",
                                "url": "https://ubuntu.com/security/CVE-2025-7039",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-13601",
                                "url": "https://ubuntu.com/security/CVE-2025-13601",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-14087",
                                "url": "https://ubuntu.com/security/CVE-2025-14087",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: overflow via long invalid ISO 8601 timestamp",
                            "    - debian/patches/CVE-2025-3360-1.patch: fix integer overflow when",
                            "      parsing very long ISO8601 inputs in glib/gdatetime.c.",
                            "    - debian/patches/CVE-2025-3360-2.patch: fix potential integer overflow",
                            "      in timezone offset handling in glib/gdatetime.c.",
                            "    - debian/patches/CVE-2025-3360-3.patch: track timezone length as an",
                            "      unsigned size_t in glib/gdatetime.c.",
                            "    - debian/patches/CVE-2025-3360-4.patch: factor out some string pointer",
                            "      arithmetic in glib/gdatetime.c.",
                            "    - debian/patches/CVE-2025-3360-5.patch: factor out an undersized",
                            "      variable in glib/gdatetime.c.",
                            "    - debian/patches/CVE-2025-3360-6.patch: add some missing GDateTime",
                            "      ISO8601 parsing tests in glib/tests/gdatetime.c.",
                            "    - CVE-2025-3360",
                            "  * SECURITY UPDATE: GString overflow",
                            "    - debian/patches/CVE-2025-6052.patch: fix overflow check when expanding",
                            "      the string in glib/gstring.c.",
                            "    - CVE-2025-6052",
                            "  * SECURITY UPDATE: integer overflow in temp file creation",
                            "    - debian/patches/CVE-2025-7039.patch: fix computation of temporary file",
                            "      name in glib/gfileutils.c.",
                            "    - CVE-2025-7039",
                            "  * SECURITY UPDATE: heap overflow in g_escape_uri_string()",
                            "    - debian/patches/CVE-2025-13601.patch: add overflow check in",
                            "      glib/gconvert.c.",
                            "    - CVE-2025-13601",
                            "  * SECURITY UPDATE: buffer underflow through glib/gvariant",
                            "    - debian/patches/CVE-2025-14087-1.patch: fix potential integer overflow",
                            "      parsing (byte)strings in glib/gvariant-parser.c.",
                            "    - debian/patches/CVE-2025-14087-2.patch: use size_t to count numbers of",
                            "      child elements in glib/gvariant-parser.c.",
                            "    - debian/patches/CVE-2025-14087-3.patch: convert error handling code to",
                            "      use size_t in glib/gvariant-parser.c.",
                            "    - CVE-2025-14087",
                            "  * SECURITY UPDATE: integer overflow in gfileattribute",
                            "    - debian/patches/gfileattribute-overflow.patch: add overflow check in",
                            "      gio/gfileattribute.c.",
                            "    - No CVE number",
                            ""
                        ],
                        "package": "glib2.0",
                        "version": "2.80.0-6ubuntu3.6",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Wed, 10 Dec 2025 10:51:22 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "gnupg",
                "from_version": {
                    "source_package_name": "gnupg2",
                    "source_package_version": "2.4.4-2ubuntu17.3",
                    "version": "2.4.4-2ubuntu17.3"
                },
                "to_version": {
                    "source_package_name": "gnupg2",
                    "source_package_version": "2.4.4-2ubuntu17.4",
                    "version": "2.4.4-2ubuntu17.4"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-68973",
                        "url": "https://ubuntu.com/security/CVE-2025-68973",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-68973",
                                "url": "https://ubuntu.com/security/CVE-2025-68973",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Remote Code Execution",
                            "    - debian/patches/CVE-2025-68973.patch: gpg: Fix possible memory",
                            "    corruption in the armor parser.",
                            "    - CVE-2025-68973",
                            ""
                        ],
                        "package": "gnupg2",
                        "version": "2.4.4-2ubuntu17.4",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Allen Huang <allen.huang@canonical.com>",
                        "date": "Mon, 05 Jan 2026 22:01:39 +0000"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "gnupg-l10n",
                "from_version": {
                    "source_package_name": "gnupg2",
                    "source_package_version": "2.4.4-2ubuntu17.3",
                    "version": "2.4.4-2ubuntu17.3"
                },
                "to_version": {
                    "source_package_name": "gnupg2",
                    "source_package_version": "2.4.4-2ubuntu17.4",
                    "version": "2.4.4-2ubuntu17.4"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-68973",
                        "url": "https://ubuntu.com/security/CVE-2025-68973",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-68973",
                                "url": "https://ubuntu.com/security/CVE-2025-68973",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Remote Code Execution",
                            "    - debian/patches/CVE-2025-68973.patch: gpg: Fix possible memory",
                            "    corruption in the armor parser.",
                            "    - CVE-2025-68973",
                            ""
                        ],
                        "package": "gnupg2",
                        "version": "2.4.4-2ubuntu17.4",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Allen Huang <allen.huang@canonical.com>",
                        "date": "Mon, 05 Jan 2026 22:01:39 +0000"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "gnupg-utils",
                "from_version": {
                    "source_package_name": "gnupg2",
                    "source_package_version": "2.4.4-2ubuntu17.3",
                    "version": "2.4.4-2ubuntu17.3"
                },
                "to_version": {
                    "source_package_name": "gnupg2",
                    "source_package_version": "2.4.4-2ubuntu17.4",
                    "version": "2.4.4-2ubuntu17.4"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-68973",
                        "url": "https://ubuntu.com/security/CVE-2025-68973",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-68973",
                                "url": "https://ubuntu.com/security/CVE-2025-68973",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Remote Code Execution",
                            "    - debian/patches/CVE-2025-68973.patch: gpg: Fix possible memory",
                            "    corruption in the armor parser.",
                            "    - CVE-2025-68973",
                            ""
                        ],
                        "package": "gnupg2",
                        "version": "2.4.4-2ubuntu17.4",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Allen Huang <allen.huang@canonical.com>",
                        "date": "Mon, 05 Jan 2026 22:01:39 +0000"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "gpg",
                "from_version": {
                    "source_package_name": "gnupg2",
                    "source_package_version": "2.4.4-2ubuntu17.3",
                    "version": "2.4.4-2ubuntu17.3"
                },
                "to_version": {
                    "source_package_name": "gnupg2",
                    "source_package_version": "2.4.4-2ubuntu17.4",
                    "version": "2.4.4-2ubuntu17.4"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-68973",
                        "url": "https://ubuntu.com/security/CVE-2025-68973",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-68973",
                                "url": "https://ubuntu.com/security/CVE-2025-68973",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Remote Code Execution",
                            "    - debian/patches/CVE-2025-68973.patch: gpg: Fix possible memory",
                            "    corruption in the armor parser.",
                            "    - CVE-2025-68973",
                            ""
                        ],
                        "package": "gnupg2",
                        "version": "2.4.4-2ubuntu17.4",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Allen Huang <allen.huang@canonical.com>",
                        "date": "Mon, 05 Jan 2026 22:01:39 +0000"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "gpg-agent",
                "from_version": {
                    "source_package_name": "gnupg2",
                    "source_package_version": "2.4.4-2ubuntu17.3",
                    "version": "2.4.4-2ubuntu17.3"
                },
                "to_version": {
                    "source_package_name": "gnupg2",
                    "source_package_version": "2.4.4-2ubuntu17.4",
                    "version": "2.4.4-2ubuntu17.4"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-68973",
                        "url": "https://ubuntu.com/security/CVE-2025-68973",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-68973",
                                "url": "https://ubuntu.com/security/CVE-2025-68973",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Remote Code Execution",
                            "    - debian/patches/CVE-2025-68973.patch: gpg: Fix possible memory",
                            "    corruption in the armor parser.",
                            "    - CVE-2025-68973",
                            ""
                        ],
                        "package": "gnupg2",
                        "version": "2.4.4-2ubuntu17.4",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Allen Huang <allen.huang@canonical.com>",
                        "date": "Mon, 05 Jan 2026 22:01:39 +0000"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "gpg-wks-client",
                "from_version": {
                    "source_package_name": "gnupg2",
                    "source_package_version": "2.4.4-2ubuntu17.3",
                    "version": "2.4.4-2ubuntu17.3"
                },
                "to_version": {
                    "source_package_name": "gnupg2",
                    "source_package_version": "2.4.4-2ubuntu17.4",
                    "version": "2.4.4-2ubuntu17.4"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-68973",
                        "url": "https://ubuntu.com/security/CVE-2025-68973",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-68973",
                                "url": "https://ubuntu.com/security/CVE-2025-68973",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Remote Code Execution",
                            "    - debian/patches/CVE-2025-68973.patch: gpg: Fix possible memory",
                            "    corruption in the armor parser.",
                            "    - CVE-2025-68973",
                            ""
                        ],
                        "package": "gnupg2",
                        "version": "2.4.4-2ubuntu17.4",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Allen Huang <allen.huang@canonical.com>",
                        "date": "Mon, 05 Jan 2026 22:01:39 +0000"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "gpgconf",
                "from_version": {
                    "source_package_name": "gnupg2",
                    "source_package_version": "2.4.4-2ubuntu17.3",
                    "version": "2.4.4-2ubuntu17.3"
                },
                "to_version": {
                    "source_package_name": "gnupg2",
                    "source_package_version": "2.4.4-2ubuntu17.4",
                    "version": "2.4.4-2ubuntu17.4"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-68973",
                        "url": "https://ubuntu.com/security/CVE-2025-68973",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-68973",
                                "url": "https://ubuntu.com/security/CVE-2025-68973",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Remote Code Execution",
                            "    - debian/patches/CVE-2025-68973.patch: gpg: Fix possible memory",
                            "    corruption in the armor parser.",
                            "    - CVE-2025-68973",
                            ""
                        ],
                        "package": "gnupg2",
                        "version": "2.4.4-2ubuntu17.4",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Allen Huang <allen.huang@canonical.com>",
                        "date": "Mon, 05 Jan 2026 22:01:39 +0000"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "gpgsm",
                "from_version": {
                    "source_package_name": "gnupg2",
                    "source_package_version": "2.4.4-2ubuntu17.3",
                    "version": "2.4.4-2ubuntu17.3"
                },
                "to_version": {
                    "source_package_name": "gnupg2",
                    "source_package_version": "2.4.4-2ubuntu17.4",
                    "version": "2.4.4-2ubuntu17.4"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-68973",
                        "url": "https://ubuntu.com/security/CVE-2025-68973",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-68973",
                                "url": "https://ubuntu.com/security/CVE-2025-68973",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Remote Code Execution",
                            "    - debian/patches/CVE-2025-68973.patch: gpg: Fix possible memory",
                            "    corruption in the armor parser.",
                            "    - CVE-2025-68973",
                            ""
                        ],
                        "package": "gnupg2",
                        "version": "2.4.4-2ubuntu17.4",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Allen Huang <allen.huang@canonical.com>",
                        "date": "Mon, 05 Jan 2026 22:01:39 +0000"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "gpgv",
                "from_version": {
                    "source_package_name": "gnupg2",
                    "source_package_version": "2.4.4-2ubuntu17.3",
                    "version": "2.4.4-2ubuntu17.3"
                },
                "to_version": {
                    "source_package_name": "gnupg2",
                    "source_package_version": "2.4.4-2ubuntu17.4",
                    "version": "2.4.4-2ubuntu17.4"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-68973",
                        "url": "https://ubuntu.com/security/CVE-2025-68973",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-68973",
                                "url": "https://ubuntu.com/security/CVE-2025-68973",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Remote Code Execution",
                            "    - debian/patches/CVE-2025-68973.patch: gpg: Fix possible memory",
                            "    corruption in the armor parser.",
                            "    - CVE-2025-68973",
                            ""
                        ],
                        "package": "gnupg2",
                        "version": "2.4.4-2ubuntu17.4",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Allen Huang <allen.huang@canonical.com>",
                        "date": "Mon, 05 Jan 2026 22:01:39 +0000"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "inetutils-telnet",
                "from_version": {
                    "source_package_name": "inetutils",
                    "source_package_version": "2:2.5-3ubuntu4",
                    "version": "2:2.5-3ubuntu4"
                },
                "to_version": {
                    "source_package_name": "inetutils",
                    "source_package_version": "2:2.5-3ubuntu4.1",
                    "version": "2:2.5-3ubuntu4.1"
                },
                "cves": [
                    {
                        "cve": "CVE-2026-24061",
                        "url": "https://ubuntu.com/security/CVE-2026-24061",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2026-24061",
                                "url": "https://ubuntu.com/security/CVE-2026-24061",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: telnetd remote authentication bypass",
                            "    - debian/patches/CVE-2026-24061-1.patch: fix injection bug with bogus",
                            "      user names in telnetd/utility.c.",
                            "    - debian/patches/CVE-2026-24061-2.patch: sanitize all variable",
                            "      expansions in telnetd/utility.c.",
                            "    - debian/patches/CVE-2026-24061-3.patch: fix compiler warning in",
                            "      telnetd/utility.c.",
                            "    - CVE-2026-24061",
                            ""
                        ],
                        "package": "inetutils",
                        "version": "2:2.5-3ubuntu4.1",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Fri, 30 Jan 2026 11:17:34 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "initramfs-tools",
                "from_version": {
                    "source_package_name": "initramfs-tools",
                    "source_package_version": "0.142ubuntu25.5",
                    "version": "0.142ubuntu25.5"
                },
                "to_version": {
                    "source_package_name": "initramfs-tools",
                    "source_package_version": "0.142ubuntu25.8",
                    "version": "0.142ubuntu25.8"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2140344
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Add missing USB drivers for StarFive JH7110 SoC (LP: #2140344)",
                            ""
                        ],
                        "package": "initramfs-tools",
                        "version": "0.142ubuntu25.8",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2140344
                        ],
                        "author": "Heinrich Schuchardt <heinrich.schuchardt@canonical.com>",
                        "date": "Wed, 04 Feb 2026 18:01:59 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "initramfs-tools-bin",
                "from_version": {
                    "source_package_name": "initramfs-tools",
                    "source_package_version": "0.142ubuntu25.5",
                    "version": "0.142ubuntu25.5"
                },
                "to_version": {
                    "source_package_name": "initramfs-tools",
                    "source_package_version": "0.142ubuntu25.8",
                    "version": "0.142ubuntu25.8"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2140344
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Add missing USB drivers for StarFive JH7110 SoC (LP: #2140344)",
                            ""
                        ],
                        "package": "initramfs-tools",
                        "version": "0.142ubuntu25.8",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2140344
                        ],
                        "author": "Heinrich Schuchardt <heinrich.schuchardt@canonical.com>",
                        "date": "Wed, 04 Feb 2026 18:01:59 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "initramfs-tools-core",
                "from_version": {
                    "source_package_name": "initramfs-tools",
                    "source_package_version": "0.142ubuntu25.5",
                    "version": "0.142ubuntu25.5"
                },
                "to_version": {
                    "source_package_name": "initramfs-tools",
                    "source_package_version": "0.142ubuntu25.8",
                    "version": "0.142ubuntu25.8"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2140344
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Add missing USB drivers for StarFive JH7110 SoC (LP: #2140344)",
                            ""
                        ],
                        "package": "initramfs-tools",
                        "version": "0.142ubuntu25.8",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2140344
                        ],
                        "author": "Heinrich Schuchardt <heinrich.schuchardt@canonical.com>",
                        "date": "Wed, 04 Feb 2026 18:01:59 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "keyboxd",
                "from_version": {
                    "source_package_name": "gnupg2",
                    "source_package_version": "2.4.4-2ubuntu17.3",
                    "version": "2.4.4-2ubuntu17.3"
                },
                "to_version": {
                    "source_package_name": "gnupg2",
                    "source_package_version": "2.4.4-2ubuntu17.4",
                    "version": "2.4.4-2ubuntu17.4"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-68973",
                        "url": "https://ubuntu.com/security/CVE-2025-68973",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-68973",
                                "url": "https://ubuntu.com/security/CVE-2025-68973",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Remote Code Execution",
                            "    - debian/patches/CVE-2025-68973.patch: gpg: Fix possible memory",
                            "    corruption in the armor parser.",
                            "    - CVE-2025-68973",
                            ""
                        ],
                        "package": "gnupg2",
                        "version": "2.4.4-2ubuntu17.4",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Allen Huang <allen.huang@canonical.com>",
                        "date": "Mon, 05 Jan 2026 22:01:39 +0000"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "klibc-utils",
                "from_version": {
                    "source_package_name": "klibc",
                    "source_package_version": "2.0.13-4ubuntu0.1",
                    "version": "2.0.13-4ubuntu0.1"
                },
                "to_version": {
                    "source_package_name": "klibc",
                    "source_package_version": "2.0.13-4ubuntu0.2",
                    "version": "2.0.13-4ubuntu0.2"
                },
                "cves": [
                    {
                        "cve": "CVE-2016-9843",
                        "url": "https://ubuntu.com/security/CVE-2016-9843",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2016-9843",
                                "url": "https://ubuntu.com/security/CVE-2016-9843",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Undefined Behavior",
                            "    - debian/patches/CVE-2016-9843.patch: Avoid pre-decrement of pointer",
                            "      in big-endian CRC calculation.",
                            "    - CVE-2016-9843",
                            ""
                        ],
                        "package": "klibc",
                        "version": "2.0.13-4ubuntu0.2",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Bruce Cable <bruce.cable@canonical.com>",
                        "date": "Mon, 12 Jan 2026 13:55:06 +1100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "kpartx",
                "from_version": {
                    "source_package_name": "multipath-tools",
                    "source_package_version": "0.9.4-5ubuntu8",
                    "version": "0.9.4-5ubuntu8"
                },
                "to_version": {
                    "source_package_name": "multipath-tools",
                    "source_package_version": "0.9.4-5ubuntu8.1",
                    "version": "0.9.4-5ubuntu8.1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2116901
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * d/p/0005-hpe-msa-gen7-support.patch: add support for HPE MSA gen7 arrays",
                            "    (LP: #2116901)",
                            ""
                        ],
                        "package": "multipath-tools",
                        "version": "0.9.4-5ubuntu8.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2116901
                        ],
                        "author": "Jonas Jelten <jonas.jelten@canonical.com>",
                        "date": "Tue, 22 Jul 2025 17:44:15 +0200"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libblkid1:riscv64",
                "from_version": {
                    "source_package_name": "util-linux",
                    "source_package_version": "2.39.3-9ubuntu6.3",
                    "version": "2.39.3-9ubuntu6.3"
                },
                "to_version": {
                    "source_package_name": "util-linux",
                    "source_package_version": "2.39.3-9ubuntu6.4",
                    "version": "2.39.3-9ubuntu6.4"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2123886
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Add ARM core support for Vera systems (LP: #2123886)",
                            "    - d/p/ubuntu/lp-2123886-add-missing-arm-cores.patch",
                            ""
                        ],
                        "package": "util-linux",
                        "version": "2.39.3-9ubuntu6.4",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2123886
                        ],
                        "author": "Joao Andre Simioni <joao.simioni@canonical.com>",
                        "date": "Mon, 15 Sep 2025 21:08:02 -0300"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libc-bin",
                "from_version": {
                    "source_package_name": "glibc",
                    "source_package_version": "2.39-0ubuntu8.6",
                    "version": "2.39-0ubuntu8.6"
                },
                "to_version": {
                    "source_package_name": "glibc",
                    "source_package_version": "2.39-0ubuntu8.7",
                    "version": "2.39-0ubuntu8.7"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-15281",
                        "url": "https://ubuntu.com/security/CVE-2025-15281",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-0861",
                        "url": "https://ubuntu.com/security/CVE-2026-0861",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-0915",
                        "url": "https://ubuntu.com/security/CVE-2026-0915",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-15281",
                                "url": "https://ubuntu.com/security/CVE-2025-15281",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-0861",
                                "url": "https://ubuntu.com/security/CVE-2026-0861",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-0915",
                                "url": "https://ubuntu.com/security/CVE-2026-0915",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: use-after-free in wordexp_t fields",
                            "    - debian/patches/CVE-2025-15281.patch: posix: Reset wordexp_t fields",
                            "      with WRDE_REUSE",
                            "    - CVE-2025-15281",
                            "  * SECURITY UPDATE: integer overflow in memalign",
                            "    - debian/patches/CVE-2026-0861.patch: memalign: reinstate alignment",
                            "      overflow check",
                            "    - CVE-2026-0861",
                            "  * SECURITY UPDATE: memory leak in NSS DNS",
                            "    - debian/patches/CVE-2026-0915.patch: resolv: Fix NSS DNS backend for",
                            "      getnetbyaddr",
                            "    - CVE-2026-0915",
                            ""
                        ],
                        "package": "glibc",
                        "version": "2.39-0ubuntu8.7",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Nishit Majithia <nishit.majithia@canonical.com>",
                        "date": "Fri, 30 Jan 2026 13:57:54 +0530"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libc-dev-bin",
                "from_version": {
                    "source_package_name": "glibc",
                    "source_package_version": "2.39-0ubuntu8.6",
                    "version": "2.39-0ubuntu8.6"
                },
                "to_version": {
                    "source_package_name": "glibc",
                    "source_package_version": "2.39-0ubuntu8.7",
                    "version": "2.39-0ubuntu8.7"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-15281",
                        "url": "https://ubuntu.com/security/CVE-2025-15281",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-0861",
                        "url": "https://ubuntu.com/security/CVE-2026-0861",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-0915",
                        "url": "https://ubuntu.com/security/CVE-2026-0915",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-15281",
                                "url": "https://ubuntu.com/security/CVE-2025-15281",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-0861",
                                "url": "https://ubuntu.com/security/CVE-2026-0861",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-0915",
                                "url": "https://ubuntu.com/security/CVE-2026-0915",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: use-after-free in wordexp_t fields",
                            "    - debian/patches/CVE-2025-15281.patch: posix: Reset wordexp_t fields",
                            "      with WRDE_REUSE",
                            "    - CVE-2025-15281",
                            "  * SECURITY UPDATE: integer overflow in memalign",
                            "    - debian/patches/CVE-2026-0861.patch: memalign: reinstate alignment",
                            "      overflow check",
                            "    - CVE-2026-0861",
                            "  * SECURITY UPDATE: memory leak in NSS DNS",
                            "    - debian/patches/CVE-2026-0915.patch: resolv: Fix NSS DNS backend for",
                            "      getnetbyaddr",
                            "    - CVE-2026-0915",
                            ""
                        ],
                        "package": "glibc",
                        "version": "2.39-0ubuntu8.7",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Nishit Majithia <nishit.majithia@canonical.com>",
                        "date": "Fri, 30 Jan 2026 13:57:54 +0530"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libc-devtools",
                "from_version": {
                    "source_package_name": "glibc",
                    "source_package_version": "2.39-0ubuntu8.6",
                    "version": "2.39-0ubuntu8.6"
                },
                "to_version": {
                    "source_package_name": "glibc",
                    "source_package_version": "2.39-0ubuntu8.7",
                    "version": "2.39-0ubuntu8.7"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-15281",
                        "url": "https://ubuntu.com/security/CVE-2025-15281",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-0861",
                        "url": "https://ubuntu.com/security/CVE-2026-0861",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-0915",
                        "url": "https://ubuntu.com/security/CVE-2026-0915",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-15281",
                                "url": "https://ubuntu.com/security/CVE-2025-15281",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-0861",
                                "url": "https://ubuntu.com/security/CVE-2026-0861",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-0915",
                                "url": "https://ubuntu.com/security/CVE-2026-0915",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: use-after-free in wordexp_t fields",
                            "    - debian/patches/CVE-2025-15281.patch: posix: Reset wordexp_t fields",
                            "      with WRDE_REUSE",
                            "    - CVE-2025-15281",
                            "  * SECURITY UPDATE: integer overflow in memalign",
                            "    - debian/patches/CVE-2026-0861.patch: memalign: reinstate alignment",
                            "      overflow check",
                            "    - CVE-2026-0861",
                            "  * SECURITY UPDATE: memory leak in NSS DNS",
                            "    - debian/patches/CVE-2026-0915.patch: resolv: Fix NSS DNS backend for",
                            "      getnetbyaddr",
                            "    - CVE-2026-0915",
                            ""
                        ],
                        "package": "glibc",
                        "version": "2.39-0ubuntu8.7",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Nishit Majithia <nishit.majithia@canonical.com>",
                        "date": "Fri, 30 Jan 2026 13:57:54 +0530"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libc6:riscv64",
                "from_version": {
                    "source_package_name": "glibc",
                    "source_package_version": "2.39-0ubuntu8.6",
                    "version": "2.39-0ubuntu8.6"
                },
                "to_version": {
                    "source_package_name": "glibc",
                    "source_package_version": "2.39-0ubuntu8.7",
                    "version": "2.39-0ubuntu8.7"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-15281",
                        "url": "https://ubuntu.com/security/CVE-2025-15281",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-0861",
                        "url": "https://ubuntu.com/security/CVE-2026-0861",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-0915",
                        "url": "https://ubuntu.com/security/CVE-2026-0915",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-15281",
                                "url": "https://ubuntu.com/security/CVE-2025-15281",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-0861",
                                "url": "https://ubuntu.com/security/CVE-2026-0861",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-0915",
                                "url": "https://ubuntu.com/security/CVE-2026-0915",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: use-after-free in wordexp_t fields",
                            "    - debian/patches/CVE-2025-15281.patch: posix: Reset wordexp_t fields",
                            "      with WRDE_REUSE",
                            "    - CVE-2025-15281",
                            "  * SECURITY UPDATE: integer overflow in memalign",
                            "    - debian/patches/CVE-2026-0861.patch: memalign: reinstate alignment",
                            "      overflow check",
                            "    - CVE-2026-0861",
                            "  * SECURITY UPDATE: memory leak in NSS DNS",
                            "    - debian/patches/CVE-2026-0915.patch: resolv: Fix NSS DNS backend for",
                            "      getnetbyaddr",
                            "    - CVE-2026-0915",
                            ""
                        ],
                        "package": "glibc",
                        "version": "2.39-0ubuntu8.7",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Nishit Majithia <nishit.majithia@canonical.com>",
                        "date": "Fri, 30 Jan 2026 13:57:54 +0530"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libc6-dev:riscv64",
                "from_version": {
                    "source_package_name": "glibc",
                    "source_package_version": "2.39-0ubuntu8.6",
                    "version": "2.39-0ubuntu8.6"
                },
                "to_version": {
                    "source_package_name": "glibc",
                    "source_package_version": "2.39-0ubuntu8.7",
                    "version": "2.39-0ubuntu8.7"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-15281",
                        "url": "https://ubuntu.com/security/CVE-2025-15281",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-0861",
                        "url": "https://ubuntu.com/security/CVE-2026-0861",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-0915",
                        "url": "https://ubuntu.com/security/CVE-2026-0915",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-15281",
                                "url": "https://ubuntu.com/security/CVE-2025-15281",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-0861",
                                "url": "https://ubuntu.com/security/CVE-2026-0861",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-0915",
                                "url": "https://ubuntu.com/security/CVE-2026-0915",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: use-after-free in wordexp_t fields",
                            "    - debian/patches/CVE-2025-15281.patch: posix: Reset wordexp_t fields",
                            "      with WRDE_REUSE",
                            "    - CVE-2025-15281",
                            "  * SECURITY UPDATE: integer overflow in memalign",
                            "    - debian/patches/CVE-2026-0861.patch: memalign: reinstate alignment",
                            "      overflow check",
                            "    - CVE-2026-0861",
                            "  * SECURITY UPDATE: memory leak in NSS DNS",
                            "    - debian/patches/CVE-2026-0915.patch: resolv: Fix NSS DNS backend for",
                            "      getnetbyaddr",
                            "    - CVE-2026-0915",
                            ""
                        ],
                        "package": "glibc",
                        "version": "2.39-0ubuntu8.7",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Nishit Majithia <nishit.majithia@canonical.com>",
                        "date": "Fri, 30 Jan 2026 13:57:54 +0530"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libdrm-common",
                "from_version": {
                    "source_package_name": "libdrm",
                    "source_package_version": "2.4.122-1~ubuntu0.24.04.2",
                    "version": "2.4.122-1~ubuntu0.24.04.2"
                },
                "to_version": {
                    "source_package_name": "libdrm",
                    "source_package_version": "2.4.125-1ubuntu0.1~24.04.1",
                    "version": "2.4.125-1ubuntu0.1~24.04.1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2126037,
                    2127944,
                    2104352,
                    2100483
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Backport to noble. (LP: #2126037)",
                            "    - amdgpu-add-env-support-for-amdgpu-ids.patch dropped as it has",
                            "      changed on the upstream merge request and hasn't landed yet",
                            ""
                        ],
                        "package": "libdrm",
                        "version": "2.4.125-1ubuntu0.1~24.04.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2126037
                        ],
                        "author": "Timo Aaltonen <tjaalton@debian.org>",
                        "date": "Fri, 07 Nov 2025 14:50:51 +0200"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * patches: Identify APUs from hardware (LP: #2127944)",
                            ""
                        ],
                        "package": "libdrm",
                        "version": "2.4.125-1ubuntu0.1",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [
                            2127944
                        ],
                        "author": "Timo Aaltonen <tjaalton@debian.org>",
                        "date": "Fri, 24 Oct 2025 17:43:46 +0300"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  [ Jianfeng Liu ]",
                            "  * Enable build libdrm-intel1 for loong64. (Closes: #1107223)",
                            "",
                            "  [ Timo Aaltonen ]",
                            "  * New upstream release.",
                            "  * patches: Drop the upstreamed fix for xf86drm.",
                            "  * symbols: Updated.",
                            ""
                        ],
                        "package": "libdrm",
                        "version": "2.4.125-1",
                        "urgency": "medium",
                        "distributions": "experimental",
                        "launchpad_bugs_fixed": [],
                        "author": "Timo Aaltonen <tjaalton@debian.org>",
                        "date": "Wed, 25 Jun 2025 10:46:34 +0300"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  [ Daniel van Vugt ]",
                            "  * Add xf86drm-Handle-NULL-in-drmCopyVersion.patch (LP: #2104352)",
                            "",
                            "  [ Bo YU ]",
                            "  * Enable building libdrm-intel1 for riscv64 (Closes: #1085314)",
                            ""
                        ],
                        "package": "libdrm",
                        "version": "2.4.124-2",
                        "urgency": "medium",
                        "distributions": "unstable",
                        "launchpad_bugs_fixed": [
                            2104352
                        ],
                        "author": "Timo Aaltonen <tjaalton@debian.org>",
                        "date": "Tue, 01 Apr 2025 11:08:19 +0300"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * New upstream release.",
                            "  * amdgpu-add-env-support-for-amdgpu-ids.patch: Add a patch to allow",
                            "    using an env variable for amdgpu.ids path. (LP: #2100483)",
                            ""
                        ],
                        "package": "libdrm",
                        "version": "2.4.124-1",
                        "urgency": "medium",
                        "distributions": "unstable",
                        "launchpad_bugs_fixed": [
                            2100483
                        ],
                        "author": "Timo Aaltonen <tjaalton@debian.org>",
                        "date": "Thu, 27 Feb 2025 14:57:25 +0200"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * New upstream release.",
                            "  * Add upstream metadata, drop old git url from d/watch.",
                            "  * Update signing-key.asc.",
                            ""
                        ],
                        "package": "libdrm",
                        "version": "2.4.123-1",
                        "urgency": "medium",
                        "distributions": "unstable",
                        "launchpad_bugs_fixed": [],
                        "author": "Timo Aaltonen <tjaalton@debian.org>",
                        "date": "Tue, 10 Sep 2024 11:03:50 +0300"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libdrm2:riscv64",
                "from_version": {
                    "source_package_name": "libdrm",
                    "source_package_version": "2.4.122-1~ubuntu0.24.04.2",
                    "version": "2.4.122-1~ubuntu0.24.04.2"
                },
                "to_version": {
                    "source_package_name": "libdrm",
                    "source_package_version": "2.4.125-1ubuntu0.1~24.04.1",
                    "version": "2.4.125-1ubuntu0.1~24.04.1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2126037,
                    2127944,
                    2104352,
                    2100483
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Backport to noble. (LP: #2126037)",
                            "    - amdgpu-add-env-support-for-amdgpu-ids.patch dropped as it has",
                            "      changed on the upstream merge request and hasn't landed yet",
                            ""
                        ],
                        "package": "libdrm",
                        "version": "2.4.125-1ubuntu0.1~24.04.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2126037
                        ],
                        "author": "Timo Aaltonen <tjaalton@debian.org>",
                        "date": "Fri, 07 Nov 2025 14:50:51 +0200"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * patches: Identify APUs from hardware (LP: #2127944)",
                            ""
                        ],
                        "package": "libdrm",
                        "version": "2.4.125-1ubuntu0.1",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [
                            2127944
                        ],
                        "author": "Timo Aaltonen <tjaalton@debian.org>",
                        "date": "Fri, 24 Oct 2025 17:43:46 +0300"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  [ Jianfeng Liu ]",
                            "  * Enable build libdrm-intel1 for loong64. (Closes: #1107223)",
                            "",
                            "  [ Timo Aaltonen ]",
                            "  * New upstream release.",
                            "  * patches: Drop the upstreamed fix for xf86drm.",
                            "  * symbols: Updated.",
                            ""
                        ],
                        "package": "libdrm",
                        "version": "2.4.125-1",
                        "urgency": "medium",
                        "distributions": "experimental",
                        "launchpad_bugs_fixed": [],
                        "author": "Timo Aaltonen <tjaalton@debian.org>",
                        "date": "Wed, 25 Jun 2025 10:46:34 +0300"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  [ Daniel van Vugt ]",
                            "  * Add xf86drm-Handle-NULL-in-drmCopyVersion.patch (LP: #2104352)",
                            "",
                            "  [ Bo YU ]",
                            "  * Enable building libdrm-intel1 for riscv64 (Closes: #1085314)",
                            ""
                        ],
                        "package": "libdrm",
                        "version": "2.4.124-2",
                        "urgency": "medium",
                        "distributions": "unstable",
                        "launchpad_bugs_fixed": [
                            2104352
                        ],
                        "author": "Timo Aaltonen <tjaalton@debian.org>",
                        "date": "Tue, 01 Apr 2025 11:08:19 +0300"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * New upstream release.",
                            "  * amdgpu-add-env-support-for-amdgpu-ids.patch: Add a patch to allow",
                            "    using an env variable for amdgpu.ids path. (LP: #2100483)",
                            ""
                        ],
                        "package": "libdrm",
                        "version": "2.4.124-1",
                        "urgency": "medium",
                        "distributions": "unstable",
                        "launchpad_bugs_fixed": [
                            2100483
                        ],
                        "author": "Timo Aaltonen <tjaalton@debian.org>",
                        "date": "Thu, 27 Feb 2025 14:57:25 +0200"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * New upstream release.",
                            "  * Add upstream metadata, drop old git url from d/watch.",
                            "  * Update signing-key.asc.",
                            ""
                        ],
                        "package": "libdrm",
                        "version": "2.4.123-1",
                        "urgency": "medium",
                        "distributions": "unstable",
                        "launchpad_bugs_fixed": [],
                        "author": "Timo Aaltonen <tjaalton@debian.org>",
                        "date": "Tue, 10 Sep 2024 11:03:50 +0300"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libfdisk1:riscv64",
                "from_version": {
                    "source_package_name": "util-linux",
                    "source_package_version": "2.39.3-9ubuntu6.3",
                    "version": "2.39.3-9ubuntu6.3"
                },
                "to_version": {
                    "source_package_name": "util-linux",
                    "source_package_version": "2.39.3-9ubuntu6.4",
                    "version": "2.39.3-9ubuntu6.4"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2123886
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Add ARM core support for Vera systems (LP: #2123886)",
                            "    - d/p/ubuntu/lp-2123886-add-missing-arm-cores.patch",
                            ""
                        ],
                        "package": "util-linux",
                        "version": "2.39.3-9ubuntu6.4",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2123886
                        ],
                        "author": "Joao Andre Simioni <joao.simioni@canonical.com>",
                        "date": "Mon, 15 Sep 2025 21:08:02 -0300"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libfwupd2:riscv64",
                "from_version": {
                    "source_package_name": "fwupd",
                    "source_package_version": "1.9.31-0ubuntu1~24.04.1",
                    "version": "1.9.31-0ubuntu1~24.04.1"
                },
                "to_version": {
                    "source_package_name": "fwupd",
                    "source_package_version": "1.9.33-0ubuntu1~24.04.1ubuntu1",
                    "version": "1.9.33-0ubuntu1~24.04.1ubuntu1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2131001
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * New upstream version (1.9.31)",
                            "    - Add PS5512 usb firmware update (LP: #2131001)",
                            ""
                        ],
                        "package": "fwupd",
                        "version": "1.9.33-0ubuntu1~24.04.1ubuntu1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2131001
                        ],
                        "author": "Mario Limonciello <superm1@ubuntu.com>",
                        "date": "Sun, 30 Nov 2025 07:12:14 -0600"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libglib2.0-0t64:riscv64",
                "from_version": {
                    "source_package_name": "glib2.0",
                    "source_package_version": "2.80.0-6ubuntu3.5",
                    "version": "2.80.0-6ubuntu3.5"
                },
                "to_version": {
                    "source_package_name": "glib2.0",
                    "source_package_version": "2.80.0-6ubuntu3.8",
                    "version": "2.80.0-6ubuntu3.8"
                },
                "cves": [
                    {
                        "cve": "CVE-2026-1484",
                        "url": "https://ubuntu.com/security/CVE-2026-1484",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-1485",
                        "url": "https://ubuntu.com/security/CVE-2026-1485",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-1489",
                        "url": "https://ubuntu.com/security/CVE-2026-1489",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-0988",
                        "url": "https://ubuntu.com/security/CVE-2026-0988",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-3360",
                        "url": "https://ubuntu.com/security/CVE-2025-3360",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-6052",
                        "url": "https://ubuntu.com/security/CVE-2025-6052",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-7039",
                        "url": "https://ubuntu.com/security/CVE-2025-7039",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-13601",
                        "url": "https://ubuntu.com/security/CVE-2025-13601",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-14087",
                        "url": "https://ubuntu.com/security/CVE-2025-14087",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2026-1484",
                                "url": "https://ubuntu.com/security/CVE-2026-1484",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-1485",
                                "url": "https://ubuntu.com/security/CVE-2026-1485",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-1489",
                                "url": "https://ubuntu.com/security/CVE-2026-1489",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: integer overflow in Base64 encoding",
                            "    - debian/patches/CVE-2026-1484-1.patch: use gsize to prevent potential",
                            "      overflow in glib/gbase64.c.",
                            "    - debian/patches/CVE-2026-1484-2.patch: ensure that the out value is",
                            "      within allocated size in glib/gbase64.c.",
                            "    - CVE-2026-1484",
                            "  * SECURITY UPDATE: buffer underflow via header length",
                            "    - debian/patches/CVE-2026-1485.patch: do not overflow if header is",
                            "      longer than MAXINT in gio/gcontenttype.c.",
                            "    - CVE-2026-1485",
                            "  * SECURITY UPDATE: integer overflow via Unicode case conversion",
                            "    - debian/patches/CVE-2026-1489-1.patch: use size_t for output_marks",
                            "      length in glib/guniprop.c.",
                            "    - debian/patches/CVE-2026-1489-2.patch: do not convert size_t to gint",
                            "      in glib/guniprop.c.",
                            "    - debian/patches/CVE-2026-1489-3.patch: ensure we do not overflow size",
                            "      in glib/guniprop.c.",
                            "    - debian/patches/CVE-2026-1489-4.patch: add test debug information when",
                            "      parsing input files in glib/tests/unicode.c.",
                            "    - CVE-2026-1489",
                            ""
                        ],
                        "package": "glib2.0",
                        "version": "2.80.0-6ubuntu3.8",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Wed, 28 Jan 2026 12:53:07 -0500"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2026-0988",
                                "url": "https://ubuntu.com/security/CVE-2026-0988",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Integer overflow in g_buffered_input_stream_peek()",
                            "    - debian/patches/CVE-2026-0988.patch: fix a potential integer overflow",
                            "      in peek() in gio/gbufferedinputstream.c,",
                            "      gio/tests/buffered-input-stream.c.",
                            "    - CVE-2026-0988",
                            ""
                        ],
                        "package": "glib2.0",
                        "version": "2.80.0-6ubuntu3.7",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Tue, 20 Jan 2026 08:08:27 -0500"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-3360",
                                "url": "https://ubuntu.com/security/CVE-2025-3360",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-6052",
                                "url": "https://ubuntu.com/security/CVE-2025-6052",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-7039",
                                "url": "https://ubuntu.com/security/CVE-2025-7039",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-13601",
                                "url": "https://ubuntu.com/security/CVE-2025-13601",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-14087",
                                "url": "https://ubuntu.com/security/CVE-2025-14087",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: overflow via long invalid ISO 8601 timestamp",
                            "    - debian/patches/CVE-2025-3360-1.patch: fix integer overflow when",
                            "      parsing very long ISO8601 inputs in glib/gdatetime.c.",
                            "    - debian/patches/CVE-2025-3360-2.patch: fix potential integer overflow",
                            "      in timezone offset handling in glib/gdatetime.c.",
                            "    - debian/patches/CVE-2025-3360-3.patch: track timezone length as an",
                            "      unsigned size_t in glib/gdatetime.c.",
                            "    - debian/patches/CVE-2025-3360-4.patch: factor out some string pointer",
                            "      arithmetic in glib/gdatetime.c.",
                            "    - debian/patches/CVE-2025-3360-5.patch: factor out an undersized",
                            "      variable in glib/gdatetime.c.",
                            "    - debian/patches/CVE-2025-3360-6.patch: add some missing GDateTime",
                            "      ISO8601 parsing tests in glib/tests/gdatetime.c.",
                            "    - CVE-2025-3360",
                            "  * SECURITY UPDATE: GString overflow",
                            "    - debian/patches/CVE-2025-6052.patch: fix overflow check when expanding",
                            "      the string in glib/gstring.c.",
                            "    - CVE-2025-6052",
                            "  * SECURITY UPDATE: integer overflow in temp file creation",
                            "    - debian/patches/CVE-2025-7039.patch: fix computation of temporary file",
                            "      name in glib/gfileutils.c.",
                            "    - CVE-2025-7039",
                            "  * SECURITY UPDATE: heap overflow in g_escape_uri_string()",
                            "    - debian/patches/CVE-2025-13601.patch: add overflow check in",
                            "      glib/gconvert.c.",
                            "    - CVE-2025-13601",
                            "  * SECURITY UPDATE: buffer underflow through glib/gvariant",
                            "    - debian/patches/CVE-2025-14087-1.patch: fix potential integer overflow",
                            "      parsing (byte)strings in glib/gvariant-parser.c.",
                            "    - debian/patches/CVE-2025-14087-2.patch: use size_t to count numbers of",
                            "      child elements in glib/gvariant-parser.c.",
                            "    - debian/patches/CVE-2025-14087-3.patch: convert error handling code to",
                            "      use size_t in glib/gvariant-parser.c.",
                            "    - CVE-2025-14087",
                            "  * SECURITY UPDATE: integer overflow in gfileattribute",
                            "    - debian/patches/gfileattribute-overflow.patch: add overflow check in",
                            "      gio/gfileattribute.c.",
                            "    - No CVE number",
                            ""
                        ],
                        "package": "glib2.0",
                        "version": "2.80.0-6ubuntu3.6",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Wed, 10 Dec 2025 10:51:22 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libglib2.0-bin",
                "from_version": {
                    "source_package_name": "glib2.0",
                    "source_package_version": "2.80.0-6ubuntu3.5",
                    "version": "2.80.0-6ubuntu3.5"
                },
                "to_version": {
                    "source_package_name": "glib2.0",
                    "source_package_version": "2.80.0-6ubuntu3.8",
                    "version": "2.80.0-6ubuntu3.8"
                },
                "cves": [
                    {
                        "cve": "CVE-2026-1484",
                        "url": "https://ubuntu.com/security/CVE-2026-1484",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-1485",
                        "url": "https://ubuntu.com/security/CVE-2026-1485",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-1489",
                        "url": "https://ubuntu.com/security/CVE-2026-1489",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-0988",
                        "url": "https://ubuntu.com/security/CVE-2026-0988",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-3360",
                        "url": "https://ubuntu.com/security/CVE-2025-3360",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-6052",
                        "url": "https://ubuntu.com/security/CVE-2025-6052",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-7039",
                        "url": "https://ubuntu.com/security/CVE-2025-7039",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-13601",
                        "url": "https://ubuntu.com/security/CVE-2025-13601",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-14087",
                        "url": "https://ubuntu.com/security/CVE-2025-14087",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2026-1484",
                                "url": "https://ubuntu.com/security/CVE-2026-1484",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-1485",
                                "url": "https://ubuntu.com/security/CVE-2026-1485",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-1489",
                                "url": "https://ubuntu.com/security/CVE-2026-1489",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: integer overflow in Base64 encoding",
                            "    - debian/patches/CVE-2026-1484-1.patch: use gsize to prevent potential",
                            "      overflow in glib/gbase64.c.",
                            "    - debian/patches/CVE-2026-1484-2.patch: ensure that the out value is",
                            "      within allocated size in glib/gbase64.c.",
                            "    - CVE-2026-1484",
                            "  * SECURITY UPDATE: buffer underflow via header length",
                            "    - debian/patches/CVE-2026-1485.patch: do not overflow if header is",
                            "      longer than MAXINT in gio/gcontenttype.c.",
                            "    - CVE-2026-1485",
                            "  * SECURITY UPDATE: integer overflow via Unicode case conversion",
                            "    - debian/patches/CVE-2026-1489-1.patch: use size_t for output_marks",
                            "      length in glib/guniprop.c.",
                            "    - debian/patches/CVE-2026-1489-2.patch: do not convert size_t to gint",
                            "      in glib/guniprop.c.",
                            "    - debian/patches/CVE-2026-1489-3.patch: ensure we do not overflow size",
                            "      in glib/guniprop.c.",
                            "    - debian/patches/CVE-2026-1489-4.patch: add test debug information when",
                            "      parsing input files in glib/tests/unicode.c.",
                            "    - CVE-2026-1489",
                            ""
                        ],
                        "package": "glib2.0",
                        "version": "2.80.0-6ubuntu3.8",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Wed, 28 Jan 2026 12:53:07 -0500"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2026-0988",
                                "url": "https://ubuntu.com/security/CVE-2026-0988",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Integer overflow in g_buffered_input_stream_peek()",
                            "    - debian/patches/CVE-2026-0988.patch: fix a potential integer overflow",
                            "      in peek() in gio/gbufferedinputstream.c,",
                            "      gio/tests/buffered-input-stream.c.",
                            "    - CVE-2026-0988",
                            ""
                        ],
                        "package": "glib2.0",
                        "version": "2.80.0-6ubuntu3.7",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Tue, 20 Jan 2026 08:08:27 -0500"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-3360",
                                "url": "https://ubuntu.com/security/CVE-2025-3360",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-6052",
                                "url": "https://ubuntu.com/security/CVE-2025-6052",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-7039",
                                "url": "https://ubuntu.com/security/CVE-2025-7039",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-13601",
                                "url": "https://ubuntu.com/security/CVE-2025-13601",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-14087",
                                "url": "https://ubuntu.com/security/CVE-2025-14087",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: overflow via long invalid ISO 8601 timestamp",
                            "    - debian/patches/CVE-2025-3360-1.patch: fix integer overflow when",
                            "      parsing very long ISO8601 inputs in glib/gdatetime.c.",
                            "    - debian/patches/CVE-2025-3360-2.patch: fix potential integer overflow",
                            "      in timezone offset handling in glib/gdatetime.c.",
                            "    - debian/patches/CVE-2025-3360-3.patch: track timezone length as an",
                            "      unsigned size_t in glib/gdatetime.c.",
                            "    - debian/patches/CVE-2025-3360-4.patch: factor out some string pointer",
                            "      arithmetic in glib/gdatetime.c.",
                            "    - debian/patches/CVE-2025-3360-5.patch: factor out an undersized",
                            "      variable in glib/gdatetime.c.",
                            "    - debian/patches/CVE-2025-3360-6.patch: add some missing GDateTime",
                            "      ISO8601 parsing tests in glib/tests/gdatetime.c.",
                            "    - CVE-2025-3360",
                            "  * SECURITY UPDATE: GString overflow",
                            "    - debian/patches/CVE-2025-6052.patch: fix overflow check when expanding",
                            "      the string in glib/gstring.c.",
                            "    - CVE-2025-6052",
                            "  * SECURITY UPDATE: integer overflow in temp file creation",
                            "    - debian/patches/CVE-2025-7039.patch: fix computation of temporary file",
                            "      name in glib/gfileutils.c.",
                            "    - CVE-2025-7039",
                            "  * SECURITY UPDATE: heap overflow in g_escape_uri_string()",
                            "    - debian/patches/CVE-2025-13601.patch: add overflow check in",
                            "      glib/gconvert.c.",
                            "    - CVE-2025-13601",
                            "  * SECURITY UPDATE: buffer underflow through glib/gvariant",
                            "    - debian/patches/CVE-2025-14087-1.patch: fix potential integer overflow",
                            "      parsing (byte)strings in glib/gvariant-parser.c.",
                            "    - debian/patches/CVE-2025-14087-2.patch: use size_t to count numbers of",
                            "      child elements in glib/gvariant-parser.c.",
                            "    - debian/patches/CVE-2025-14087-3.patch: convert error handling code to",
                            "      use size_t in glib/gvariant-parser.c.",
                            "    - CVE-2025-14087",
                            "  * SECURITY UPDATE: integer overflow in gfileattribute",
                            "    - debian/patches/gfileattribute-overflow.patch: add overflow check in",
                            "      gio/gfileattribute.c.",
                            "    - No CVE number",
                            ""
                        ],
                        "package": "glib2.0",
                        "version": "2.80.0-6ubuntu3.6",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Wed, 10 Dec 2025 10:51:22 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libglib2.0-data",
                "from_version": {
                    "source_package_name": "glib2.0",
                    "source_package_version": "2.80.0-6ubuntu3.5",
                    "version": "2.80.0-6ubuntu3.5"
                },
                "to_version": {
                    "source_package_name": "glib2.0",
                    "source_package_version": "2.80.0-6ubuntu3.8",
                    "version": "2.80.0-6ubuntu3.8"
                },
                "cves": [
                    {
                        "cve": "CVE-2026-1484",
                        "url": "https://ubuntu.com/security/CVE-2026-1484",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-1485",
                        "url": "https://ubuntu.com/security/CVE-2026-1485",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-1489",
                        "url": "https://ubuntu.com/security/CVE-2026-1489",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-0988",
                        "url": "https://ubuntu.com/security/CVE-2026-0988",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-3360",
                        "url": "https://ubuntu.com/security/CVE-2025-3360",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-6052",
                        "url": "https://ubuntu.com/security/CVE-2025-6052",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-7039",
                        "url": "https://ubuntu.com/security/CVE-2025-7039",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-13601",
                        "url": "https://ubuntu.com/security/CVE-2025-13601",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-14087",
                        "url": "https://ubuntu.com/security/CVE-2025-14087",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2026-1484",
                                "url": "https://ubuntu.com/security/CVE-2026-1484",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-1485",
                                "url": "https://ubuntu.com/security/CVE-2026-1485",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-1489",
                                "url": "https://ubuntu.com/security/CVE-2026-1489",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: integer overflow in Base64 encoding",
                            "    - debian/patches/CVE-2026-1484-1.patch: use gsize to prevent potential",
                            "      overflow in glib/gbase64.c.",
                            "    - debian/patches/CVE-2026-1484-2.patch: ensure that the out value is",
                            "      within allocated size in glib/gbase64.c.",
                            "    - CVE-2026-1484",
                            "  * SECURITY UPDATE: buffer underflow via header length",
                            "    - debian/patches/CVE-2026-1485.patch: do not overflow if header is",
                            "      longer than MAXINT in gio/gcontenttype.c.",
                            "    - CVE-2026-1485",
                            "  * SECURITY UPDATE: integer overflow via Unicode case conversion",
                            "    - debian/patches/CVE-2026-1489-1.patch: use size_t for output_marks",
                            "      length in glib/guniprop.c.",
                            "    - debian/patches/CVE-2026-1489-2.patch: do not convert size_t to gint",
                            "      in glib/guniprop.c.",
                            "    - debian/patches/CVE-2026-1489-3.patch: ensure we do not overflow size",
                            "      in glib/guniprop.c.",
                            "    - debian/patches/CVE-2026-1489-4.patch: add test debug information when",
                            "      parsing input files in glib/tests/unicode.c.",
                            "    - CVE-2026-1489",
                            ""
                        ],
                        "package": "glib2.0",
                        "version": "2.80.0-6ubuntu3.8",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Wed, 28 Jan 2026 12:53:07 -0500"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2026-0988",
                                "url": "https://ubuntu.com/security/CVE-2026-0988",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Integer overflow in g_buffered_input_stream_peek()",
                            "    - debian/patches/CVE-2026-0988.patch: fix a potential integer overflow",
                            "      in peek() in gio/gbufferedinputstream.c,",
                            "      gio/tests/buffered-input-stream.c.",
                            "    - CVE-2026-0988",
                            ""
                        ],
                        "package": "glib2.0",
                        "version": "2.80.0-6ubuntu3.7",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Tue, 20 Jan 2026 08:08:27 -0500"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-3360",
                                "url": "https://ubuntu.com/security/CVE-2025-3360",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-6052",
                                "url": "https://ubuntu.com/security/CVE-2025-6052",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-7039",
                                "url": "https://ubuntu.com/security/CVE-2025-7039",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-13601",
                                "url": "https://ubuntu.com/security/CVE-2025-13601",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-14087",
                                "url": "https://ubuntu.com/security/CVE-2025-14087",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: overflow via long invalid ISO 8601 timestamp",
                            "    - debian/patches/CVE-2025-3360-1.patch: fix integer overflow when",
                            "      parsing very long ISO8601 inputs in glib/gdatetime.c.",
                            "    - debian/patches/CVE-2025-3360-2.patch: fix potential integer overflow",
                            "      in timezone offset handling in glib/gdatetime.c.",
                            "    - debian/patches/CVE-2025-3360-3.patch: track timezone length as an",
                            "      unsigned size_t in glib/gdatetime.c.",
                            "    - debian/patches/CVE-2025-3360-4.patch: factor out some string pointer",
                            "      arithmetic in glib/gdatetime.c.",
                            "    - debian/patches/CVE-2025-3360-5.patch: factor out an undersized",
                            "      variable in glib/gdatetime.c.",
                            "    - debian/patches/CVE-2025-3360-6.patch: add some missing GDateTime",
                            "      ISO8601 parsing tests in glib/tests/gdatetime.c.",
                            "    - CVE-2025-3360",
                            "  * SECURITY UPDATE: GString overflow",
                            "    - debian/patches/CVE-2025-6052.patch: fix overflow check when expanding",
                            "      the string in glib/gstring.c.",
                            "    - CVE-2025-6052",
                            "  * SECURITY UPDATE: integer overflow in temp file creation",
                            "    - debian/patches/CVE-2025-7039.patch: fix computation of temporary file",
                            "      name in glib/gfileutils.c.",
                            "    - CVE-2025-7039",
                            "  * SECURITY UPDATE: heap overflow in g_escape_uri_string()",
                            "    - debian/patches/CVE-2025-13601.patch: add overflow check in",
                            "      glib/gconvert.c.",
                            "    - CVE-2025-13601",
                            "  * SECURITY UPDATE: buffer underflow through glib/gvariant",
                            "    - debian/patches/CVE-2025-14087-1.patch: fix potential integer overflow",
                            "      parsing (byte)strings in glib/gvariant-parser.c.",
                            "    - debian/patches/CVE-2025-14087-2.patch: use size_t to count numbers of",
                            "      child elements in glib/gvariant-parser.c.",
                            "    - debian/patches/CVE-2025-14087-3.patch: convert error handling code to",
                            "      use size_t in glib/gvariant-parser.c.",
                            "    - CVE-2025-14087",
                            "  * SECURITY UPDATE: integer overflow in gfileattribute",
                            "    - debian/patches/gfileattribute-overflow.patch: add overflow check in",
                            "      gio/gfileattribute.c.",
                            "    - No CVE number",
                            ""
                        ],
                        "package": "glib2.0",
                        "version": "2.80.0-6ubuntu3.6",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Wed, 10 Dec 2025 10:51:22 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libheif-plugin-aomdec:riscv64",
                "from_version": {
                    "source_package_name": "libheif",
                    "source_package_version": "1.17.6-1ubuntu4.1",
                    "version": "1.17.6-1ubuntu4.1"
                },
                "to_version": {
                    "source_package_name": "libheif",
                    "source_package_version": "1.17.6-1ubuntu4.2",
                    "version": "1.17.6-1ubuntu4.2"
                },
                "cves": [
                    {
                        "cve": "CVE-2024-25269",
                        "url": "https://ubuntu.com/security/CVE-2024-25269",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68431",
                        "url": "https://ubuntu.com/security/CVE-2025-68431",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2024-25269",
                                "url": "https://ubuntu.com/security/CVE-2024-25269",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68431",
                                "url": "https://ubuntu.com/security/CVE-2025-68431",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Denial of Service",
                            "    - debian/patches/CVE-2024-25269.patch: Fix memory leaks in function",
                            "      JpegEncoder::Encode",
                            "    - CVE-2024-25269",
                            "  * SECURITY UPDATE: Buffer Overflow",
                            "    - debian/patches/CVE-2025-68431.patch: Fix wrong copy width in",
                            "      overlay images, thanks to Aldo Ristori",
                            "    - CVE-2025-68431",
                            ""
                        ],
                        "package": "libheif",
                        "version": "1.17.6-1ubuntu4.2",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Bruce Cable <bruce.cable@canonical.com>",
                        "date": "Wed, 07 Jan 2026 17:41:16 +1100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libheif-plugin-aomenc:riscv64",
                "from_version": {
                    "source_package_name": "libheif",
                    "source_package_version": "1.17.6-1ubuntu4.1",
                    "version": "1.17.6-1ubuntu4.1"
                },
                "to_version": {
                    "source_package_name": "libheif",
                    "source_package_version": "1.17.6-1ubuntu4.2",
                    "version": "1.17.6-1ubuntu4.2"
                },
                "cves": [
                    {
                        "cve": "CVE-2024-25269",
                        "url": "https://ubuntu.com/security/CVE-2024-25269",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68431",
                        "url": "https://ubuntu.com/security/CVE-2025-68431",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2024-25269",
                                "url": "https://ubuntu.com/security/CVE-2024-25269",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68431",
                                "url": "https://ubuntu.com/security/CVE-2025-68431",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Denial of Service",
                            "    - debian/patches/CVE-2024-25269.patch: Fix memory leaks in function",
                            "      JpegEncoder::Encode",
                            "    - CVE-2024-25269",
                            "  * SECURITY UPDATE: Buffer Overflow",
                            "    - debian/patches/CVE-2025-68431.patch: Fix wrong copy width in",
                            "      overlay images, thanks to Aldo Ristori",
                            "    - CVE-2025-68431",
                            ""
                        ],
                        "package": "libheif",
                        "version": "1.17.6-1ubuntu4.2",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Bruce Cable <bruce.cable@canonical.com>",
                        "date": "Wed, 07 Jan 2026 17:41:16 +1100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libheif-plugin-libde265:riscv64",
                "from_version": {
                    "source_package_name": "libheif",
                    "source_package_version": "1.17.6-1ubuntu4.1",
                    "version": "1.17.6-1ubuntu4.1"
                },
                "to_version": {
                    "source_package_name": "libheif",
                    "source_package_version": "1.17.6-1ubuntu4.2",
                    "version": "1.17.6-1ubuntu4.2"
                },
                "cves": [
                    {
                        "cve": "CVE-2024-25269",
                        "url": "https://ubuntu.com/security/CVE-2024-25269",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68431",
                        "url": "https://ubuntu.com/security/CVE-2025-68431",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2024-25269",
                                "url": "https://ubuntu.com/security/CVE-2024-25269",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68431",
                                "url": "https://ubuntu.com/security/CVE-2025-68431",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Denial of Service",
                            "    - debian/patches/CVE-2024-25269.patch: Fix memory leaks in function",
                            "      JpegEncoder::Encode",
                            "    - CVE-2024-25269",
                            "  * SECURITY UPDATE: Buffer Overflow",
                            "    - debian/patches/CVE-2025-68431.patch: Fix wrong copy width in",
                            "      overlay images, thanks to Aldo Ristori",
                            "    - CVE-2025-68431",
                            ""
                        ],
                        "package": "libheif",
                        "version": "1.17.6-1ubuntu4.2",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Bruce Cable <bruce.cable@canonical.com>",
                        "date": "Wed, 07 Jan 2026 17:41:16 +1100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libheif1:riscv64",
                "from_version": {
                    "source_package_name": "libheif",
                    "source_package_version": "1.17.6-1ubuntu4.1",
                    "version": "1.17.6-1ubuntu4.1"
                },
                "to_version": {
                    "source_package_name": "libheif",
                    "source_package_version": "1.17.6-1ubuntu4.2",
                    "version": "1.17.6-1ubuntu4.2"
                },
                "cves": [
                    {
                        "cve": "CVE-2024-25269",
                        "url": "https://ubuntu.com/security/CVE-2024-25269",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68431",
                        "url": "https://ubuntu.com/security/CVE-2025-68431",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2024-25269",
                                "url": "https://ubuntu.com/security/CVE-2024-25269",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68431",
                                "url": "https://ubuntu.com/security/CVE-2025-68431",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Denial of Service",
                            "    - debian/patches/CVE-2024-25269.patch: Fix memory leaks in function",
                            "      JpegEncoder::Encode",
                            "    - CVE-2024-25269",
                            "  * SECURITY UPDATE: Buffer Overflow",
                            "    - debian/patches/CVE-2025-68431.patch: Fix wrong copy width in",
                            "      overlay images, thanks to Aldo Ristori",
                            "    - CVE-2025-68431",
                            ""
                        ],
                        "package": "libheif",
                        "version": "1.17.6-1ubuntu4.2",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Bruce Cable <bruce.cable@canonical.com>",
                        "date": "Wed, 07 Jan 2026 17:41:16 +1100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libklibc:riscv64",
                "from_version": {
                    "source_package_name": "klibc",
                    "source_package_version": "2.0.13-4ubuntu0.1",
                    "version": "2.0.13-4ubuntu0.1"
                },
                "to_version": {
                    "source_package_name": "klibc",
                    "source_package_version": "2.0.13-4ubuntu0.2",
                    "version": "2.0.13-4ubuntu0.2"
                },
                "cves": [
                    {
                        "cve": "CVE-2016-9843",
                        "url": "https://ubuntu.com/security/CVE-2016-9843",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2016-9843",
                                "url": "https://ubuntu.com/security/CVE-2016-9843",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Undefined Behavior",
                            "    - debian/patches/CVE-2016-9843.patch: Avoid pre-decrement of pointer",
                            "      in big-endian CRC calculation.",
                            "    - CVE-2016-9843",
                            ""
                        ],
                        "package": "klibc",
                        "version": "2.0.13-4ubuntu0.2",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Bruce Cable <bruce.cable@canonical.com>",
                        "date": "Mon, 12 Jan 2026 13:55:06 +1100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libldap-common",
                "from_version": {
                    "source_package_name": "openldap",
                    "source_package_version": "2.6.7+dfsg-1~exp1ubuntu8.2",
                    "version": "2.6.7+dfsg-1~exp1ubuntu8.2"
                },
                "to_version": {
                    "source_package_name": "openldap",
                    "source_package_version": "2.6.10+dfsg-0ubuntu0.24.04.1",
                    "version": "2.6.10+dfsg-0ubuntu0.24.04.1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2127665,
                    2125685,
                    2121816
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * New upstream version (LP: #2127665):",
                            "    - 2.6.10:",
                            "      - Added slapd microsecond timestamp format for local logging (ITS#10140)",
                            "      - Fixed libldap ldap_result behavior with LDAP_MSG_RECEIVED (ITS#10229)",
                            "      - Fixed lloadd handling of starttls critical (ITS#10323)",
                            "      - Fixed slapd syncrepl when used with slapo-rwm (ITS#10290)",
                            "      - Fixed slapd regression with certain searches (ITS#10307)",
                            "      - Fixed slapo-autoca olcAutoCAserverClass object (ITS#10288)",
                            "      - Fixed slapo-pcache caching behaviors (ITS#10270)",
                            "",
                            "    - 2.6.9:",
                            "      - Fixed libldap TLS connection timeout handling (ITS#8047)",
                            "      - Fixed libldap GnuTLS incompatible pointer type (ITS#10253)",
                            "      - Fixed libldap OpenSSL set_ciphersuite error handling (ITS#10223)",
                            "      - Fixed libldap to check for OpenSSL EVP_Digest* failure (ITS#10224)",
                            "      - Fixed slapd cn=config disallowed modification of cn=schema (ITS#10256)",
                            "      - Fixed slapd syncrepl assert during refresh at shutdown (ITS#10232)",
                            "      - Fixed slapd syncrepl retry state during refreshDone (ITS#10234)",
                            "      - Fixed slapd-ldap use of multi-precision add for op counters (ITS#10237)",
                            "      - Fixed slapd-mdb idl intersection (ITS#10233)",
                            "      - Fixed slapd-wt idl intersection (ITS#10233)",
                            "      - Fixed slapo-memberof to omit dynamic values (ITS#10230)",
                            "      - Fixed slapo-nestgroup leak in nestgroup_memberFilter (ITS#10249)",
                            "      - Fixed slapo-translucent regression with subordinate databases (ITS#10248)",
                            "      - Fixed slapo-translucent regression when requesting attributes (ITS#10272)",
                            "      - Fixed slappw-argon2 defaults to be more secure (ITS#9827)",
                            "",
                            "    - 2.6.8:",
                            "      - Fixed libldap exit handling with OpenSSL3 again (ITS#9952)",
                            "      - Fixed libldap OpenSSL channel binding digest (ITS#10216)",
                            "      - Fixed slapd handling of large uid/gids peercred auth (ITS#10211)",
                            "      - Fixed slapd-asyncmeta/meta target structure allocations (ITS#10197)",
                            "      - Fixed slapd-meta with dynlist (ITS#10164)",
                            "      - Fixed slapd-meta binds when proxying internal op (ITS#10165)",
                            "      - Added slapo-nestgroup overlay (ITS#10161)",
                            "      - Added slapo-memberof 'addcheck' option (ITS#10167)",
                            "      - Fixed slapo-accesslog startup initialization (ITS#10170)",
                            "      - Fixed slapo-constraint double free on invalid attr (ITS#10204)",
                            "      - Fixed slapo-dynlist with abandoned operations (ITS#10044)",
                            "      - Build",
                            "        - Fixed build with gcc14.x (ITS#10166)",
                            "        - Fixed back-perl with clang15 (ITS#10177)",
                            "        - Fixed to reduce systemd dependencies (ITS#10214)",
                            "      - Contrib",
                            "        - Added slapo-alias contrib module (ITS#10104, ITS#10182)",
                            "        - Fixed slapo-autogroup to work with slapo-dynlist (ITS#10185)",
                            "        - Fixed smbk5pwd implicit function declaration (ITS#10206)",
                            "      - Documentation",
                            "        - Fixed slapo-memberof exattr requirements (ITS#7400)",
                            "        - Fixed slapo-memberof is no longer deprecated (ITS#7400)",
                            "",
                            "    - d/p/lp2090806...TLS-...timeout-handling: removed",
                            "      [upstream in 2.6.9]",
                            "    - d/p/smbk5pwd-implicit-declaration: removed",
                            "      [upstream in 2.6.8]",
                            "    - d/p/64-bit-time-t-compat: adjust for 2.6.10",
                            "    - d/slapd.{install,manpages}: install new slapo-nestgroup overlay",
                            "      [from 2.6.8+dfsg-1~exp2]",
                            "    - d/slapd.manpages: add slapo-autogroup overlay",
                            "      [from 2.6.8+dfsg-1~exp2]",
                            "  * pbkdf2 iteration configuration support (LP: #2125685)",
                            "    - d/p/lp2125685-pbkdf2-configurable-rounds: make iterations configurable",
                            "    - d/p/lp2125685-pbkdf2-fix-iteration-arg: fix iteration argument index",
                            "    - d/t/pbkdf2-contrib: test if pbkdf2 hashing rounds are adjustable",
                            "  * Enable build of ppm password quality check module (LP: #2121816)",
                            "    - d/rules: build ppm password quality module",
                            "    - d/p/contrib-makefiles: add build adjustment from 2.6.9+dfsg-1~exp1 (#1039740)",
                            "    - d/p/ppm-cross: cross-build patch from 2.6.8+dfsg-1~exp1 (#1079533)",
                            "    - d/t/ppm-contrib: test ppm password quality module",
                            "    - d/control: add build dependency on libcrack2-dev for ppm",
                            "    - d/slapd-contrib.{examples,install,manpages}: add ppm",
                            ""
                        ],
                        "package": "openldap",
                        "version": "2.6.10+dfsg-0ubuntu0.24.04.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2127665,
                            2125685,
                            2121816
                        ],
                        "author": "Jonas Jelten <jonas.jelten@canonical.com>",
                        "date": "Tue, 23 Sep 2025 18:26:39 +0200"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libldap2:riscv64",
                "from_version": {
                    "source_package_name": "openldap",
                    "source_package_version": "2.6.7+dfsg-1~exp1ubuntu8.2",
                    "version": "2.6.7+dfsg-1~exp1ubuntu8.2"
                },
                "to_version": {
                    "source_package_name": "openldap",
                    "source_package_version": "2.6.10+dfsg-0ubuntu0.24.04.1",
                    "version": "2.6.10+dfsg-0ubuntu0.24.04.1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2127665,
                    2125685,
                    2121816
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * New upstream version (LP: #2127665):",
                            "    - 2.6.10:",
                            "      - Added slapd microsecond timestamp format for local logging (ITS#10140)",
                            "      - Fixed libldap ldap_result behavior with LDAP_MSG_RECEIVED (ITS#10229)",
                            "      - Fixed lloadd handling of starttls critical (ITS#10323)",
                            "      - Fixed slapd syncrepl when used with slapo-rwm (ITS#10290)",
                            "      - Fixed slapd regression with certain searches (ITS#10307)",
                            "      - Fixed slapo-autoca olcAutoCAserverClass object (ITS#10288)",
                            "      - Fixed slapo-pcache caching behaviors (ITS#10270)",
                            "",
                            "    - 2.6.9:",
                            "      - Fixed libldap TLS connection timeout handling (ITS#8047)",
                            "      - Fixed libldap GnuTLS incompatible pointer type (ITS#10253)",
                            "      - Fixed libldap OpenSSL set_ciphersuite error handling (ITS#10223)",
                            "      - Fixed libldap to check for OpenSSL EVP_Digest* failure (ITS#10224)",
                            "      - Fixed slapd cn=config disallowed modification of cn=schema (ITS#10256)",
                            "      - Fixed slapd syncrepl assert during refresh at shutdown (ITS#10232)",
                            "      - Fixed slapd syncrepl retry state during refreshDone (ITS#10234)",
                            "      - Fixed slapd-ldap use of multi-precision add for op counters (ITS#10237)",
                            "      - Fixed slapd-mdb idl intersection (ITS#10233)",
                            "      - Fixed slapd-wt idl intersection (ITS#10233)",
                            "      - Fixed slapo-memberof to omit dynamic values (ITS#10230)",
                            "      - Fixed slapo-nestgroup leak in nestgroup_memberFilter (ITS#10249)",
                            "      - Fixed slapo-translucent regression with subordinate databases (ITS#10248)",
                            "      - Fixed slapo-translucent regression when requesting attributes (ITS#10272)",
                            "      - Fixed slappw-argon2 defaults to be more secure (ITS#9827)",
                            "",
                            "    - 2.6.8:",
                            "      - Fixed libldap exit handling with OpenSSL3 again (ITS#9952)",
                            "      - Fixed libldap OpenSSL channel binding digest (ITS#10216)",
                            "      - Fixed slapd handling of large uid/gids peercred auth (ITS#10211)",
                            "      - Fixed slapd-asyncmeta/meta target structure allocations (ITS#10197)",
                            "      - Fixed slapd-meta with dynlist (ITS#10164)",
                            "      - Fixed slapd-meta binds when proxying internal op (ITS#10165)",
                            "      - Added slapo-nestgroup overlay (ITS#10161)",
                            "      - Added slapo-memberof 'addcheck' option (ITS#10167)",
                            "      - Fixed slapo-accesslog startup initialization (ITS#10170)",
                            "      - Fixed slapo-constraint double free on invalid attr (ITS#10204)",
                            "      - Fixed slapo-dynlist with abandoned operations (ITS#10044)",
                            "      - Build",
                            "        - Fixed build with gcc14.x (ITS#10166)",
                            "        - Fixed back-perl with clang15 (ITS#10177)",
                            "        - Fixed to reduce systemd dependencies (ITS#10214)",
                            "      - Contrib",
                            "        - Added slapo-alias contrib module (ITS#10104, ITS#10182)",
                            "        - Fixed slapo-autogroup to work with slapo-dynlist (ITS#10185)",
                            "        - Fixed smbk5pwd implicit function declaration (ITS#10206)",
                            "      - Documentation",
                            "        - Fixed slapo-memberof exattr requirements (ITS#7400)",
                            "        - Fixed slapo-memberof is no longer deprecated (ITS#7400)",
                            "",
                            "    - d/p/lp2090806...TLS-...timeout-handling: removed",
                            "      [upstream in 2.6.9]",
                            "    - d/p/smbk5pwd-implicit-declaration: removed",
                            "      [upstream in 2.6.8]",
                            "    - d/p/64-bit-time-t-compat: adjust for 2.6.10",
                            "    - d/slapd.{install,manpages}: install new slapo-nestgroup overlay",
                            "      [from 2.6.8+dfsg-1~exp2]",
                            "    - d/slapd.manpages: add slapo-autogroup overlay",
                            "      [from 2.6.8+dfsg-1~exp2]",
                            "  * pbkdf2 iteration configuration support (LP: #2125685)",
                            "    - d/p/lp2125685-pbkdf2-configurable-rounds: make iterations configurable",
                            "    - d/p/lp2125685-pbkdf2-fix-iteration-arg: fix iteration argument index",
                            "    - d/t/pbkdf2-contrib: test if pbkdf2 hashing rounds are adjustable",
                            "  * Enable build of ppm password quality check module (LP: #2121816)",
                            "    - d/rules: build ppm password quality module",
                            "    - d/p/contrib-makefiles: add build adjustment from 2.6.9+dfsg-1~exp1 (#1039740)",
                            "    - d/p/ppm-cross: cross-build patch from 2.6.8+dfsg-1~exp1 (#1079533)",
                            "    - d/t/ppm-contrib: test ppm password quality module",
                            "    - d/control: add build dependency on libcrack2-dev for ppm",
                            "    - d/slapd-contrib.{examples,install,manpages}: add ppm",
                            ""
                        ],
                        "package": "openldap",
                        "version": "2.6.10+dfsg-0ubuntu0.24.04.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2127665,
                            2125685,
                            2121816
                        ],
                        "author": "Jonas Jelten <jonas.jelten@canonical.com>",
                        "date": "Tue, 23 Sep 2025 18:26:39 +0200"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libmbim-glib4:riscv64",
                "from_version": {
                    "source_package_name": "libmbim",
                    "source_package_version": "1.31.2-0ubuntu3",
                    "version": "1.31.2-0ubuntu3"
                },
                "to_version": {
                    "source_package_name": "libmbim",
                    "source_package_version": "1.31.2-0ubuntu3.1",
                    "version": "1.31.2-0ubuntu3.1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2121842
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Add Intel mbim service to send AT command (LP: #2121842)",
                            ""
                        ],
                        "package": "libmbim",
                        "version": "1.31.2-0ubuntu3.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2121842
                        ],
                        "author": "Dirk Su <dirk.su@canonical.com>",
                        "date": "Thu, 09 Oct 2025 15:32:21 +0800"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libmbim-proxy",
                "from_version": {
                    "source_package_name": "libmbim",
                    "source_package_version": "1.31.2-0ubuntu3",
                    "version": "1.31.2-0ubuntu3"
                },
                "to_version": {
                    "source_package_name": "libmbim",
                    "source_package_version": "1.31.2-0ubuntu3.1",
                    "version": "1.31.2-0ubuntu3.1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2121842
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Add Intel mbim service to send AT command (LP: #2121842)",
                            ""
                        ],
                        "package": "libmbim",
                        "version": "1.31.2-0ubuntu3.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2121842
                        ],
                        "author": "Dirk Su <dirk.su@canonical.com>",
                        "date": "Thu, 09 Oct 2025 15:32:21 +0800"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libmbim-utils",
                "from_version": {
                    "source_package_name": "libmbim",
                    "source_package_version": "1.31.2-0ubuntu3",
                    "version": "1.31.2-0ubuntu3"
                },
                "to_version": {
                    "source_package_name": "libmbim",
                    "source_package_version": "1.31.2-0ubuntu3.1",
                    "version": "1.31.2-0ubuntu3.1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2121842
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Add Intel mbim service to send AT command (LP: #2121842)",
                            ""
                        ],
                        "package": "libmbim",
                        "version": "1.31.2-0ubuntu3.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2121842
                        ],
                        "author": "Dirk Su <dirk.su@canonical.com>",
                        "date": "Thu, 09 Oct 2025 15:32:21 +0800"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libmount1:riscv64",
                "from_version": {
                    "source_package_name": "util-linux",
                    "source_package_version": "2.39.3-9ubuntu6.3",
                    "version": "2.39.3-9ubuntu6.3"
                },
                "to_version": {
                    "source_package_name": "util-linux",
                    "source_package_version": "2.39.3-9ubuntu6.4",
                    "version": "2.39.3-9ubuntu6.4"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2123886
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Add ARM core support for Vera systems (LP: #2123886)",
                            "    - d/p/ubuntu/lp-2123886-add-missing-arm-cores.patch",
                            ""
                        ],
                        "package": "util-linux",
                        "version": "2.39.3-9ubuntu6.4",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2123886
                        ],
                        "author": "Joao Andre Simioni <joao.simioni@canonical.com>",
                        "date": "Mon, 15 Sep 2025 21:08:02 -0300"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libnss-systemd:riscv64",
                "from_version": {
                    "source_package_name": "systemd",
                    "source_package_version": "255.4-1ubuntu8.11",
                    "version": "255.4-1ubuntu8.11"
                },
                "to_version": {
                    "source_package_name": "systemd",
                    "source_package_version": "255.4-1ubuntu8.12",
                    "version": "255.4-1ubuntu8.12"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2125405,
                    2132666,
                    2130554
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * basic: validate timezones in get_timezones() (LP: #2125405)",
                            "  * ukify: fix insertion of padding in merged sections (LP: #2132666)",
                            "  * core: downgrade a log message from warning to debug (LP: #2130554)",
                            "  * test: skip testcase_multipath_basic_failover.",
                            "    This test has been failing on Ubuntu infrastructure for a long time.",
                            "    Leaving this alone at the moment allows other failures to potentially go",
                            "    unnoticed, because the migration reference baseline has been reset to",
                            "    fail. Skip the test to try and reset the baseline to pass.",
                            "  * d/gbp.conf: stop using wrap_cl.py",
                            ""
                        ],
                        "package": "systemd",
                        "version": "255.4-1ubuntu8.12",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2125405,
                            2132666,
                            2130554
                        ],
                        "author": "Nick Rosbrook <enr0n@ubuntu.com>",
                        "date": "Tue, 25 Nov 2025 13:16:31 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libnuma1:riscv64",
                "from_version": {
                    "source_package_name": "numactl",
                    "source_package_version": "2.0.18-1build1",
                    "version": "2.0.18-1build1"
                },
                "to_version": {
                    "source_package_name": "numactl",
                    "source_package_version": "2.0.18-1ubuntu0.24.04.1",
                    "version": "2.0.18-1ubuntu0.24.04.1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2136104
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * d/p/fix-stray-errno.patch: save and restore errno when probing for",
                            "    SET_PREFERRED_MANY (LP: #2136104)",
                            ""
                        ],
                        "package": "numactl",
                        "version": "2.0.18-1ubuntu0.24.04.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2136104
                        ],
                        "author": "Renan Rodrigo <rr@ubuntu.com>",
                        "date": "Fri, 09 Jan 2026 10:36:33 -0300"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libpam-systemd:riscv64",
                "from_version": {
                    "source_package_name": "systemd",
                    "source_package_version": "255.4-1ubuntu8.11",
                    "version": "255.4-1ubuntu8.11"
                },
                "to_version": {
                    "source_package_name": "systemd",
                    "source_package_version": "255.4-1ubuntu8.12",
                    "version": "255.4-1ubuntu8.12"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2125405,
                    2132666,
                    2130554
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * basic: validate timezones in get_timezones() (LP: #2125405)",
                            "  * ukify: fix insertion of padding in merged sections (LP: #2132666)",
                            "  * core: downgrade a log message from warning to debug (LP: #2130554)",
                            "  * test: skip testcase_multipath_basic_failover.",
                            "    This test has been failing on Ubuntu infrastructure for a long time.",
                            "    Leaving this alone at the moment allows other failures to potentially go",
                            "    unnoticed, because the migration reference baseline has been reset to",
                            "    fail. Skip the test to try and reset the baseline to pass.",
                            "  * d/gbp.conf: stop using wrap_cl.py",
                            ""
                        ],
                        "package": "systemd",
                        "version": "255.4-1ubuntu8.12",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2125405,
                            2132666,
                            2130554
                        ],
                        "author": "Nick Rosbrook <enr0n@ubuntu.com>",
                        "date": "Tue, 25 Nov 2025 13:16:31 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libpng16-16t64:riscv64",
                "from_version": {
                    "source_package_name": "libpng1.6",
                    "source_package_version": "1.6.43-5ubuntu0.1",
                    "version": "1.6.43-5ubuntu0.1"
                },
                "to_version": {
                    "source_package_name": "libpng1.6",
                    "source_package_version": "1.6.43-5ubuntu0.4",
                    "version": "1.6.43-5ubuntu0.4"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-2816",
                        "url": "https://ubuntu.com/security/CVE-2025-2816",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-28162",
                        "url": "https://ubuntu.com/security/CVE-2025-28162",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-28164",
                        "url": "https://ubuntu.com/security/CVE-2025-28164",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-66293",
                        "url": "https://ubuntu.com/security/CVE-2025-66293",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-22695",
                        "url": "https://ubuntu.com/security/CVE-2026-22695",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-22801",
                        "url": "https://ubuntu.com/security/CVE-2026-22801",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-2816",
                                "url": "https://ubuntu.com/security/CVE-2025-2816",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-28162",
                                "url": "https://ubuntu.com/security/CVE-2025-28162",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-28164",
                                "url": "https://ubuntu.com/security/CVE-2025-28164",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: DoS via buffer overflow caused by memory leaks",
                            "    - debian/patches/CVE-2025-2816x.patch: clean up on user/internal errors",
                            "      in contrib/libtests/pngimage.c, pngerror.c.",
                            "    - CVE-2025-28162",
                            "    - CVE-2025-28164",
                            ""
                        ],
                        "package": "libpng1.6",
                        "version": "1.6.43-5ubuntu0.4",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Thu, 29 Jan 2026 11:18:41 -0500"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-66293",
                                "url": "https://ubuntu.com/security/CVE-2025-66293",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-22695",
                                "url": "https://ubuntu.com/security/CVE-2026-22695",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-22801",
                                "url": "https://ubuntu.com/security/CVE-2026-22801",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: OOB in png_image_read_composite",
                            "    - debian/patches/CVE-2025-66293-1.patch: validate component size in",
                            "      pngread.c.",
                            "    - debian/patches/CVE-2025-66293-2.patch: improve fix in pngread.c.",
                            "    - CVE-2025-66293",
                            "  * SECURITY UPDATE: Heap buffer over-read in png_image_read_direct_scaled",
                            "    - debian/patches/CVE-2026-22695.patch: fix memcpy size in pngread.c.",
                            "    - CVE-2026-22695",
                            "  * SECURITY UPDATE: Integer truncation causing heap buffer over-read",
                            "    - debian/patches/CVE-2026-22801.patch: remove incorrect truncation",
                            "      casts in CMakeLists.txt, contrib/libtests/pngstest.c, pngwrite.c,",
                            "      tests/pngstest-large-stride.",
                            "    - CVE-2026-22801",
                            ""
                        ],
                        "package": "libpng1.6",
                        "version": "1.6.43-5ubuntu0.3",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Mon, 12 Jan 2026 13:14:03 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libpython3.12-minimal:riscv64",
                "from_version": {
                    "source_package_name": "python3.12",
                    "source_package_version": "3.12.3-1ubuntu0.9",
                    "version": "3.12.3-1ubuntu0.9"
                },
                "to_version": {
                    "source_package_name": "python3.12",
                    "source_package_version": "3.12.3-1ubuntu0.11",
                    "version": "3.12.3-1ubuntu0.11"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-11468",
                        "url": "https://ubuntu.com/security/CVE-2025-11468",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-12084",
                        "url": "https://ubuntu.com/security/CVE-2025-12084",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-13837",
                        "url": "https://ubuntu.com/security/CVE-2025-13837",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-15282",
                        "url": "https://ubuntu.com/security/CVE-2025-15282",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-15366",
                        "url": "https://ubuntu.com/security/CVE-2025-15366",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-15367",
                        "url": "https://ubuntu.com/security/CVE-2025-15367",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-0672",
                        "url": "https://ubuntu.com/security/CVE-2026-0672",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-0865",
                        "url": "https://ubuntu.com/security/CVE-2026-0865",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-13836",
                        "url": "https://ubuntu.com/security/CVE-2025-13836",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-11468",
                                "url": "https://ubuntu.com/security/CVE-2025-11468",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-12084",
                                "url": "https://ubuntu.com/security/CVE-2025-12084",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-13837",
                                "url": "https://ubuntu.com/security/CVE-2025-13837",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-15282",
                                "url": "https://ubuntu.com/security/CVE-2025-15282",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-15366",
                                "url": "https://ubuntu.com/security/CVE-2025-15366",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-15367",
                                "url": "https://ubuntu.com/security/CVE-2025-15367",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-0672",
                                "url": "https://ubuntu.com/security/CVE-2026-0672",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-0865",
                                "url": "https://ubuntu.com/security/CVE-2026-0865",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Header injection in email messages where addresses are not",
                            "    sanitized.",
                            "    - debian/patches/CVE-2025-11468.patch: Add escape parentheses and backslash",
                            "      in Lib/email/_header_value_parser.py. Add test in",
                            "      Lib/test/test_email/test__header_value_parser.py.",
                            "    - CVE-2025-11468",
                            "  * SECURITY UPDATE: Quadratic algorithm when building excessively nested XML",
                            "    documents.",
                            "    - debian/patches/CVE-2025-12084-*.patch: Remove _in_document and replace",
                            "      with node.ownerDocument in Lib/xml/dom/minidom.py. Set self.ownerDocument",
                            "      to None in Lib/xml/dom/minidom.py. Add test in Lib/test/test_minidom.py.",
                            "    - CVE-2025-12084",
                            "  * SECURITY UPDATE: OOM and denial of service when opening malicious plist",
                            "    file.",
                            "    - debian/patches/CVE-2025-13837.patch: Add _MIN_READ_BUF_SIZE and _read",
                            "      with checks in Lib/plistlib.py. Add test in Lib/test/test_plistlib.py.",
                            "    - CVE-2025-13837",
                            "  * SECURITY UPDATE: Header injection in user controlled data URLs in urllib.",
                            "    - debian/patches/CVE-2025-15282.patch: Add control character checks in",
                            "      Lib/urllib/request.py. Add test in Lib/test/test_urllib.py.",
                            "  * SECURITY UPDATE: Command injection through user controlled commands in",
                            "    imaplib.",
                            "    - debian/patches/CVE-2025-15366.patch: Add _control_chars and checks in",
                            "      Lib/imaplib.py. Add test in Lib/test/test_imaplib.py.",
                            "  * SECURITY UPDATE: Command injection through user controlled commands in",
                            "    poplib.",
                            "    - debian/patches/CVE-2025-15367.patch: Add control character regex check",
                            "      in Lib/poplib.py. Add test in Lib/test/test_poplib.py.",
                            "    - CVE-2025-15367",
                            "  * SECURITY UPDATE: HTTP header injection in user controlled cookie values.",
                            "    - debian/patches/CVE-2026-0672.patch: Add _control_characters_re and",
                            "      checks in Lib/http/cookies.py. Add test in Lib/test/test_http_cookies.py.",
                            "    - CVE-2026-0672",
                            "  * SECURITY UPDATE: HTTP header injection in user controlled headers and",
                            "    values with newlines.",
                            "    - debian/patches/CVE-2026-0865.patch: Add _control_chars_re and check in",
                            "      Lib/wsgiref/headers.py. Add test in Lib/test/support/__init__.py and",
                            "      Lib/test/test_wsgiref.py.",
                            "    - CVE-2026-0865",
                            ""
                        ],
                        "package": "python3.12",
                        "version": "3.12.3-1ubuntu0.11",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com>",
                        "date": "Thu, 22 Jan 2026 17:27:42 -0330"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-13836",
                                "url": "https://ubuntu.com/security/CVE-2025-13836",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: HTTP Content-Length denial of service",
                            "    - debian/patches/CVE-2025-13836.patch: Read large data in chunks with",
                            "      geometric reads in Lib/http/client.py and add tests in ",
                            "      Lib/test/test_httplib.py",
                            "    - CVE-2025-13836",
                            ""
                        ],
                        "package": "python3.12",
                        "version": "3.12.3-1ubuntu0.10",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Vyom Yadav <vyom.yadav@canonical.com>",
                        "date": "Thu, 08 Jan 2026 17:00:50 +0530"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libpython3.12-stdlib:riscv64",
                "from_version": {
                    "source_package_name": "python3.12",
                    "source_package_version": "3.12.3-1ubuntu0.9",
                    "version": "3.12.3-1ubuntu0.9"
                },
                "to_version": {
                    "source_package_name": "python3.12",
                    "source_package_version": "3.12.3-1ubuntu0.11",
                    "version": "3.12.3-1ubuntu0.11"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-11468",
                        "url": "https://ubuntu.com/security/CVE-2025-11468",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-12084",
                        "url": "https://ubuntu.com/security/CVE-2025-12084",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-13837",
                        "url": "https://ubuntu.com/security/CVE-2025-13837",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-15282",
                        "url": "https://ubuntu.com/security/CVE-2025-15282",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-15366",
                        "url": "https://ubuntu.com/security/CVE-2025-15366",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-15367",
                        "url": "https://ubuntu.com/security/CVE-2025-15367",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-0672",
                        "url": "https://ubuntu.com/security/CVE-2026-0672",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-0865",
                        "url": "https://ubuntu.com/security/CVE-2026-0865",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-13836",
                        "url": "https://ubuntu.com/security/CVE-2025-13836",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-11468",
                                "url": "https://ubuntu.com/security/CVE-2025-11468",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-12084",
                                "url": "https://ubuntu.com/security/CVE-2025-12084",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-13837",
                                "url": "https://ubuntu.com/security/CVE-2025-13837",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-15282",
                                "url": "https://ubuntu.com/security/CVE-2025-15282",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-15366",
                                "url": "https://ubuntu.com/security/CVE-2025-15366",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-15367",
                                "url": "https://ubuntu.com/security/CVE-2025-15367",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-0672",
                                "url": "https://ubuntu.com/security/CVE-2026-0672",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-0865",
                                "url": "https://ubuntu.com/security/CVE-2026-0865",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Header injection in email messages where addresses are not",
                            "    sanitized.",
                            "    - debian/patches/CVE-2025-11468.patch: Add escape parentheses and backslash",
                            "      in Lib/email/_header_value_parser.py. Add test in",
                            "      Lib/test/test_email/test__header_value_parser.py.",
                            "    - CVE-2025-11468",
                            "  * SECURITY UPDATE: Quadratic algorithm when building excessively nested XML",
                            "    documents.",
                            "    - debian/patches/CVE-2025-12084-*.patch: Remove _in_document and replace",
                            "      with node.ownerDocument in Lib/xml/dom/minidom.py. Set self.ownerDocument",
                            "      to None in Lib/xml/dom/minidom.py. Add test in Lib/test/test_minidom.py.",
                            "    - CVE-2025-12084",
                            "  * SECURITY UPDATE: OOM and denial of service when opening malicious plist",
                            "    file.",
                            "    - debian/patches/CVE-2025-13837.patch: Add _MIN_READ_BUF_SIZE and _read",
                            "      with checks in Lib/plistlib.py. Add test in Lib/test/test_plistlib.py.",
                            "    - CVE-2025-13837",
                            "  * SECURITY UPDATE: Header injection in user controlled data URLs in urllib.",
                            "    - debian/patches/CVE-2025-15282.patch: Add control character checks in",
                            "      Lib/urllib/request.py. Add test in Lib/test/test_urllib.py.",
                            "  * SECURITY UPDATE: Command injection through user controlled commands in",
                            "    imaplib.",
                            "    - debian/patches/CVE-2025-15366.patch: Add _control_chars and checks in",
                            "      Lib/imaplib.py. Add test in Lib/test/test_imaplib.py.",
                            "  * SECURITY UPDATE: Command injection through user controlled commands in",
                            "    poplib.",
                            "    - debian/patches/CVE-2025-15367.patch: Add control character regex check",
                            "      in Lib/poplib.py. Add test in Lib/test/test_poplib.py.",
                            "    - CVE-2025-15367",
                            "  * SECURITY UPDATE: HTTP header injection in user controlled cookie values.",
                            "    - debian/patches/CVE-2026-0672.patch: Add _control_characters_re and",
                            "      checks in Lib/http/cookies.py. Add test in Lib/test/test_http_cookies.py.",
                            "    - CVE-2026-0672",
                            "  * SECURITY UPDATE: HTTP header injection in user controlled headers and",
                            "    values with newlines.",
                            "    - debian/patches/CVE-2026-0865.patch: Add _control_chars_re and check in",
                            "      Lib/wsgiref/headers.py. Add test in Lib/test/support/__init__.py and",
                            "      Lib/test/test_wsgiref.py.",
                            "    - CVE-2026-0865",
                            ""
                        ],
                        "package": "python3.12",
                        "version": "3.12.3-1ubuntu0.11",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com>",
                        "date": "Thu, 22 Jan 2026 17:27:42 -0330"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-13836",
                                "url": "https://ubuntu.com/security/CVE-2025-13836",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: HTTP Content-Length denial of service",
                            "    - debian/patches/CVE-2025-13836.patch: Read large data in chunks with",
                            "      geometric reads in Lib/http/client.py and add tests in ",
                            "      Lib/test/test_httplib.py",
                            "    - CVE-2025-13836",
                            ""
                        ],
                        "package": "python3.12",
                        "version": "3.12.3-1ubuntu0.10",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Vyom Yadav <vyom.yadav@canonical.com>",
                        "date": "Thu, 08 Jan 2026 17:00:50 +0530"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libpython3.12t64:riscv64",
                "from_version": {
                    "source_package_name": "python3.12",
                    "source_package_version": "3.12.3-1ubuntu0.9",
                    "version": "3.12.3-1ubuntu0.9"
                },
                "to_version": {
                    "source_package_name": "python3.12",
                    "source_package_version": "3.12.3-1ubuntu0.11",
                    "version": "3.12.3-1ubuntu0.11"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-11468",
                        "url": "https://ubuntu.com/security/CVE-2025-11468",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-12084",
                        "url": "https://ubuntu.com/security/CVE-2025-12084",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-13837",
                        "url": "https://ubuntu.com/security/CVE-2025-13837",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-15282",
                        "url": "https://ubuntu.com/security/CVE-2025-15282",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-15366",
                        "url": "https://ubuntu.com/security/CVE-2025-15366",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-15367",
                        "url": "https://ubuntu.com/security/CVE-2025-15367",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-0672",
                        "url": "https://ubuntu.com/security/CVE-2026-0672",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-0865",
                        "url": "https://ubuntu.com/security/CVE-2026-0865",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-13836",
                        "url": "https://ubuntu.com/security/CVE-2025-13836",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-11468",
                                "url": "https://ubuntu.com/security/CVE-2025-11468",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-12084",
                                "url": "https://ubuntu.com/security/CVE-2025-12084",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-13837",
                                "url": "https://ubuntu.com/security/CVE-2025-13837",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-15282",
                                "url": "https://ubuntu.com/security/CVE-2025-15282",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-15366",
                                "url": "https://ubuntu.com/security/CVE-2025-15366",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-15367",
                                "url": "https://ubuntu.com/security/CVE-2025-15367",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-0672",
                                "url": "https://ubuntu.com/security/CVE-2026-0672",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-0865",
                                "url": "https://ubuntu.com/security/CVE-2026-0865",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Header injection in email messages where addresses are not",
                            "    sanitized.",
                            "    - debian/patches/CVE-2025-11468.patch: Add escape parentheses and backslash",
                            "      in Lib/email/_header_value_parser.py. Add test in",
                            "      Lib/test/test_email/test__header_value_parser.py.",
                            "    - CVE-2025-11468",
                            "  * SECURITY UPDATE: Quadratic algorithm when building excessively nested XML",
                            "    documents.",
                            "    - debian/patches/CVE-2025-12084-*.patch: Remove _in_document and replace",
                            "      with node.ownerDocument in Lib/xml/dom/minidom.py. Set self.ownerDocument",
                            "      to None in Lib/xml/dom/minidom.py. Add test in Lib/test/test_minidom.py.",
                            "    - CVE-2025-12084",
                            "  * SECURITY UPDATE: OOM and denial of service when opening malicious plist",
                            "    file.",
                            "    - debian/patches/CVE-2025-13837.patch: Add _MIN_READ_BUF_SIZE and _read",
                            "      with checks in Lib/plistlib.py. Add test in Lib/test/test_plistlib.py.",
                            "    - CVE-2025-13837",
                            "  * SECURITY UPDATE: Header injection in user controlled data URLs in urllib.",
                            "    - debian/patches/CVE-2025-15282.patch: Add control character checks in",
                            "      Lib/urllib/request.py. Add test in Lib/test/test_urllib.py.",
                            "  * SECURITY UPDATE: Command injection through user controlled commands in",
                            "    imaplib.",
                            "    - debian/patches/CVE-2025-15366.patch: Add _control_chars and checks in",
                            "      Lib/imaplib.py. Add test in Lib/test/test_imaplib.py.",
                            "  * SECURITY UPDATE: Command injection through user controlled commands in",
                            "    poplib.",
                            "    - debian/patches/CVE-2025-15367.patch: Add control character regex check",
                            "      in Lib/poplib.py. Add test in Lib/test/test_poplib.py.",
                            "    - CVE-2025-15367",
                            "  * SECURITY UPDATE: HTTP header injection in user controlled cookie values.",
                            "    - debian/patches/CVE-2026-0672.patch: Add _control_characters_re and",
                            "      checks in Lib/http/cookies.py. Add test in Lib/test/test_http_cookies.py.",
                            "    - CVE-2026-0672",
                            "  * SECURITY UPDATE: HTTP header injection in user controlled headers and",
                            "    values with newlines.",
                            "    - debian/patches/CVE-2026-0865.patch: Add _control_chars_re and check in",
                            "      Lib/wsgiref/headers.py. Add test in Lib/test/support/__init__.py and",
                            "      Lib/test/test_wsgiref.py.",
                            "    - CVE-2026-0865",
                            ""
                        ],
                        "package": "python3.12",
                        "version": "3.12.3-1ubuntu0.11",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com>",
                        "date": "Thu, 22 Jan 2026 17:27:42 -0330"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-13836",
                                "url": "https://ubuntu.com/security/CVE-2025-13836",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: HTTP Content-Length denial of service",
                            "    - debian/patches/CVE-2025-13836.patch: Read large data in chunks with",
                            "      geometric reads in Lib/http/client.py and add tests in ",
                            "      Lib/test/test_httplib.py",
                            "    - CVE-2025-13836",
                            ""
                        ],
                        "package": "python3.12",
                        "version": "3.12.3-1ubuntu0.10",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Vyom Yadav <vyom.yadav@canonical.com>",
                        "date": "Thu, 08 Jan 2026 17:00:50 +0530"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libsmartcols1:riscv64",
                "from_version": {
                    "source_package_name": "util-linux",
                    "source_package_version": "2.39.3-9ubuntu6.3",
                    "version": "2.39.3-9ubuntu6.3"
                },
                "to_version": {
                    "source_package_name": "util-linux",
                    "source_package_version": "2.39.3-9ubuntu6.4",
                    "version": "2.39.3-9ubuntu6.4"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2123886
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Add ARM core support for Vera systems (LP: #2123886)",
                            "    - d/p/ubuntu/lp-2123886-add-missing-arm-cores.patch",
                            ""
                        ],
                        "package": "util-linux",
                        "version": "2.39.3-9ubuntu6.4",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2123886
                        ],
                        "author": "Joao Andre Simioni <joao.simioni@canonical.com>",
                        "date": "Mon, 15 Sep 2025 21:08:02 -0300"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libsodium23:riscv64",
                "from_version": {
                    "source_package_name": "libsodium",
                    "source_package_version": "1.0.18-1build3",
                    "version": "1.0.18-1build3"
                },
                "to_version": {
                    "source_package_name": "libsodium",
                    "source_package_version": "1.0.18-1ubuntu0.24.04.1",
                    "version": "1.0.18-1ubuntu0.24.04.1"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-69277",
                        "url": "https://ubuntu.com/security/CVE-2025-69277",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-69277",
                                "url": "https://ubuntu.com/security/CVE-2025-69277",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: mishandled check in crypto_core_ed25519_is_valid_point",
                            "    - debian/patches/CVE-2025-69277.patch: check Y==Z in addition to X==0",
                            "      in src/libsodium/crypto_core/ed25519/ref10/ed25519_ref10.c,",
                            "      test/default/core_ed25519.c.",
                            "    - CVE-2025-69277",
                            ""
                        ],
                        "package": "libsodium",
                        "version": "1.0.18-1ubuntu0.24.04.1",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Tue, 06 Jan 2026 11:06:40 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libssl3t64:riscv64",
                "from_version": {
                    "source_package_name": "openssl",
                    "source_package_version": "3.0.13-0ubuntu3.6",
                    "version": "3.0.13-0ubuntu3.6"
                },
                "to_version": {
                    "source_package_name": "openssl",
                    "source_package_version": "3.0.13-0ubuntu3.7",
                    "version": "3.0.13-0ubuntu3.7"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-15467",
                        "url": "https://ubuntu.com/security/CVE-2025-15467",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68160",
                        "url": "https://ubuntu.com/security/CVE-2025-68160",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-69418",
                        "url": "https://ubuntu.com/security/CVE-2025-69418",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-69419",
                        "url": "https://ubuntu.com/security/CVE-2025-69419",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-69420",
                        "url": "https://ubuntu.com/security/CVE-2025-69420",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-69421",
                        "url": "https://ubuntu.com/security/CVE-2025-69421",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-2279",
                        "url": "https://ubuntu.com/security/CVE-2026-2279",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-22795",
                        "url": "https://ubuntu.com/security/CVE-2026-22795",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-22796",
                        "url": "https://ubuntu.com/security/CVE-2026-22796",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-15467",
                                "url": "https://ubuntu.com/security/CVE-2025-15467",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68160",
                                "url": "https://ubuntu.com/security/CVE-2025-68160",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-69418",
                                "url": "https://ubuntu.com/security/CVE-2025-69418",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-69419",
                                "url": "https://ubuntu.com/security/CVE-2025-69419",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-69420",
                                "url": "https://ubuntu.com/security/CVE-2025-69420",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-69421",
                                "url": "https://ubuntu.com/security/CVE-2025-69421",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-2279",
                                "url": "https://ubuntu.com/security/CVE-2026-2279",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-22795",
                                "url": "https://ubuntu.com/security/CVE-2026-22795",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-22796",
                                "url": "https://ubuntu.com/security/CVE-2026-22796",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Stack buffer overflow in CMS AuthEnvelopedData parsing",
                            "    - debian/patches/CVE-2025-15467-1.patch: correct handling of",
                            "      AEAD-encrypted CMS with inadmissibly long IV in crypto/evp/evp_lib.c.",
                            "    - debian/patches/CVE-2025-15467-2.patch: some comments to clarify",
                            "      functions usage in crypto/asn1/evp_asn1.c.",
                            "    - debian/patches/CVE-2025-15467-3.patch: test for handling of",
                            "      AEAD-encrypted CMS with inadmissibly long IV in test/cmsapitest.c,",
                            "      test/recipes/80-test_cmsapi.t,",
                            "      test/recipes/80-test_cmsapi_data/encDataWithTooLongIV.pem.",
                            "    - CVE-2025-15467",
                            "  * SECURITY UPDATE: Heap out-of-bounds write in BIO_f_linebuffer on short",
                            "    writes",
                            "    - debian/patches/CVE-2025-68160.patch: fix heap buffer overflow in",
                            "      BIO_f_linebuffer in crypto/bio/bf_lbuf.c.",
                            "    - CVE-2025-68160",
                            "  * SECURITY UPDATE: Unauthenticated/unencrypted trailing bytes with",
                            "    low-level OCB function calls",
                            "    - debian/patches/CVE-2025-69418.patch: fix OCB AES-NI/HW stream path",
                            "      unauthenticated/unencrypted trailing bytes in crypto/modes/ocb128.c.",
                            "    - CVE-2025-69418",
                            "  * SECURITY UPDATE: Out of bounds write in PKCS12_get_friendlyname() UTF-8",
                            "    conversion",
                            "    - debian/patches/CVE-2025-69419.patch: check return code of UTF8_putc",
                            "      in crypto/asn1/a_strex.c, crypto/pkcs12/p12_utl.c.",
                            "    - CVE-2025-69419",
                            "  * SECURITY UPDATE: Missing ASN1_TYPE validation in",
                            "    TS_RESP_verify_response() function",
                            "    - debian/patches/CVE-2025-69420.patch: verify ASN1 object's types",
                            "      before attempting to access them as a particular type in",
                            "      crypto/ts/ts_rsp_verify.c.",
                            "    - CVE-2025-69420",
                            "  * SECURITY UPDATE: NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex",
                            "    - debian/patches/CVE-2025-69421.patch: add NULL check in",
                            "      crypto/pkcs12/p12_decr.c.",
                            "    - CVE-2025-69421",
                            "  * SECURITY UPDATE: ASN1_TYPE missing validation and type confusion",
                            "    - debian/patches/CVE-2026-2279x.patch: ensure ASN1 types are checked",
                            "      before use in apps/s_client.c, crypto/pkcs12/p12_kiss.c,",
                            "      crypto/pkcs7/pk7_doit.c.",
                            "    - CVE-2026-22795",
                            "    - CVE-2026-22796",
                            ""
                        ],
                        "package": "openssl",
                        "version": "3.0.13-0ubuntu3.7",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Mon, 26 Jan 2026 07:31:31 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libsystemd-shared:riscv64",
                "from_version": {
                    "source_package_name": "systemd",
                    "source_package_version": "255.4-1ubuntu8.11",
                    "version": "255.4-1ubuntu8.11"
                },
                "to_version": {
                    "source_package_name": "systemd",
                    "source_package_version": "255.4-1ubuntu8.12",
                    "version": "255.4-1ubuntu8.12"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2125405,
                    2132666,
                    2130554
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * basic: validate timezones in get_timezones() (LP: #2125405)",
                            "  * ukify: fix insertion of padding in merged sections (LP: #2132666)",
                            "  * core: downgrade a log message from warning to debug (LP: #2130554)",
                            "  * test: skip testcase_multipath_basic_failover.",
                            "    This test has been failing on Ubuntu infrastructure for a long time.",
                            "    Leaving this alone at the moment allows other failures to potentially go",
                            "    unnoticed, because the migration reference baseline has been reset to",
                            "    fail. Skip the test to try and reset the baseline to pass.",
                            "  * d/gbp.conf: stop using wrap_cl.py",
                            ""
                        ],
                        "package": "systemd",
                        "version": "255.4-1ubuntu8.12",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2125405,
                            2132666,
                            2130554
                        ],
                        "author": "Nick Rosbrook <enr0n@ubuntu.com>",
                        "date": "Tue, 25 Nov 2025 13:16:31 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libsystemd0:riscv64",
                "from_version": {
                    "source_package_name": "systemd",
                    "source_package_version": "255.4-1ubuntu8.11",
                    "version": "255.4-1ubuntu8.11"
                },
                "to_version": {
                    "source_package_name": "systemd",
                    "source_package_version": "255.4-1ubuntu8.12",
                    "version": "255.4-1ubuntu8.12"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2125405,
                    2132666,
                    2130554
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * basic: validate timezones in get_timezones() (LP: #2125405)",
                            "  * ukify: fix insertion of padding in merged sections (LP: #2132666)",
                            "  * core: downgrade a log message from warning to debug (LP: #2130554)",
                            "  * test: skip testcase_multipath_basic_failover.",
                            "    This test has been failing on Ubuntu infrastructure for a long time.",
                            "    Leaving this alone at the moment allows other failures to potentially go",
                            "    unnoticed, because the migration reference baseline has been reset to",
                            "    fail. Skip the test to try and reset the baseline to pass.",
                            "  * d/gbp.conf: stop using wrap_cl.py",
                            ""
                        ],
                        "package": "systemd",
                        "version": "255.4-1ubuntu8.12",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2125405,
                            2132666,
                            2130554
                        ],
                        "author": "Nick Rosbrook <enr0n@ubuntu.com>",
                        "date": "Tue, 25 Nov 2025 13:16:31 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libtasn1-6:riscv64",
                "from_version": {
                    "source_package_name": "libtasn1-6",
                    "source_package_version": "4.19.0-3ubuntu0.24.04.1",
                    "version": "4.19.0-3ubuntu0.24.04.1"
                },
                "to_version": {
                    "source_package_name": "libtasn1-6",
                    "source_package_version": "4.19.0-3ubuntu0.24.04.2",
                    "version": "4.19.0-3ubuntu0.24.04.2"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-13151",
                        "url": "https://ubuntu.com/security/CVE-2025-13151",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-13151",
                                "url": "https://ubuntu.com/security/CVE-2025-13151",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Stack-based buffer overflow",
                            "    - debian/patches/CVE-2025-13151.patch: fix asn1_expand_octet_string",
                            "      buffer size in lib/decoding.c.",
                            "    - CVE-2025-13151",
                            ""
                        ],
                        "package": "libtasn1-6",
                        "version": "4.19.0-3ubuntu0.24.04.2",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Thu, 08 Jan 2026 12:24:41 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libudev1:riscv64",
                "from_version": {
                    "source_package_name": "systemd",
                    "source_package_version": "255.4-1ubuntu8.11",
                    "version": "255.4-1ubuntu8.11"
                },
                "to_version": {
                    "source_package_name": "systemd",
                    "source_package_version": "255.4-1ubuntu8.12",
                    "version": "255.4-1ubuntu8.12"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2125405,
                    2132666,
                    2130554
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * basic: validate timezones in get_timezones() (LP: #2125405)",
                            "  * ukify: fix insertion of padding in merged sections (LP: #2132666)",
                            "  * core: downgrade a log message from warning to debug (LP: #2130554)",
                            "  * test: skip testcase_multipath_basic_failover.",
                            "    This test has been failing on Ubuntu infrastructure for a long time.",
                            "    Leaving this alone at the moment allows other failures to potentially go",
                            "    unnoticed, because the migration reference baseline has been reset to",
                            "    fail. Skip the test to try and reset the baseline to pass.",
                            "  * d/gbp.conf: stop using wrap_cl.py",
                            ""
                        ],
                        "package": "systemd",
                        "version": "255.4-1ubuntu8.12",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2125405,
                            2132666,
                            2130554
                        ],
                        "author": "Nick Rosbrook <enr0n@ubuntu.com>",
                        "date": "Tue, 25 Nov 2025 13:16:31 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libuuid1:riscv64",
                "from_version": {
                    "source_package_name": "util-linux",
                    "source_package_version": "2.39.3-9ubuntu6.3",
                    "version": "2.39.3-9ubuntu6.3"
                },
                "to_version": {
                    "source_package_name": "util-linux",
                    "source_package_version": "2.39.3-9ubuntu6.4",
                    "version": "2.39.3-9ubuntu6.4"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2123886
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Add ARM core support for Vera systems (LP: #2123886)",
                            "    - d/p/ubuntu/lp-2123886-add-missing-arm-cores.patch",
                            ""
                        ],
                        "package": "util-linux",
                        "version": "2.39.3-9ubuntu6.4",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2123886
                        ],
                        "author": "Joao Andre Simioni <joao.simioni@canonical.com>",
                        "date": "Mon, 15 Sep 2025 21:08:02 -0300"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libxml2:riscv64",
                "from_version": {
                    "source_package_name": "libxml2",
                    "source_package_version": "2.9.14+dfsg-1.3ubuntu3.6",
                    "version": "2.9.14+dfsg-1.3ubuntu3.6"
                },
                "to_version": {
                    "source_package_name": "libxml2",
                    "source_package_version": "2.9.14+dfsg-1.3ubuntu3.7",
                    "version": "2.9.14+dfsg-1.3ubuntu3.7"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-8732",
                        "url": "https://ubuntu.com/security/CVE-2025-8732",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-0989",
                        "url": "https://ubuntu.com/security/CVE-2026-0989",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-0990",
                        "url": "https://ubuntu.com/security/CVE-2026-0990",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-0992",
                        "url": "https://ubuntu.com/security/CVE-2026-0992",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-8732",
                                "url": "https://ubuntu.com/security/CVE-2025-8732",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-0989",
                                "url": "https://ubuntu.com/security/CVE-2026-0989",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-0990",
                                "url": "https://ubuntu.com/security/CVE-2026-0990",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-0992",
                                "url": "https://ubuntu.com/security/CVE-2026-0992",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Infinite recursion with SGML catalogs.",
                            "    - debian/patches/CVE-2025-8732.patch: Add catalog depth and checks in",
                            "      catalog.c. Add test files in result/catalogs/recursive and",
                            "      test/catalogs/recursive.sgml.",
                            "    - CVE-2025-8732",
                            "  * SECURITY UPDATE: Infinite recursion when resolving include directives in",
                            "    RelaxNG parser.",
                            "    - debian/patches/CVE-2026-0989.patch: Add xmlRelaxParserSetIncLImit in",
                            "      include/libxml/relaxng.h. Add include limit and checks in relaxng.c. Add",
                            "      test and test files in runtest.c,",
                            "      test/relaxng/include/include-limit.rng,",
                            "      test/relaxng/include/include-limit_1.rng,",
                            "      test/relaxng/include/include-limit_2.rng, and",
                            "      test/relaxng/include/include-limit_3.rng.",
                            "    - debian/libxml2.symbols: Add new xmlRelaxParserSetIncLImit symbol.",
                            "    - CVE-2026-0989",
                            "  * SECURITY UPDATE: Infinite recursion in URI dereferencing.",
                            "    - debian/patches/CVE-2026-0990.patch: Add MAX_CATAL_DEPTH and other checks",
                            "      in catalog.c.",
                            "    - CVE-2026-0990",
                            "  * SECURITY UPDATE: Uncontrolled resource consumption in catalogs.",
                            "    - debian/patches/CVE-2026-0992.patch: Add catalog duplication checks in",
                            "      catalog.c.",
                            "    - CVE-2026-0992",
                            ""
                        ],
                        "package": "libxml2",
                        "version": "2.9.14+dfsg-1.3ubuntu3.7",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com>",
                        "date": "Wed, 21 Jan 2026 12:24:26 -0330"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-headers-generic",
                "from_version": {
                    "source_package_name": "linux-meta-riscv-6.14",
                    "source_package_version": "6.14.0-37.37.1~24.04.1",
                    "version": "6.14.0-37.37.1~24.04.1"
                },
                "to_version": {
                    "source_package_name": "linux-meta-riscv-6.17",
                    "source_package_version": "6.17.0-14.14.1~24.04.1",
                    "version": "6.17.0-14.14.1~24.04.1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    1786013
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Main version: 6.17.0-14.14.1~24.04.1",
                            ""
                        ],
                        "package": "linux-meta-riscv-6.17",
                        "version": "6.17.0-14.14.1~24.04.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [],
                        "author": "Emil Renner Berthing <emil.renner.berthing@canonical.com>",
                        "date": "Tue, 27 Jan 2026 21:16:13 +0100"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Main version: 6.17.0-9.9.1~24.04.1",
                            "",
                            "  * Packaging resync (LP: #1786013)",
                            "    - [Packaging] debian/dkms-versions -- resync from main package",
                            ""
                        ],
                        "package": "linux-meta-riscv-6.17",
                        "version": "6.17.0-9.9.1~24.04.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            1786013
                        ],
                        "author": "Emil Renner Berthing <emil.renner.berthing@canonical.com>",
                        "date": "Wed, 14 Jan 2026 14:23:47 +0100"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Main version: 6.17.0-9.9.1~24.04.0",
                            ""
                        ],
                        "package": "linux-meta-riscv-6.17",
                        "version": "6.17.0-9.9.1~24.04.0",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [],
                        "author": "Emil Renner Berthing <emil.renner.berthing@canonical.com>",
                        "date": "Wed, 14 Jan 2026 14:21:00 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-headers-virtual",
                "from_version": {
                    "source_package_name": "linux-meta-riscv-6.14",
                    "source_package_version": "6.14.0-37.37.1~24.04.1",
                    "version": "6.14.0-37.37.1~24.04.1"
                },
                "to_version": {
                    "source_package_name": "linux-meta-riscv-6.17",
                    "source_package_version": "6.17.0-14.14.1~24.04.1",
                    "version": "6.17.0-14.14.1~24.04.1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    1786013
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Main version: 6.17.0-14.14.1~24.04.1",
                            ""
                        ],
                        "package": "linux-meta-riscv-6.17",
                        "version": "6.17.0-14.14.1~24.04.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [],
                        "author": "Emil Renner Berthing <emil.renner.berthing@canonical.com>",
                        "date": "Tue, 27 Jan 2026 21:16:13 +0100"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Main version: 6.17.0-9.9.1~24.04.1",
                            "",
                            "  * Packaging resync (LP: #1786013)",
                            "    - [Packaging] debian/dkms-versions -- resync from main package",
                            ""
                        ],
                        "package": "linux-meta-riscv-6.17",
                        "version": "6.17.0-9.9.1~24.04.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            1786013
                        ],
                        "author": "Emil Renner Berthing <emil.renner.berthing@canonical.com>",
                        "date": "Wed, 14 Jan 2026 14:23:47 +0100"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Main version: 6.17.0-9.9.1~24.04.0",
                            ""
                        ],
                        "package": "linux-meta-riscv-6.17",
                        "version": "6.17.0-9.9.1~24.04.0",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [],
                        "author": "Emil Renner Berthing <emil.renner.berthing@canonical.com>",
                        "date": "Wed, 14 Jan 2026 14:21:00 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-image-virtual",
                "from_version": {
                    "source_package_name": "linux-meta-riscv-6.14",
                    "source_package_version": "6.14.0-37.37.1~24.04.1",
                    "version": "6.14.0-37.37.1~24.04.1"
                },
                "to_version": {
                    "source_package_name": "linux-meta-riscv-6.17",
                    "source_package_version": "6.17.0-14.14.1~24.04.1",
                    "version": "6.17.0-14.14.1~24.04.1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    1786013
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Main version: 6.17.0-14.14.1~24.04.1",
                            ""
                        ],
                        "package": "linux-meta-riscv-6.17",
                        "version": "6.17.0-14.14.1~24.04.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [],
                        "author": "Emil Renner Berthing <emil.renner.berthing@canonical.com>",
                        "date": "Tue, 27 Jan 2026 21:16:13 +0100"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Main version: 6.17.0-9.9.1~24.04.1",
                            "",
                            "  * Packaging resync (LP: #1786013)",
                            "    - [Packaging] debian/dkms-versions -- resync from main package",
                            ""
                        ],
                        "package": "linux-meta-riscv-6.17",
                        "version": "6.17.0-9.9.1~24.04.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            1786013
                        ],
                        "author": "Emil Renner Berthing <emil.renner.berthing@canonical.com>",
                        "date": "Wed, 14 Jan 2026 14:23:47 +0100"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Main version: 6.17.0-9.9.1~24.04.0",
                            ""
                        ],
                        "package": "linux-meta-riscv-6.17",
                        "version": "6.17.0-9.9.1~24.04.0",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [],
                        "author": "Emil Renner Berthing <emil.renner.berthing@canonical.com>",
                        "date": "Wed, 14 Jan 2026 14:21:00 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-libc-dev:riscv64",
                "from_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.8.0-90.91",
                    "version": "6.8.0-90.91"
                },
                "to_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.8.0-100.100",
                    "version": "6.8.0-100.100"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-39779",
                        "url": "https://ubuntu.com/security/CVE-2025-39779",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39759",
                        "url": "https://ubuntu.com/security/CVE-2025-39759",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39705",
                        "url": "https://ubuntu.com/security/CVE-2025-39705",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39707",
                        "url": "https://ubuntu.com/security/CVE-2025-39707",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39712",
                        "url": "https://ubuntu.com/security/CVE-2025-39712",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38686",
                        "url": "https://ubuntu.com/security/CVE-2025-38686",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38703",
                        "url": "https://ubuntu.com/security/CVE-2025-38703",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39746",
                        "url": "https://ubuntu.com/security/CVE-2025-39746",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39747",
                        "url": "https://ubuntu.com/security/CVE-2025-39747",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38704",
                        "url": "https://ubuntu.com/security/CVE-2025-38704",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39748",
                        "url": "https://ubuntu.com/security/CVE-2025-39748",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38705",
                        "url": "https://ubuntu.com/security/CVE-2025-38705",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38710",
                        "url": "https://ubuntu.com/security/CVE-2025-38710",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38722",
                        "url": "https://ubuntu.com/security/CVE-2025-38722",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38732",
                        "url": "https://ubuntu.com/security/CVE-2025-38732",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39766",
                        "url": "https://ubuntu.com/security/CVE-2025-39766",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38734",
                        "url": "https://ubuntu.com/security/CVE-2025-38734",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38735",
                        "url": "https://ubuntu.com/security/CVE-2025-38735",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39673",
                        "url": "https://ubuntu.com/security/CVE-2025-39673",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39770",
                        "url": "https://ubuntu.com/security/CVE-2025-39770",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39675",
                        "url": "https://ubuntu.com/security/CVE-2025-39675",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39772",
                        "url": "https://ubuntu.com/security/CVE-2025-39772",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38676",
                        "url": "https://ubuntu.com/security/CVE-2025-38676",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39676",
                        "url": "https://ubuntu.com/security/CVE-2025-39676",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39773",
                        "url": "https://ubuntu.com/security/CVE-2025-39773",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39679",
                        "url": "https://ubuntu.com/security/CVE-2025-39679",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39681",
                        "url": "https://ubuntu.com/security/CVE-2025-39681",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39687",
                        "url": "https://ubuntu.com/security/CVE-2025-39687",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39683",
                        "url": "https://ubuntu.com/security/CVE-2025-39683",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39801",
                        "url": "https://ubuntu.com/security/CVE-2025-39801",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39684",
                        "url": "https://ubuntu.com/security/CVE-2025-39684",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39685",
                        "url": "https://ubuntu.com/security/CVE-2025-39685",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39686",
                        "url": "https://ubuntu.com/security/CVE-2025-39686",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39689",
                        "url": "https://ubuntu.com/security/CVE-2025-39689",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39691",
                        "url": "https://ubuntu.com/security/CVE-2025-39691",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39692",
                        "url": "https://ubuntu.com/security/CVE-2025-39692",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39788",
                        "url": "https://ubuntu.com/security/CVE-2025-39788",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39693",
                        "url": "https://ubuntu.com/security/CVE-2025-39693",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39694",
                        "url": "https://ubuntu.com/security/CVE-2025-39694",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39776",
                        "url": "https://ubuntu.com/security/CVE-2025-39776",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38681",
                        "url": "https://ubuntu.com/security/CVE-2025-38681",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39800",
                        "url": "https://ubuntu.com/security/CVE-2025-39800",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38684",
                        "url": "https://ubuntu.com/security/CVE-2025-38684",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-21884",
                        "url": "https://ubuntu.com/security/CVE-2025-21884",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39701",
                        "url": "https://ubuntu.com/security/CVE-2025-39701",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39702",
                        "url": "https://ubuntu.com/security/CVE-2025-39702",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39703",
                        "url": "https://ubuntu.com/security/CVE-2025-39703",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39706",
                        "url": "https://ubuntu.com/security/CVE-2025-39706",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39709",
                        "url": "https://ubuntu.com/security/CVE-2025-39709",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39710",
                        "url": "https://ubuntu.com/security/CVE-2025-39710",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39711",
                        "url": "https://ubuntu.com/security/CVE-2025-39711",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39713",
                        "url": "https://ubuntu.com/security/CVE-2025-39713",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39714",
                        "url": "https://ubuntu.com/security/CVE-2025-39714",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39715",
                        "url": "https://ubuntu.com/security/CVE-2025-39715",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39716",
                        "url": "https://ubuntu.com/security/CVE-2025-39716",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39781",
                        "url": "https://ubuntu.com/security/CVE-2025-39781",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39782",
                        "url": "https://ubuntu.com/security/CVE-2025-39782",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38677",
                        "url": "https://ubuntu.com/security/CVE-2025-38677",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39718",
                        "url": "https://ubuntu.com/security/CVE-2025-39718",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39783",
                        "url": "https://ubuntu.com/security/CVE-2025-39783",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39719",
                        "url": "https://ubuntu.com/security/CVE-2025-39719",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39787",
                        "url": "https://ubuntu.com/security/CVE-2025-39787",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39720",
                        "url": "https://ubuntu.com/security/CVE-2025-39720",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39721",
                        "url": "https://ubuntu.com/security/CVE-2025-39721",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39790",
                        "url": "https://ubuntu.com/security/CVE-2025-39790",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39724",
                        "url": "https://ubuntu.com/security/CVE-2025-39724",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39758",
                        "url": "https://ubuntu.com/security/CVE-2025-39758",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38679",
                        "url": "https://ubuntu.com/security/CVE-2025-38679",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38680",
                        "url": "https://ubuntu.com/security/CVE-2025-38680",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39736",
                        "url": "https://ubuntu.com/security/CVE-2025-39736",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39737",
                        "url": "https://ubuntu.com/security/CVE-2025-39737",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38683",
                        "url": "https://ubuntu.com/security/CVE-2025-38683",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38685",
                        "url": "https://ubuntu.com/security/CVE-2025-38685",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39738",
                        "url": "https://ubuntu.com/security/CVE-2025-39738",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38687",
                        "url": "https://ubuntu.com/security/CVE-2025-38687",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39760",
                        "url": "https://ubuntu.com/security/CVE-2025-39760",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38688",
                        "url": "https://ubuntu.com/security/CVE-2025-38688",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39739",
                        "url": "https://ubuntu.com/security/CVE-2025-39739",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38691",
                        "url": "https://ubuntu.com/security/CVE-2025-38691",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39795",
                        "url": "https://ubuntu.com/security/CVE-2025-39795",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38692",
                        "url": "https://ubuntu.com/security/CVE-2025-38692",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38693",
                        "url": "https://ubuntu.com/security/CVE-2025-38693",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38694",
                        "url": "https://ubuntu.com/security/CVE-2025-38694",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38695",
                        "url": "https://ubuntu.com/security/CVE-2025-38695",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39742",
                        "url": "https://ubuntu.com/security/CVE-2025-39742",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38696",
                        "url": "https://ubuntu.com/security/CVE-2025-38696",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38697",
                        "url": "https://ubuntu.com/security/CVE-2025-38697",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38698",
                        "url": "https://ubuntu.com/security/CVE-2025-38698",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39743",
                        "url": "https://ubuntu.com/security/CVE-2025-39743",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38699",
                        "url": "https://ubuntu.com/security/CVE-2025-38699",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38700",
                        "url": "https://ubuntu.com/security/CVE-2025-38700",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38701",
                        "url": "https://ubuntu.com/security/CVE-2025-38701",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38702",
                        "url": "https://ubuntu.com/security/CVE-2025-38702",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39744",
                        "url": "https://ubuntu.com/security/CVE-2025-39744",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39761",
                        "url": "https://ubuntu.com/security/CVE-2025-39761",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39797",
                        "url": "https://ubuntu.com/security/CVE-2025-39797",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39749",
                        "url": "https://ubuntu.com/security/CVE-2025-39749",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39750",
                        "url": "https://ubuntu.com/security/CVE-2025-39750",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38706",
                        "url": "https://ubuntu.com/security/CVE-2025-38706",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39794",
                        "url": "https://ubuntu.com/security/CVE-2025-39794",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39752",
                        "url": "https://ubuntu.com/security/CVE-2025-39752",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39763",
                        "url": "https://ubuntu.com/security/CVE-2025-39763",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38707",
                        "url": "https://ubuntu.com/security/CVE-2025-38707",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38708",
                        "url": "https://ubuntu.com/security/CVE-2025-38708",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39753",
                        "url": "https://ubuntu.com/security/CVE-2025-39753",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38711",
                        "url": "https://ubuntu.com/security/CVE-2025-38711",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38712",
                        "url": "https://ubuntu.com/security/CVE-2025-38712",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38713",
                        "url": "https://ubuntu.com/security/CVE-2025-38713",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38714",
                        "url": "https://ubuntu.com/security/CVE-2025-38714",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38715",
                        "url": "https://ubuntu.com/security/CVE-2025-38715",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38716",
                        "url": "https://ubuntu.com/security/CVE-2025-38716",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38718",
                        "url": "https://ubuntu.com/security/CVE-2025-38718",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38721",
                        "url": "https://ubuntu.com/security/CVE-2025-38721",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38614",
                        "url": "https://ubuntu.com/security/CVE-2025-38614",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39756",
                        "url": "https://ubuntu.com/security/CVE-2025-39756",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39798",
                        "url": "https://ubuntu.com/security/CVE-2025-39798",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38724",
                        "url": "https://ubuntu.com/security/CVE-2025-38724",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38730",
                        "url": "https://ubuntu.com/security/CVE-2025-38730",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38725",
                        "url": "https://ubuntu.com/security/CVE-2025-38725",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38728",
                        "url": "https://ubuntu.com/security/CVE-2025-38728",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39757",
                        "url": "https://ubuntu.com/security/CVE-2025-39757",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38729",
                        "url": "https://ubuntu.com/security/CVE-2025-38729",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40297",
                        "url": "https://ubuntu.com/security/CVE-2025-40297",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40256",
                        "url": "https://ubuntu.com/security/CVE-2025-40256",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40215",
                        "url": "https://ubuntu.com/security/CVE-2025-40215",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40214",
                        "url": "https://ubuntu.com/security/CVE-2025-40214",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38248",
                        "url": "https://ubuntu.com/security/CVE-2025-38248",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38619",
                        "url": "https://ubuntu.com/security/CVE-2025-38619",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38582",
                        "url": "https://ubuntu.com/security/CVE-2025-38582",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38585",
                        "url": "https://ubuntu.com/security/CVE-2025-38585",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38593",
                        "url": "https://ubuntu.com/security/CVE-2025-38593",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39732",
                        "url": "https://ubuntu.com/security/CVE-2025-39732",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38595",
                        "url": "https://ubuntu.com/security/CVE-2025-38595",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38660",
                        "url": "https://ubuntu.com/security/CVE-2025-38660",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38555",
                        "url": "https://ubuntu.com/security/CVE-2025-38555",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2024-36331",
                        "url": "https://ubuntu.com/security/CVE-2024-36331",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38560",
                        "url": "https://ubuntu.com/security/CVE-2025-38560",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38501",
                        "url": "https://ubuntu.com/security/CVE-2025-38501",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38562",
                        "url": "https://ubuntu.com/security/CVE-2025-38562",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38566",
                        "url": "https://ubuntu.com/security/CVE-2025-38566",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38568",
                        "url": "https://ubuntu.com/security/CVE-2025-38568",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38571",
                        "url": "https://ubuntu.com/security/CVE-2025-38571",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38622",
                        "url": "https://ubuntu.com/security/CVE-2025-38622",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38572",
                        "url": "https://ubuntu.com/security/CVE-2025-38572",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38574",
                        "url": "https://ubuntu.com/security/CVE-2025-38574",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39730",
                        "url": "https://ubuntu.com/security/CVE-2025-39730",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38623",
                        "url": "https://ubuntu.com/security/CVE-2025-38623",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38576",
                        "url": "https://ubuntu.com/security/CVE-2025-38576",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38624",
                        "url": "https://ubuntu.com/security/CVE-2025-38624",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38625",
                        "url": "https://ubuntu.com/security/CVE-2025-38625",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38626",
                        "url": "https://ubuntu.com/security/CVE-2025-38626",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39731",
                        "url": "https://ubuntu.com/security/CVE-2025-39731",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38652",
                        "url": "https://ubuntu.com/security/CVE-2025-38652",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38577",
                        "url": "https://ubuntu.com/security/CVE-2025-38577",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38578",
                        "url": "https://ubuntu.com/security/CVE-2025-38578",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38579",
                        "url": "https://ubuntu.com/security/CVE-2025-38579",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38630",
                        "url": "https://ubuntu.com/security/CVE-2025-38630",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38632",
                        "url": "https://ubuntu.com/security/CVE-2025-38632",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38653",
                        "url": "https://ubuntu.com/security/CVE-2025-38653",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38581",
                        "url": "https://ubuntu.com/security/CVE-2025-38581",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38634",
                        "url": "https://ubuntu.com/security/CVE-2025-38634",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38583",
                        "url": "https://ubuntu.com/security/CVE-2025-38583",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38635",
                        "url": "https://ubuntu.com/security/CVE-2025-38635",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38587",
                        "url": "https://ubuntu.com/security/CVE-2025-38587",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38588",
                        "url": "https://ubuntu.com/security/CVE-2025-38588",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38590",
                        "url": "https://ubuntu.com/security/CVE-2025-38590",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38639",
                        "url": "https://ubuntu.com/security/CVE-2025-38639",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38640",
                        "url": "https://ubuntu.com/security/CVE-2025-38640",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38644",
                        "url": "https://ubuntu.com/security/CVE-2025-38644",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38553",
                        "url": "https://ubuntu.com/security/CVE-2025-38553",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38645",
                        "url": "https://ubuntu.com/security/CVE-2025-38645",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38601",
                        "url": "https://ubuntu.com/security/CVE-2025-38601",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38602",
                        "url": "https://ubuntu.com/security/CVE-2025-38602",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38604",
                        "url": "https://ubuntu.com/security/CVE-2025-38604",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38646",
                        "url": "https://ubuntu.com/security/CVE-2025-38646",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38608",
                        "url": "https://ubuntu.com/security/CVE-2025-38608",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38609",
                        "url": "https://ubuntu.com/security/CVE-2025-38609",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38610",
                        "url": "https://ubuntu.com/security/CVE-2025-38610",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38612",
                        "url": "https://ubuntu.com/security/CVE-2025-38612",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38648",
                        "url": "https://ubuntu.com/security/CVE-2025-38648",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38659",
                        "url": "https://ubuntu.com/security/CVE-2025-38659",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39734",
                        "url": "https://ubuntu.com/security/CVE-2025-39734",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38650",
                        "url": "https://ubuntu.com/security/CVE-2025-38650",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38615",
                        "url": "https://ubuntu.com/security/CVE-2025-38615",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38351",
                        "url": "https://ubuntu.com/security/CVE-2025-38351",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38675",
                        "url": "https://ubuntu.com/security/CVE-2025-38675",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38322",
                        "url": "https://ubuntu.com/security/CVE-2025-38322",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37777",
                        "url": "https://ubuntu.com/security/CVE-2025-37777",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37925",
                        "url": "https://ubuntu.com/security/CVE-2025-37925",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38663",
                        "url": "https://ubuntu.com/security/CVE-2025-38663",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38664",
                        "url": "https://ubuntu.com/security/CVE-2025-38664",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38670",
                        "url": "https://ubuntu.com/security/CVE-2025-38670",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38671",
                        "url": "https://ubuntu.com/security/CVE-2025-38671",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39726",
                        "url": "https://ubuntu.com/security/CVE-2025-39726",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38665",
                        "url": "https://ubuntu.com/security/CVE-2025-38665",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38668",
                        "url": "https://ubuntu.com/security/CVE-2025-38668",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38335",
                        "url": "https://ubuntu.com/security/CVE-2025-38335",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-22115",
                        "url": "https://ubuntu.com/security/CVE-2025-22115",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38549",
                        "url": "https://ubuntu.com/security/CVE-2025-38549",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38551",
                        "url": "https://ubuntu.com/security/CVE-2025-38551",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38531",
                        "url": "https://ubuntu.com/security/CVE-2025-38531",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38552",
                        "url": "https://ubuntu.com/security/CVE-2025-38552",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38491",
                        "url": "https://ubuntu.com/security/CVE-2025-38491",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38469",
                        "url": "https://ubuntu.com/security/CVE-2025-38469",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38499",
                        "url": "https://ubuntu.com/security/CVE-2025-38499",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38524",
                        "url": "https://ubuntu.com/security/CVE-2025-38524",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38468",
                        "url": "https://ubuntu.com/security/CVE-2025-38468",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38470",
                        "url": "https://ubuntu.com/security/CVE-2025-38470",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38471",
                        "url": "https://ubuntu.com/security/CVE-2025-38471",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38472",
                        "url": "https://ubuntu.com/security/CVE-2025-38472",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38550",
                        "url": "https://ubuntu.com/security/CVE-2025-38550",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38473",
                        "url": "https://ubuntu.com/security/CVE-2025-38473",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38474",
                        "url": "https://ubuntu.com/security/CVE-2025-38474",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38526",
                        "url": "https://ubuntu.com/security/CVE-2025-38526",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38548",
                        "url": "https://ubuntu.com/security/CVE-2025-38548",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38537",
                        "url": "https://ubuntu.com/security/CVE-2025-38537",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38527",
                        "url": "https://ubuntu.com/security/CVE-2025-38527",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38476",
                        "url": "https://ubuntu.com/security/CVE-2025-38476",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38528",
                        "url": "https://ubuntu.com/security/CVE-2025-38528",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38478",
                        "url": "https://ubuntu.com/security/CVE-2025-38478",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38480",
                        "url": "https://ubuntu.com/security/CVE-2025-38480",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38481",
                        "url": "https://ubuntu.com/security/CVE-2025-38481",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38482",
                        "url": "https://ubuntu.com/security/CVE-2025-38482",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38483",
                        "url": "https://ubuntu.com/security/CVE-2025-38483",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38529",
                        "url": "https://ubuntu.com/security/CVE-2025-38529",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38530",
                        "url": "https://ubuntu.com/security/CVE-2025-38530",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38485",
                        "url": "https://ubuntu.com/security/CVE-2025-38485",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38487",
                        "url": "https://ubuntu.com/security/CVE-2025-38487",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2024-50047",
                        "url": "https://ubuntu.com/security/CVE-2024-50047",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38488",
                        "url": "https://ubuntu.com/security/CVE-2025-38488",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38489",
                        "url": "https://ubuntu.com/security/CVE-2025-38489",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38532",
                        "url": "https://ubuntu.com/security/CVE-2025-38532",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38533",
                        "url": "https://ubuntu.com/security/CVE-2025-38533",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38490",
                        "url": "https://ubuntu.com/security/CVE-2025-38490",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38538",
                        "url": "https://ubuntu.com/security/CVE-2025-38538",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38493",
                        "url": "https://ubuntu.com/security/CVE-2025-38493",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38539",
                        "url": "https://ubuntu.com/security/CVE-2025-38539",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38494",
                        "url": "https://ubuntu.com/security/CVE-2025-38494",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38495",
                        "url": "https://ubuntu.com/security/CVE-2025-38495",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38496",
                        "url": "https://ubuntu.com/security/CVE-2025-38496",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38497",
                        "url": "https://ubuntu.com/security/CVE-2025-38497",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38535",
                        "url": "https://ubuntu.com/security/CVE-2025-38535",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38507",
                        "url": "https://ubuntu.com/security/CVE-2025-38507",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38511",
                        "url": "https://ubuntu.com/security/CVE-2025-38511",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38520",
                        "url": "https://ubuntu.com/security/CVE-2025-38520",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38521",
                        "url": "https://ubuntu.com/security/CVE-2025-38521",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38506",
                        "url": "https://ubuntu.com/security/CVE-2025-38506",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38104",
                        "url": "https://ubuntu.com/security/CVE-2025-38104",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38067",
                        "url": "https://ubuntu.com/security/CVE-2025-38067",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37984",
                        "url": "https://ubuntu.com/security/CVE-2025-37984",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38437",
                        "url": "https://ubuntu.com/security/CVE-2025-38437",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38510",
                        "url": "https://ubuntu.com/security/CVE-2025-38510",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38503",
                        "url": "https://ubuntu.com/security/CVE-2025-38503",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38439",
                        "url": "https://ubuntu.com/security/CVE-2025-38439",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38542",
                        "url": "https://ubuntu.com/security/CVE-2025-38542",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38441",
                        "url": "https://ubuntu.com/security/CVE-2025-38441",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38443",
                        "url": "https://ubuntu.com/security/CVE-2025-38443",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38444",
                        "url": "https://ubuntu.com/security/CVE-2025-38444",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38445",
                        "url": "https://ubuntu.com/security/CVE-2025-38445",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38543",
                        "url": "https://ubuntu.com/security/CVE-2025-38543",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38513",
                        "url": "https://ubuntu.com/security/CVE-2025-38513",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38448",
                        "url": "https://ubuntu.com/security/CVE-2025-38448",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38515",
                        "url": "https://ubuntu.com/security/CVE-2025-38515",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38449",
                        "url": "https://ubuntu.com/security/CVE-2025-38449",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38512",
                        "url": "https://ubuntu.com/security/CVE-2025-38512",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38516",
                        "url": "https://ubuntu.com/security/CVE-2025-38516",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38455",
                        "url": "https://ubuntu.com/security/CVE-2025-38455",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38456",
                        "url": "https://ubuntu.com/security/CVE-2025-38456",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38514",
                        "url": "https://ubuntu.com/security/CVE-2025-38514",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38544",
                        "url": "https://ubuntu.com/security/CVE-2025-38544",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38457",
                        "url": "https://ubuntu.com/security/CVE-2025-38457",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38458",
                        "url": "https://ubuntu.com/security/CVE-2025-38458",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38459",
                        "url": "https://ubuntu.com/security/CVE-2025-38459",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38546",
                        "url": "https://ubuntu.com/security/CVE-2025-38546",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38460",
                        "url": "https://ubuntu.com/security/CVE-2025-38460",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38461",
                        "url": "https://ubuntu.com/security/CVE-2025-38461",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38462",
                        "url": "https://ubuntu.com/security/CVE-2025-38462",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38463",
                        "url": "https://ubuntu.com/security/CVE-2025-38463",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38464",
                        "url": "https://ubuntu.com/security/CVE-2025-38464",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38465",
                        "url": "https://ubuntu.com/security/CVE-2025-38465",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38466",
                        "url": "https://ubuntu.com/security/CVE-2025-38466",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38467",
                        "url": "https://ubuntu.com/security/CVE-2025-38467",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38349",
                        "url": "https://ubuntu.com/security/CVE-2025-38349",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38407",
                        "url": "https://ubuntu.com/security/CVE-2025-38407",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38374",
                        "url": "https://ubuntu.com/security/CVE-2025-38374",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38373",
                        "url": "https://ubuntu.com/security/CVE-2025-38373",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38408",
                        "url": "https://ubuntu.com/security/CVE-2025-38408",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38279",
                        "url": "https://ubuntu.com/security/CVE-2025-38279",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38289",
                        "url": "https://ubuntu.com/security/CVE-2025-38289",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38392",
                        "url": "https://ubuntu.com/security/CVE-2025-38392",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38402",
                        "url": "https://ubuntu.com/security/CVE-2025-38402",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38405",
                        "url": "https://ubuntu.com/security/CVE-2025-38405",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38388",
                        "url": "https://ubuntu.com/security/CVE-2025-38388",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38390",
                        "url": "https://ubuntu.com/security/CVE-2025-38390",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2024-36350",
                        "url": "https://ubuntu.com/security/CVE-2024-36350",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2024-36357",
                        "url": "https://ubuntu.com/security/CVE-2024-36357",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38376",
                        "url": "https://ubuntu.com/security/CVE-2025-38376",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38396",
                        "url": "https://ubuntu.com/security/CVE-2025-38396",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38371",
                        "url": "https://ubuntu.com/security/CVE-2025-38371",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38384",
                        "url": "https://ubuntu.com/security/CVE-2025-38384",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38386",
                        "url": "https://ubuntu.com/security/CVE-2025-38386",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38406",
                        "url": "https://ubuntu.com/security/CVE-2025-38406",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38399",
                        "url": "https://ubuntu.com/security/CVE-2025-38399",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38409",
                        "url": "https://ubuntu.com/security/CVE-2025-38409",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38410",
                        "url": "https://ubuntu.com/security/CVE-2025-38410",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38377",
                        "url": "https://ubuntu.com/security/CVE-2025-38377",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38389",
                        "url": "https://ubuntu.com/security/CVE-2025-38389",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38385",
                        "url": "https://ubuntu.com/security/CVE-2025-38385",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38412",
                        "url": "https://ubuntu.com/security/CVE-2025-38412",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38382",
                        "url": "https://ubuntu.com/security/CVE-2025-38382",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38393",
                        "url": "https://ubuntu.com/security/CVE-2025-38393",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38400",
                        "url": "https://ubuntu.com/security/CVE-2025-38400",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38387",
                        "url": "https://ubuntu.com/security/CVE-2025-38387",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38401",
                        "url": "https://ubuntu.com/security/CVE-2025-38401",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38391",
                        "url": "https://ubuntu.com/security/CVE-2025-38391",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38395",
                        "url": "https://ubuntu.com/security/CVE-2025-38395",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38403",
                        "url": "https://ubuntu.com/security/CVE-2025-38403",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38375",
                        "url": "https://ubuntu.com/security/CVE-2025-38375",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37842",
                        "url": "https://ubuntu.com/security/CVE-2025-37842",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23155",
                        "url": "https://ubuntu.com/security/CVE-2025-23155",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-22101",
                        "url": "https://ubuntu.com/security/CVE-2025-22101",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38361",
                        "url": "https://ubuntu.com/security/CVE-2025-38361",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38364",
                        "url": "https://ubuntu.com/security/CVE-2025-38364",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38246",
                        "url": "https://ubuntu.com/security/CVE-2025-38246",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38250",
                        "url": "https://ubuntu.com/security/CVE-2025-38250",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38253",
                        "url": "https://ubuntu.com/security/CVE-2025-38253",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38264",
                        "url": "https://ubuntu.com/security/CVE-2025-38264",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38362",
                        "url": "https://ubuntu.com/security/CVE-2025-38362",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38354",
                        "url": "https://ubuntu.com/security/CVE-2025-38354",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38363",
                        "url": "https://ubuntu.com/security/CVE-2025-38363",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38239",
                        "url": "https://ubuntu.com/security/CVE-2025-38239",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38365",
                        "url": "https://ubuntu.com/security/CVE-2025-38365",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38244",
                        "url": "https://ubuntu.com/security/CVE-2025-38244",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38245",
                        "url": "https://ubuntu.com/security/CVE-2025-38245",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38249",
                        "url": "https://ubuntu.com/security/CVE-2025-38249",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38251",
                        "url": "https://ubuntu.com/security/CVE-2025-38251",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38255",
                        "url": "https://ubuntu.com/security/CVE-2025-38255",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38257",
                        "url": "https://ubuntu.com/security/CVE-2025-38257",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38258",
                        "url": "https://ubuntu.com/security/CVE-2025-38258",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38259",
                        "url": "https://ubuntu.com/security/CVE-2025-38259",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38230",
                        "url": "https://ubuntu.com/security/CVE-2025-38230",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38260",
                        "url": "https://ubuntu.com/security/CVE-2025-38260",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38262",
                        "url": "https://ubuntu.com/security/CVE-2025-38262",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38368",
                        "url": "https://ubuntu.com/security/CVE-2025-38368",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38436",
                        "url": "https://ubuntu.com/security/CVE-2025-38436",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38263",
                        "url": "https://ubuntu.com/security/CVE-2025-38263",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38369",
                        "url": "https://ubuntu.com/security/CVE-2025-38369",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-22128",
                        "url": "https://ubuntu.com/security/CVE-2025-22128",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38333",
                        "url": "https://ubuntu.com/security/CVE-2025-38333",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38210",
                        "url": "https://ubuntu.com/security/CVE-2025-38210",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38232",
                        "url": "https://ubuntu.com/security/CVE-2025-38232",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38320",
                        "url": "https://ubuntu.com/security/CVE-2025-38320",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38424",
                        "url": "https://ubuntu.com/security/CVE-2025-38424",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38321",
                        "url": "https://ubuntu.com/security/CVE-2025-38321",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38180",
                        "url": "https://ubuntu.com/security/CVE-2025-38180",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38323",
                        "url": "https://ubuntu.com/security/CVE-2025-38323",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38181",
                        "url": "https://ubuntu.com/security/CVE-2025-38181",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38182",
                        "url": "https://ubuntu.com/security/CVE-2025-38182",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38183",
                        "url": "https://ubuntu.com/security/CVE-2025-38183",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38184",
                        "url": "https://ubuntu.com/security/CVE-2025-38184",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38185",
                        "url": "https://ubuntu.com/security/CVE-2025-38185",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38324",
                        "url": "https://ubuntu.com/security/CVE-2025-38324",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38420",
                        "url": "https://ubuntu.com/security/CVE-2025-38420",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38326",
                        "url": "https://ubuntu.com/security/CVE-2025-38326",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38089",
                        "url": "https://ubuntu.com/security/CVE-2025-38089",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38084",
                        "url": "https://ubuntu.com/security/CVE-2025-38084",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38190",
                        "url": "https://ubuntu.com/security/CVE-2025-38190",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38191",
                        "url": "https://ubuntu.com/security/CVE-2025-38191",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38192",
                        "url": "https://ubuntu.com/security/CVE-2025-38192",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38193",
                        "url": "https://ubuntu.com/security/CVE-2025-38193",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38328",
                        "url": "https://ubuntu.com/security/CVE-2025-38328",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38194",
                        "url": "https://ubuntu.com/security/CVE-2025-38194",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38090",
                        "url": "https://ubuntu.com/security/CVE-2025-38090",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38197",
                        "url": "https://ubuntu.com/security/CVE-2025-38197",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38198",
                        "url": "https://ubuntu.com/security/CVE-2025-38198",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38331",
                        "url": "https://ubuntu.com/security/CVE-2025-38331",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38200",
                        "url": "https://ubuntu.com/security/CVE-2025-38200",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38332",
                        "url": "https://ubuntu.com/security/CVE-2025-38332",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38342",
                        "url": "https://ubuntu.com/security/CVE-2025-38342",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38334",
                        "url": "https://ubuntu.com/security/CVE-2025-38334",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38425",
                        "url": "https://ubuntu.com/security/CVE-2025-38425",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38343",
                        "url": "https://ubuntu.com/security/CVE-2025-38343",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38202",
                        "url": "https://ubuntu.com/security/CVE-2025-38202",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38422",
                        "url": "https://ubuntu.com/security/CVE-2025-38422",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38344",
                        "url": "https://ubuntu.com/security/CVE-2025-38344",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38345",
                        "url": "https://ubuntu.com/security/CVE-2025-38345",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38085",
                        "url": "https://ubuntu.com/security/CVE-2025-38085",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38208",
                        "url": "https://ubuntu.com/security/CVE-2025-38208",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38418",
                        "url": "https://ubuntu.com/security/CVE-2025-38418",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38419",
                        "url": "https://ubuntu.com/security/CVE-2025-38419",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38427",
                        "url": "https://ubuntu.com/security/CVE-2025-38427",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38086",
                        "url": "https://ubuntu.com/security/CVE-2025-38086",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38346",
                        "url": "https://ubuntu.com/security/CVE-2025-38346",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38211",
                        "url": "https://ubuntu.com/security/CVE-2025-38211",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38212",
                        "url": "https://ubuntu.com/security/CVE-2025-38212",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38214",
                        "url": "https://ubuntu.com/security/CVE-2025-38214",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38215",
                        "url": "https://ubuntu.com/security/CVE-2025-38215",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38087",
                        "url": "https://ubuntu.com/security/CVE-2025-38087",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38416",
                        "url": "https://ubuntu.com/security/CVE-2025-38416",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38217",
                        "url": "https://ubuntu.com/security/CVE-2025-38217",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38218",
                        "url": "https://ubuntu.com/security/CVE-2025-38218",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38219",
                        "url": "https://ubuntu.com/security/CVE-2025-38219",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38347",
                        "url": "https://ubuntu.com/security/CVE-2025-38347",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38428",
                        "url": "https://ubuntu.com/security/CVE-2025-38428",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38220",
                        "url": "https://ubuntu.com/security/CVE-2025-38220",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38222",
                        "url": "https://ubuntu.com/security/CVE-2025-38222",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38336",
                        "url": "https://ubuntu.com/security/CVE-2025-38336",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38429",
                        "url": "https://ubuntu.com/security/CVE-2025-38429",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38225",
                        "url": "https://ubuntu.com/security/CVE-2025-38225",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38226",
                        "url": "https://ubuntu.com/security/CVE-2025-38226",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38229",
                        "url": "https://ubuntu.com/security/CVE-2025-38229",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38337",
                        "url": "https://ubuntu.com/security/CVE-2025-38337",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38338",
                        "url": "https://ubuntu.com/security/CVE-2025-38338",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38231",
                        "url": "https://ubuntu.com/security/CVE-2025-38231",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38430",
                        "url": "https://ubuntu.com/security/CVE-2025-38430",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38348",
                        "url": "https://ubuntu.com/security/CVE-2025-38348",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38101",
                        "url": "https://ubuntu.com/security/CVE-2025-38101",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38269",
                        "url": "https://ubuntu.com/security/CVE-2025-38269",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38303",
                        "url": "https://ubuntu.com/security/CVE-2025-38303",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38414",
                        "url": "https://ubuntu.com/security/CVE-2025-38414",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38125",
                        "url": "https://ubuntu.com/security/CVE-2025-38125",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38129",
                        "url": "https://ubuntu.com/security/CVE-2025-38129",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38156",
                        "url": "https://ubuntu.com/security/CVE-2025-38156",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38162",
                        "url": "https://ubuntu.com/security/CVE-2025-38162",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38292",
                        "url": "https://ubuntu.com/security/CVE-2025-38292",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38164",
                        "url": "https://ubuntu.com/security/CVE-2025-38164",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38169",
                        "url": "https://ubuntu.com/security/CVE-2025-38169",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38299",
                        "url": "https://ubuntu.com/security/CVE-2025-38299",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38100",
                        "url": "https://ubuntu.com/security/CVE-2025-38100",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38102",
                        "url": "https://ubuntu.com/security/CVE-2025-38102",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38103",
                        "url": "https://ubuntu.com/security/CVE-2025-38103",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38107",
                        "url": "https://ubuntu.com/security/CVE-2025-38107",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38108",
                        "url": "https://ubuntu.com/security/CVE-2025-38108",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38109",
                        "url": "https://ubuntu.com/security/CVE-2025-38109",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38304",
                        "url": "https://ubuntu.com/security/CVE-2025-38304",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38110",
                        "url": "https://ubuntu.com/security/CVE-2025-38110",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38111",
                        "url": "https://ubuntu.com/security/CVE-2025-38111",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38112",
                        "url": "https://ubuntu.com/security/CVE-2025-38112",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38113",
                        "url": "https://ubuntu.com/security/CVE-2025-38113",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38088",
                        "url": "https://ubuntu.com/security/CVE-2025-38088",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38115",
                        "url": "https://ubuntu.com/security/CVE-2025-38115",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38305",
                        "url": "https://ubuntu.com/security/CVE-2025-38305",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38117",
                        "url": "https://ubuntu.com/security/CVE-2025-38117",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38119",
                        "url": "https://ubuntu.com/security/CVE-2025-38119",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38307",
                        "url": "https://ubuntu.com/security/CVE-2025-38307",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38310",
                        "url": "https://ubuntu.com/security/CVE-2025-38310",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38120",
                        "url": "https://ubuntu.com/security/CVE-2025-38120",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38122",
                        "url": "https://ubuntu.com/security/CVE-2025-38122",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38123",
                        "url": "https://ubuntu.com/security/CVE-2025-38123",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38124",
                        "url": "https://ubuntu.com/security/CVE-2025-38124",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38126",
                        "url": "https://ubuntu.com/security/CVE-2025-38126",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38127",
                        "url": "https://ubuntu.com/security/CVE-2025-38127",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38131",
                        "url": "https://ubuntu.com/security/CVE-2025-38131",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38274",
                        "url": "https://ubuntu.com/security/CVE-2025-38274",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38135",
                        "url": "https://ubuntu.com/security/CVE-2025-38135",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38136",
                        "url": "https://ubuntu.com/security/CVE-2025-38136",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38138",
                        "url": "https://ubuntu.com/security/CVE-2025-38138",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38275",
                        "url": "https://ubuntu.com/security/CVE-2025-38275",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38142",
                        "url": "https://ubuntu.com/security/CVE-2025-38142",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38277",
                        "url": "https://ubuntu.com/security/CVE-2025-38277",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38143",
                        "url": "https://ubuntu.com/security/CVE-2025-38143",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38312",
                        "url": "https://ubuntu.com/security/CVE-2025-38312",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38145",
                        "url": "https://ubuntu.com/security/CVE-2025-38145",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38313",
                        "url": "https://ubuntu.com/security/CVE-2025-38313",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38415",
                        "url": "https://ubuntu.com/security/CVE-2025-38415",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38146",
                        "url": "https://ubuntu.com/security/CVE-2025-38146",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38147",
                        "url": "https://ubuntu.com/security/CVE-2025-38147",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38278",
                        "url": "https://ubuntu.com/security/CVE-2025-38278",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38148",
                        "url": "https://ubuntu.com/security/CVE-2025-38148",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38149",
                        "url": "https://ubuntu.com/security/CVE-2025-38149",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38280",
                        "url": "https://ubuntu.com/security/CVE-2025-38280",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38153",
                        "url": "https://ubuntu.com/security/CVE-2025-38153",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38154",
                        "url": "https://ubuntu.com/security/CVE-2025-38154",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38155",
                        "url": "https://ubuntu.com/security/CVE-2025-38155",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38282",
                        "url": "https://ubuntu.com/security/CVE-2025-38282",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38157",
                        "url": "https://ubuntu.com/security/CVE-2025-38157",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38283",
                        "url": "https://ubuntu.com/security/CVE-2025-38283",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38158",
                        "url": "https://ubuntu.com/security/CVE-2025-38158",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39890",
                        "url": "https://ubuntu.com/security/CVE-2025-39890",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38159",
                        "url": "https://ubuntu.com/security/CVE-2025-38159",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38285",
                        "url": "https://ubuntu.com/security/CVE-2025-38285",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38286",
                        "url": "https://ubuntu.com/security/CVE-2025-38286",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38160",
                        "url": "https://ubuntu.com/security/CVE-2025-38160",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38161",
                        "url": "https://ubuntu.com/security/CVE-2025-38161",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38290",
                        "url": "https://ubuntu.com/security/CVE-2025-38290",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38163",
                        "url": "https://ubuntu.com/security/CVE-2025-38163",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38165",
                        "url": "https://ubuntu.com/security/CVE-2025-38165",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38166",
                        "url": "https://ubuntu.com/security/CVE-2025-38166",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38293",
                        "url": "https://ubuntu.com/security/CVE-2025-38293",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38295",
                        "url": "https://ubuntu.com/security/CVE-2025-38295",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38167",
                        "url": "https://ubuntu.com/security/CVE-2025-38167",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38170",
                        "url": "https://ubuntu.com/security/CVE-2025-38170",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38319",
                        "url": "https://ubuntu.com/security/CVE-2025-38319",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38298",
                        "url": "https://ubuntu.com/security/CVE-2025-38298",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38173",
                        "url": "https://ubuntu.com/security/CVE-2025-38173",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38300",
                        "url": "https://ubuntu.com/security/CVE-2025-38300",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38174",
                        "url": "https://ubuntu.com/security/CVE-2025-38174",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38265",
                        "url": "https://ubuntu.com/security/CVE-2025-38265",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38053",
                        "url": "https://ubuntu.com/security/CVE-2025-38053",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38055",
                        "url": "https://ubuntu.com/security/CVE-2025-38055",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38057",
                        "url": "https://ubuntu.com/security/CVE-2025-38057",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38060",
                        "url": "https://ubuntu.com/security/CVE-2025-38060",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38098",
                        "url": "https://ubuntu.com/security/CVE-2025-38098",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38099",
                        "url": "https://ubuntu.com/security/CVE-2025-38099",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38073",
                        "url": "https://ubuntu.com/security/CVE-2025-38073",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38051",
                        "url": "https://ubuntu.com/security/CVE-2025-38051",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38077",
                        "url": "https://ubuntu.com/security/CVE-2025-38077",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38078",
                        "url": "https://ubuntu.com/security/CVE-2025-38078",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38003",
                        "url": "https://ubuntu.com/security/CVE-2025-38003",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38004",
                        "url": "https://ubuntu.com/security/CVE-2025-38004",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38031",
                        "url": "https://ubuntu.com/security/CVE-2025-38031",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38079",
                        "url": "https://ubuntu.com/security/CVE-2025-38079",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38052",
                        "url": "https://ubuntu.com/security/CVE-2025-38052",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38097",
                        "url": "https://ubuntu.com/security/CVE-2025-38097",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38058",
                        "url": "https://ubuntu.com/security/CVE-2025-38058",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38059",
                        "url": "https://ubuntu.com/security/CVE-2025-38059",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38034",
                        "url": "https://ubuntu.com/security/CVE-2025-38034",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38035",
                        "url": "https://ubuntu.com/security/CVE-2025-38035",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38037",
                        "url": "https://ubuntu.com/security/CVE-2025-38037",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38039",
                        "url": "https://ubuntu.com/security/CVE-2025-38039",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38080",
                        "url": "https://ubuntu.com/security/CVE-2025-38080",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38040",
                        "url": "https://ubuntu.com/security/CVE-2025-38040",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38061",
                        "url": "https://ubuntu.com/security/CVE-2025-38061",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38062",
                        "url": "https://ubuntu.com/security/CVE-2025-38062",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38063",
                        "url": "https://ubuntu.com/security/CVE-2025-38063",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38043",
                        "url": "https://ubuntu.com/security/CVE-2025-38043",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38044",
                        "url": "https://ubuntu.com/security/CVE-2025-38044",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38065",
                        "url": "https://ubuntu.com/security/CVE-2025-38065",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38066",
                        "url": "https://ubuntu.com/security/CVE-2025-38066",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38068",
                        "url": "https://ubuntu.com/security/CVE-2025-38068",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38045",
                        "url": "https://ubuntu.com/security/CVE-2025-38045",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38071",
                        "url": "https://ubuntu.com/security/CVE-2025-38071",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38072",
                        "url": "https://ubuntu.com/security/CVE-2025-38072",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38081",
                        "url": "https://ubuntu.com/security/CVE-2025-38081",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38074",
                        "url": "https://ubuntu.com/security/CVE-2025-38074",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38048",
                        "url": "https://ubuntu.com/security/CVE-2025-38048",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38075",
                        "url": "https://ubuntu.com/security/CVE-2025-38075",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37968",
                        "url": "https://ubuntu.com/security/CVE-2025-37968",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38011",
                        "url": "https://ubuntu.com/security/CVE-2025-38011",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-21931",
                        "url": "https://ubuntu.com/security/CVE-2025-21931",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37960",
                        "url": "https://ubuntu.com/security/CVE-2025-37960",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37967",
                        "url": "https://ubuntu.com/security/CVE-2025-37967",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-22102",
                        "url": "https://ubuntu.com/security/CVE-2025-22102",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38008",
                        "url": "https://ubuntu.com/security/CVE-2025-38008",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38014",
                        "url": "https://ubuntu.com/security/CVE-2025-38014",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38015",
                        "url": "https://ubuntu.com/security/CVE-2025-38015",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38005",
                        "url": "https://ubuntu.com/security/CVE-2025-38005",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38009",
                        "url": "https://ubuntu.com/security/CVE-2025-38009",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38010",
                        "url": "https://ubuntu.com/security/CVE-2025-38010",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38095",
                        "url": "https://ubuntu.com/security/CVE-2025-38095",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38018",
                        "url": "https://ubuntu.com/security/CVE-2025-38018",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38019",
                        "url": "https://ubuntu.com/security/CVE-2025-38019",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38013",
                        "url": "https://ubuntu.com/security/CVE-2025-38013",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38027",
                        "url": "https://ubuntu.com/security/CVE-2025-38027",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38020",
                        "url": "https://ubuntu.com/security/CVE-2025-38020",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38094",
                        "url": "https://ubuntu.com/security/CVE-2025-38094",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38006",
                        "url": "https://ubuntu.com/security/CVE-2025-38006",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37992",
                        "url": "https://ubuntu.com/security/CVE-2025-37992",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38023",
                        "url": "https://ubuntu.com/security/CVE-2025-38023",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38007",
                        "url": "https://ubuntu.com/security/CVE-2025-38007",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38024",
                        "url": "https://ubuntu.com/security/CVE-2025-38024",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37957",
                        "url": "https://ubuntu.com/security/CVE-2025-37957",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37963",
                        "url": "https://ubuntu.com/security/CVE-2025-37963",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37948",
                        "url": "https://ubuntu.com/security/CVE-2025-37948",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37994",
                        "url": "https://ubuntu.com/security/CVE-2025-37994",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37995",
                        "url": "https://ubuntu.com/security/CVE-2025-37995",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37949",
                        "url": "https://ubuntu.com/security/CVE-2025-37949",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37954",
                        "url": "https://ubuntu.com/security/CVE-2025-37954",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37951",
                        "url": "https://ubuntu.com/security/CVE-2025-37951",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37969",
                        "url": "https://ubuntu.com/security/CVE-2025-37969",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37970",
                        "url": "https://ubuntu.com/security/CVE-2025-37970",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37972",
                        "url": "https://ubuntu.com/security/CVE-2025-37972",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37959",
                        "url": "https://ubuntu.com/security/CVE-2025-37959",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37961",
                        "url": "https://ubuntu.com/security/CVE-2025-37961",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37998",
                        "url": "https://ubuntu.com/security/CVE-2025-37998",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37952",
                        "url": "https://ubuntu.com/security/CVE-2025-37952",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37947",
                        "url": "https://ubuntu.com/security/CVE-2025-37947",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37956",
                        "url": "https://ubuntu.com/security/CVE-2025-37956",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37973",
                        "url": "https://ubuntu.com/security/CVE-2025-37973",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37920",
                        "url": "https://ubuntu.com/security/CVE-2025-37920",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37900",
                        "url": "https://ubuntu.com/security/CVE-2025-37900",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37931",
                        "url": "https://ubuntu.com/security/CVE-2025-37931",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37903",
                        "url": "https://ubuntu.com/security/CVE-2025-37903",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37905",
                        "url": "https://ubuntu.com/security/CVE-2025-37905",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37933",
                        "url": "https://ubuntu.com/security/CVE-2025-37933",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37909",
                        "url": "https://ubuntu.com/security/CVE-2025-37909",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37911",
                        "url": "https://ubuntu.com/security/CVE-2025-37911",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37935",
                        "url": "https://ubuntu.com/security/CVE-2025-37935",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37891",
                        "url": "https://ubuntu.com/security/CVE-2025-37891",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37912",
                        "url": "https://ubuntu.com/security/CVE-2025-37912",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37913",
                        "url": "https://ubuntu.com/security/CVE-2025-37913",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37914",
                        "url": "https://ubuntu.com/security/CVE-2025-37914",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37915",
                        "url": "https://ubuntu.com/security/CVE-2025-37915",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37916",
                        "url": "https://ubuntu.com/security/CVE-2025-37916",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37917",
                        "url": "https://ubuntu.com/security/CVE-2025-37917",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37918",
                        "url": "https://ubuntu.com/security/CVE-2025-37918",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37921",
                        "url": "https://ubuntu.com/security/CVE-2025-37921",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37897",
                        "url": "https://ubuntu.com/security/CVE-2025-37897",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37922",
                        "url": "https://ubuntu.com/security/CVE-2025-37922",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37923",
                        "url": "https://ubuntu.com/security/CVE-2025-37923",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37924",
                        "url": "https://ubuntu.com/security/CVE-2025-37924",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37927",
                        "url": "https://ubuntu.com/security/CVE-2025-37927",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37928",
                        "url": "https://ubuntu.com/security/CVE-2025-37928",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37990",
                        "url": "https://ubuntu.com/security/CVE-2025-37990",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37901",
                        "url": "https://ubuntu.com/security/CVE-2025-37901",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37936",
                        "url": "https://ubuntu.com/security/CVE-2025-37936",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37991",
                        "url": "https://ubuntu.com/security/CVE-2025-37991",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37930",
                        "url": "https://ubuntu.com/security/CVE-2025-37930",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37986",
                        "url": "https://ubuntu.com/security/CVE-2025-37986",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37809",
                        "url": "https://ubuntu.com/security/CVE-2025-37809",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37816",
                        "url": "https://ubuntu.com/security/CVE-2025-37816",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37822",
                        "url": "https://ubuntu.com/security/CVE-2025-37822",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37987",
                        "url": "https://ubuntu.com/security/CVE-2025-37987",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37826",
                        "url": "https://ubuntu.com/security/CVE-2025-37826",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37827",
                        "url": "https://ubuntu.com/security/CVE-2025-37827",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37977",
                        "url": "https://ubuntu.com/security/CVE-2025-37977",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37944",
                        "url": "https://ubuntu.com/security/CVE-2025-37944",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37761",
                        "url": "https://ubuntu.com/security/CVE-2025-37761",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37763",
                        "url": "https://ubuntu.com/security/CVE-2025-37763",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37764",
                        "url": "https://ubuntu.com/security/CVE-2025-37764",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37869",
                        "url": "https://ubuntu.com/security/CVE-2025-37869",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37978",
                        "url": "https://ubuntu.com/security/CVE-2025-37978",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37975",
                        "url": "https://ubuntu.com/security/CVE-2025-37975",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37872",
                        "url": "https://ubuntu.com/security/CVE-2025-37872",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37873",
                        "url": "https://ubuntu.com/security/CVE-2025-37873",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-22120",
                        "url": "https://ubuntu.com/security/CVE-2025-22120",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37799",
                        "url": "https://ubuntu.com/security/CVE-2025-37799",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37800",
                        "url": "https://ubuntu.com/security/CVE-2025-37800",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37878",
                        "url": "https://ubuntu.com/security/CVE-2025-37878",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37803",
                        "url": "https://ubuntu.com/security/CVE-2025-37803",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37879",
                        "url": "https://ubuntu.com/security/CVE-2025-37879",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37983",
                        "url": "https://ubuntu.com/security/CVE-2025-37983",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37881",
                        "url": "https://ubuntu.com/security/CVE-2025-37881",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37805",
                        "url": "https://ubuntu.com/security/CVE-2025-37805",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37883",
                        "url": "https://ubuntu.com/security/CVE-2025-37883",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37884",
                        "url": "https://ubuntu.com/security/CVE-2025-37884",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37808",
                        "url": "https://ubuntu.com/security/CVE-2025-37808",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37985",
                        "url": "https://ubuntu.com/security/CVE-2025-37985",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37810",
                        "url": "https://ubuntu.com/security/CVE-2025-37810",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37811",
                        "url": "https://ubuntu.com/security/CVE-2025-37811",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37812",
                        "url": "https://ubuntu.com/security/CVE-2025-37812",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37813",
                        "url": "https://ubuntu.com/security/CVE-2025-37813",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37815",
                        "url": "https://ubuntu.com/security/CVE-2025-37815",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37885",
                        "url": "https://ubuntu.com/security/CVE-2025-37885",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37817",
                        "url": "https://ubuntu.com/security/CVE-2025-37817",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37819",
                        "url": "https://ubuntu.com/security/CVE-2025-37819",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37820",
                        "url": "https://ubuntu.com/security/CVE-2025-37820",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37886",
                        "url": "https://ubuntu.com/security/CVE-2025-37886",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37887",
                        "url": "https://ubuntu.com/security/CVE-2025-37887",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37823",
                        "url": "https://ubuntu.com/security/CVE-2025-37823",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37988",
                        "url": "https://ubuntu.com/security/CVE-2025-37988",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37824",
                        "url": "https://ubuntu.com/security/CVE-2025-37824",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37989",
                        "url": "https://ubuntu.com/security/CVE-2025-37989",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37828",
                        "url": "https://ubuntu.com/security/CVE-2025-37828",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37829",
                        "url": "https://ubuntu.com/security/CVE-2025-37829",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37830",
                        "url": "https://ubuntu.com/security/CVE-2025-37830",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37831",
                        "url": "https://ubuntu.com/security/CVE-2025-37831",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37938",
                        "url": "https://ubuntu.com/security/CVE-2025-37938",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39989",
                        "url": "https://ubuntu.com/security/CVE-2025-39989",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-22026",
                        "url": "https://ubuntu.com/security/CVE-2025-22026",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37836",
                        "url": "https://ubuntu.com/security/CVE-2025-37836",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37846",
                        "url": "https://ubuntu.com/security/CVE-2025-37846",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37942",
                        "url": "https://ubuntu.com/security/CVE-2025-37942",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37856",
                        "url": "https://ubuntu.com/security/CVE-2025-37856",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37861",
                        "url": "https://ubuntu.com/security/CVE-2025-37861",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37744",
                        "url": "https://ubuntu.com/security/CVE-2025-37744",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37745",
                        "url": "https://ubuntu.com/security/CVE-2025-37745",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37945",
                        "url": "https://ubuntu.com/security/CVE-2025-37945",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37759",
                        "url": "https://ubuntu.com/security/CVE-2025-37759",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23140",
                        "url": "https://ubuntu.com/security/CVE-2025-23140",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-22126",
                        "url": "https://ubuntu.com/security/CVE-2025-22126",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37765",
                        "url": "https://ubuntu.com/security/CVE-2025-37765",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37766",
                        "url": "https://ubuntu.com/security/CVE-2025-37766",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37767",
                        "url": "https://ubuntu.com/security/CVE-2025-37767",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37768",
                        "url": "https://ubuntu.com/security/CVE-2025-37768",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37769",
                        "url": "https://ubuntu.com/security/CVE-2025-37769",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37770",
                        "url": "https://ubuntu.com/security/CVE-2025-37770",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37771",
                        "url": "https://ubuntu.com/security/CVE-2025-37771",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37772",
                        "url": "https://ubuntu.com/security/CVE-2025-37772",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37773",
                        "url": "https://ubuntu.com/security/CVE-2025-37773",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37775",
                        "url": "https://ubuntu.com/security/CVE-2025-37775",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37778",
                        "url": "https://ubuntu.com/security/CVE-2025-37778",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37863",
                        "url": "https://ubuntu.com/security/CVE-2025-37863",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37780",
                        "url": "https://ubuntu.com/security/CVE-2025-37780",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37781",
                        "url": "https://ubuntu.com/security/CVE-2025-37781",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37979",
                        "url": "https://ubuntu.com/security/CVE-2025-37979",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37784",
                        "url": "https://ubuntu.com/security/CVE-2025-37784",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37786",
                        "url": "https://ubuntu.com/security/CVE-2025-37786",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37864",
                        "url": "https://ubuntu.com/security/CVE-2025-37864",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37865",
                        "url": "https://ubuntu.com/security/CVE-2025-37865",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37787",
                        "url": "https://ubuntu.com/security/CVE-2025-37787",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37788",
                        "url": "https://ubuntu.com/security/CVE-2025-37788",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37874",
                        "url": "https://ubuntu.com/security/CVE-2025-37874",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37789",
                        "url": "https://ubuntu.com/security/CVE-2025-37789",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37980",
                        "url": "https://ubuntu.com/security/CVE-2025-37980",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37790",
                        "url": "https://ubuntu.com/security/CVE-2025-37790",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37875",
                        "url": "https://ubuntu.com/security/CVE-2025-37875",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37792",
                        "url": "https://ubuntu.com/security/CVE-2025-37792",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37867",
                        "url": "https://ubuntu.com/security/CVE-2025-37867",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37793",
                        "url": "https://ubuntu.com/security/CVE-2025-37793",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37982",
                        "url": "https://ubuntu.com/security/CVE-2025-37982",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37794",
                        "url": "https://ubuntu.com/security/CVE-2025-37794",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37796",
                        "url": "https://ubuntu.com/security/CVE-2025-37796",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23141",
                        "url": "https://ubuntu.com/security/CVE-2025-23141",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37940",
                        "url": "https://ubuntu.com/security/CVE-2025-37940",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37844",
                        "url": "https://ubuntu.com/security/CVE-2025-37844",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23142",
                        "url": "https://ubuntu.com/security/CVE-2025-23142",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23144",
                        "url": "https://ubuntu.com/security/CVE-2025-23144",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37892",
                        "url": "https://ubuntu.com/security/CVE-2025-37892",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23145",
                        "url": "https://ubuntu.com/security/CVE-2025-23145",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23146",
                        "url": "https://ubuntu.com/security/CVE-2025-23146",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37839",
                        "url": "https://ubuntu.com/security/CVE-2025-37839",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23147",
                        "url": "https://ubuntu.com/security/CVE-2025-23147",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23148",
                        "url": "https://ubuntu.com/security/CVE-2025-23148",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23149",
                        "url": "https://ubuntu.com/security/CVE-2025-23149",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23150",
                        "url": "https://ubuntu.com/security/CVE-2025-23150",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23151",
                        "url": "https://ubuntu.com/security/CVE-2025-23151",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23156",
                        "url": "https://ubuntu.com/security/CVE-2025-23156",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23157",
                        "url": "https://ubuntu.com/security/CVE-2025-23157",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37840",
                        "url": "https://ubuntu.com/security/CVE-2025-37840",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37849",
                        "url": "https://ubuntu.com/security/CVE-2025-37849",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23158",
                        "url": "https://ubuntu.com/security/CVE-2025-23158",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23159",
                        "url": "https://ubuntu.com/security/CVE-2025-23159",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23160",
                        "url": "https://ubuntu.com/security/CVE-2025-23160",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37850",
                        "url": "https://ubuntu.com/security/CVE-2025-37850",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37851",
                        "url": "https://ubuntu.com/security/CVE-2025-37851",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23161",
                        "url": "https://ubuntu.com/security/CVE-2025-23161",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37852",
                        "url": "https://ubuntu.com/security/CVE-2025-37852",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37853",
                        "url": "https://ubuntu.com/security/CVE-2025-37853",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37854",
                        "url": "https://ubuntu.com/security/CVE-2025-37854",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23163",
                        "url": "https://ubuntu.com/security/CVE-2025-23163",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37857",
                        "url": "https://ubuntu.com/security/CVE-2025-37857",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37738",
                        "url": "https://ubuntu.com/security/CVE-2025-37738",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37739",
                        "url": "https://ubuntu.com/security/CVE-2025-37739",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37943",
                        "url": "https://ubuntu.com/security/CVE-2025-37943",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37740",
                        "url": "https://ubuntu.com/security/CVE-2025-37740",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37741",
                        "url": "https://ubuntu.com/security/CVE-2025-37741",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37858",
                        "url": "https://ubuntu.com/security/CVE-2025-37858",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37742",
                        "url": "https://ubuntu.com/security/CVE-2025-37742",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37859",
                        "url": "https://ubuntu.com/security/CVE-2025-37859",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37862",
                        "url": "https://ubuntu.com/security/CVE-2025-37862",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37841",
                        "url": "https://ubuntu.com/security/CVE-2025-37841",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37748",
                        "url": "https://ubuntu.com/security/CVE-2025-37748",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37749",
                        "url": "https://ubuntu.com/security/CVE-2025-37749",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37754",
                        "url": "https://ubuntu.com/security/CVE-2025-37754",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37755",
                        "url": "https://ubuntu.com/security/CVE-2025-37755",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37757",
                        "url": "https://ubuntu.com/security/CVE-2025-37757",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37758",
                        "url": "https://ubuntu.com/security/CVE-2025-37758",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37801",
                        "url": "https://ubuntu.com/security/CVE-2025-37801",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39946",
                        "url": "https://ubuntu.com/security/CVE-2025-39946",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38584",
                        "url": "https://ubuntu.com/security/CVE-2025-38584",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40019",
                        "url": "https://ubuntu.com/security/CVE-2025-40019",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38561",
                        "url": "https://ubuntu.com/security/CVE-2025-38561",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39698",
                        "url": "https://ubuntu.com/security/CVE-2025-39698",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [
                    2138307,
                    2122531,
                    2138244,
                    2137901,
                    1786013,
                    2136820,
                    2137528,
                    2130244,
                    2128722,
                    2131265,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2135716,
                    2135261,
                    1928890,
                    2112357,
                    2096976,
                    2012859,
                    2031531,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136361,
                    2136361,
                    2136361,
                    2136361,
                    2136361,
                    2136361,
                    2136361,
                    2136361,
                    2136361,
                    2136361,
                    2136361,
                    2136361,
                    2136361,
                    2136361,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2134382,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2132317,
                    2065369,
                    2071861,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2131046,
                    2083800,
                    2127971,
                    2102077,
                    2121997,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130277,
                    2130277,
                    2130277,
                    2130277,
                    2130277,
                    2130277,
                    2130277,
                    2130277,
                    2130277,
                    2130277,
                    2130277,
                    2130277,
                    2130277,
                    2130277,
                    2130277,
                    2130277,
                    2130277,
                    2130277,
                    2130277,
                    2130277,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * noble/linux: 6.8.0-100.100 -proposed tracker (LP: #2138307)",
                            "",
                            "  * Turbo boost stuck disabled on Clevo PD5x_7xSNC_SND_SNE (LP: #2122531)",
                            "    - cpufreq: intel_pstate: Check IDA only before MSR_IA32_PERF_CTL writes",
                            "",
                            "  * [noble] write-sealed memfd mappings fail to map read-only (LP: #2138244)",
                            "    - SAUCE: Fix read-only mapping of write-sealed pages",
                            ""
                        ],
                        "package": "linux",
                        "version": "6.8.0-100.100",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2138307,
                            2122531,
                            2138244
                        ],
                        "author": "Stefan Bader <stefan.bader@canonical.com>",
                        "date": "Tue, 13 Jan 2026 14:56:02 +0100"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-39779",
                                "url": "https://ubuntu.com/security/CVE-2025-39779",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39759",
                                "url": "https://ubuntu.com/security/CVE-2025-39759",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39705",
                                "url": "https://ubuntu.com/security/CVE-2025-39705",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39707",
                                "url": "https://ubuntu.com/security/CVE-2025-39707",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39712",
                                "url": "https://ubuntu.com/security/CVE-2025-39712",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38686",
                                "url": "https://ubuntu.com/security/CVE-2025-38686",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38703",
                                "url": "https://ubuntu.com/security/CVE-2025-38703",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39746",
                                "url": "https://ubuntu.com/security/CVE-2025-39746",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39747",
                                "url": "https://ubuntu.com/security/CVE-2025-39747",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38704",
                                "url": "https://ubuntu.com/security/CVE-2025-38704",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39748",
                                "url": "https://ubuntu.com/security/CVE-2025-39748",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38705",
                                "url": "https://ubuntu.com/security/CVE-2025-38705",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38710",
                                "url": "https://ubuntu.com/security/CVE-2025-38710",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38722",
                                "url": "https://ubuntu.com/security/CVE-2025-38722",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38732",
                                "url": "https://ubuntu.com/security/CVE-2025-38732",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39766",
                                "url": "https://ubuntu.com/security/CVE-2025-39766",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38734",
                                "url": "https://ubuntu.com/security/CVE-2025-38734",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38735",
                                "url": "https://ubuntu.com/security/CVE-2025-38735",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39673",
                                "url": "https://ubuntu.com/security/CVE-2025-39673",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39770",
                                "url": "https://ubuntu.com/security/CVE-2025-39770",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39675",
                                "url": "https://ubuntu.com/security/CVE-2025-39675",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39772",
                                "url": "https://ubuntu.com/security/CVE-2025-39772",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38676",
                                "url": "https://ubuntu.com/security/CVE-2025-38676",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39676",
                                "url": "https://ubuntu.com/security/CVE-2025-39676",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39773",
                                "url": "https://ubuntu.com/security/CVE-2025-39773",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39679",
                                "url": "https://ubuntu.com/security/CVE-2025-39679",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39681",
                                "url": "https://ubuntu.com/security/CVE-2025-39681",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39687",
                                "url": "https://ubuntu.com/security/CVE-2025-39687",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39683",
                                "url": "https://ubuntu.com/security/CVE-2025-39683",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39801",
                                "url": "https://ubuntu.com/security/CVE-2025-39801",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39684",
                                "url": "https://ubuntu.com/security/CVE-2025-39684",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39685",
                                "url": "https://ubuntu.com/security/CVE-2025-39685",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39686",
                                "url": "https://ubuntu.com/security/CVE-2025-39686",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39689",
                                "url": "https://ubuntu.com/security/CVE-2025-39689",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39691",
                                "url": "https://ubuntu.com/security/CVE-2025-39691",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39692",
                                "url": "https://ubuntu.com/security/CVE-2025-39692",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39788",
                                "url": "https://ubuntu.com/security/CVE-2025-39788",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39693",
                                "url": "https://ubuntu.com/security/CVE-2025-39693",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39694",
                                "url": "https://ubuntu.com/security/CVE-2025-39694",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39776",
                                "url": "https://ubuntu.com/security/CVE-2025-39776",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38681",
                                "url": "https://ubuntu.com/security/CVE-2025-38681",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39800",
                                "url": "https://ubuntu.com/security/CVE-2025-39800",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38684",
                                "url": "https://ubuntu.com/security/CVE-2025-38684",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-21884",
                                "url": "https://ubuntu.com/security/CVE-2025-21884",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39701",
                                "url": "https://ubuntu.com/security/CVE-2025-39701",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39702",
                                "url": "https://ubuntu.com/security/CVE-2025-39702",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39703",
                                "url": "https://ubuntu.com/security/CVE-2025-39703",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39706",
                                "url": "https://ubuntu.com/security/CVE-2025-39706",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39709",
                                "url": "https://ubuntu.com/security/CVE-2025-39709",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39710",
                                "url": "https://ubuntu.com/security/CVE-2025-39710",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39711",
                                "url": "https://ubuntu.com/security/CVE-2025-39711",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39713",
                                "url": "https://ubuntu.com/security/CVE-2025-39713",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39714",
                                "url": "https://ubuntu.com/security/CVE-2025-39714",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39715",
                                "url": "https://ubuntu.com/security/CVE-2025-39715",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39716",
                                "url": "https://ubuntu.com/security/CVE-2025-39716",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39781",
                                "url": "https://ubuntu.com/security/CVE-2025-39781",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39782",
                                "url": "https://ubuntu.com/security/CVE-2025-39782",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38677",
                                "url": "https://ubuntu.com/security/CVE-2025-38677",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39718",
                                "url": "https://ubuntu.com/security/CVE-2025-39718",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39783",
                                "url": "https://ubuntu.com/security/CVE-2025-39783",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39719",
                                "url": "https://ubuntu.com/security/CVE-2025-39719",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39787",
                                "url": "https://ubuntu.com/security/CVE-2025-39787",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39720",
                                "url": "https://ubuntu.com/security/CVE-2025-39720",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39721",
                                "url": "https://ubuntu.com/security/CVE-2025-39721",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39790",
                                "url": "https://ubuntu.com/security/CVE-2025-39790",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39724",
                                "url": "https://ubuntu.com/security/CVE-2025-39724",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39758",
                                "url": "https://ubuntu.com/security/CVE-2025-39758",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38679",
                                "url": "https://ubuntu.com/security/CVE-2025-38679",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38680",
                                "url": "https://ubuntu.com/security/CVE-2025-38680",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39736",
                                "url": "https://ubuntu.com/security/CVE-2025-39736",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39737",
                                "url": "https://ubuntu.com/security/CVE-2025-39737",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38683",
                                "url": "https://ubuntu.com/security/CVE-2025-38683",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38685",
                                "url": "https://ubuntu.com/security/CVE-2025-38685",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39738",
                                "url": "https://ubuntu.com/security/CVE-2025-39738",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38687",
                                "url": "https://ubuntu.com/security/CVE-2025-38687",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39760",
                                "url": "https://ubuntu.com/security/CVE-2025-39760",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38688",
                                "url": "https://ubuntu.com/security/CVE-2025-38688",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39739",
                                "url": "https://ubuntu.com/security/CVE-2025-39739",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38691",
                                "url": "https://ubuntu.com/security/CVE-2025-38691",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39795",
                                "url": "https://ubuntu.com/security/CVE-2025-39795",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38692",
                                "url": "https://ubuntu.com/security/CVE-2025-38692",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38693",
                                "url": "https://ubuntu.com/security/CVE-2025-38693",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38694",
                                "url": "https://ubuntu.com/security/CVE-2025-38694",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38695",
                                "url": "https://ubuntu.com/security/CVE-2025-38695",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39742",
                                "url": "https://ubuntu.com/security/CVE-2025-39742",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38696",
                                "url": "https://ubuntu.com/security/CVE-2025-38696",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38697",
                                "url": "https://ubuntu.com/security/CVE-2025-38697",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38698",
                                "url": "https://ubuntu.com/security/CVE-2025-38698",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39743",
                                "url": "https://ubuntu.com/security/CVE-2025-39743",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38699",
                                "url": "https://ubuntu.com/security/CVE-2025-38699",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38700",
                                "url": "https://ubuntu.com/security/CVE-2025-38700",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38701",
                                "url": "https://ubuntu.com/security/CVE-2025-38701",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38702",
                                "url": "https://ubuntu.com/security/CVE-2025-38702",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39744",
                                "url": "https://ubuntu.com/security/CVE-2025-39744",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39761",
                                "url": "https://ubuntu.com/security/CVE-2025-39761",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39797",
                                "url": "https://ubuntu.com/security/CVE-2025-39797",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39749",
                                "url": "https://ubuntu.com/security/CVE-2025-39749",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39750",
                                "url": "https://ubuntu.com/security/CVE-2025-39750",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38706",
                                "url": "https://ubuntu.com/security/CVE-2025-38706",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39794",
                                "url": "https://ubuntu.com/security/CVE-2025-39794",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39752",
                                "url": "https://ubuntu.com/security/CVE-2025-39752",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39763",
                                "url": "https://ubuntu.com/security/CVE-2025-39763",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38707",
                                "url": "https://ubuntu.com/security/CVE-2025-38707",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38708",
                                "url": "https://ubuntu.com/security/CVE-2025-38708",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39753",
                                "url": "https://ubuntu.com/security/CVE-2025-39753",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38711",
                                "url": "https://ubuntu.com/security/CVE-2025-38711",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38712",
                                "url": "https://ubuntu.com/security/CVE-2025-38712",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38713",
                                "url": "https://ubuntu.com/security/CVE-2025-38713",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38714",
                                "url": "https://ubuntu.com/security/CVE-2025-38714",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38715",
                                "url": "https://ubuntu.com/security/CVE-2025-38715",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38716",
                                "url": "https://ubuntu.com/security/CVE-2025-38716",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38718",
                                "url": "https://ubuntu.com/security/CVE-2025-38718",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38721",
                                "url": "https://ubuntu.com/security/CVE-2025-38721",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38614",
                                "url": "https://ubuntu.com/security/CVE-2025-38614",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39756",
                                "url": "https://ubuntu.com/security/CVE-2025-39756",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39798",
                                "url": "https://ubuntu.com/security/CVE-2025-39798",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38724",
                                "url": "https://ubuntu.com/security/CVE-2025-38724",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38730",
                                "url": "https://ubuntu.com/security/CVE-2025-38730",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38725",
                                "url": "https://ubuntu.com/security/CVE-2025-38725",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38728",
                                "url": "https://ubuntu.com/security/CVE-2025-38728",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39757",
                                "url": "https://ubuntu.com/security/CVE-2025-39757",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38729",
                                "url": "https://ubuntu.com/security/CVE-2025-38729",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40297",
                                "url": "https://ubuntu.com/security/CVE-2025-40297",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40256",
                                "url": "https://ubuntu.com/security/CVE-2025-40256",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40215",
                                "url": "https://ubuntu.com/security/CVE-2025-40215",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40214",
                                "url": "https://ubuntu.com/security/CVE-2025-40214",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38248",
                                "url": "https://ubuntu.com/security/CVE-2025-38248",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38619",
                                "url": "https://ubuntu.com/security/CVE-2025-38619",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38582",
                                "url": "https://ubuntu.com/security/CVE-2025-38582",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38585",
                                "url": "https://ubuntu.com/security/CVE-2025-38585",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38593",
                                "url": "https://ubuntu.com/security/CVE-2025-38593",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39732",
                                "url": "https://ubuntu.com/security/CVE-2025-39732",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38595",
                                "url": "https://ubuntu.com/security/CVE-2025-38595",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38660",
                                "url": "https://ubuntu.com/security/CVE-2025-38660",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38555",
                                "url": "https://ubuntu.com/security/CVE-2025-38555",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2024-36331",
                                "url": "https://ubuntu.com/security/CVE-2024-36331",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38560",
                                "url": "https://ubuntu.com/security/CVE-2025-38560",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38501",
                                "url": "https://ubuntu.com/security/CVE-2025-38501",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38562",
                                "url": "https://ubuntu.com/security/CVE-2025-38562",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38566",
                                "url": "https://ubuntu.com/security/CVE-2025-38566",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38568",
                                "url": "https://ubuntu.com/security/CVE-2025-38568",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38571",
                                "url": "https://ubuntu.com/security/CVE-2025-38571",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38622",
                                "url": "https://ubuntu.com/security/CVE-2025-38622",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38572",
                                "url": "https://ubuntu.com/security/CVE-2025-38572",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38574",
                                "url": "https://ubuntu.com/security/CVE-2025-38574",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39730",
                                "url": "https://ubuntu.com/security/CVE-2025-39730",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38623",
                                "url": "https://ubuntu.com/security/CVE-2025-38623",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38576",
                                "url": "https://ubuntu.com/security/CVE-2025-38576",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38624",
                                "url": "https://ubuntu.com/security/CVE-2025-38624",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38625",
                                "url": "https://ubuntu.com/security/CVE-2025-38625",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38626",
                                "url": "https://ubuntu.com/security/CVE-2025-38626",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39731",
                                "url": "https://ubuntu.com/security/CVE-2025-39731",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38652",
                                "url": "https://ubuntu.com/security/CVE-2025-38652",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38577",
                                "url": "https://ubuntu.com/security/CVE-2025-38577",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38578",
                                "url": "https://ubuntu.com/security/CVE-2025-38578",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38579",
                                "url": "https://ubuntu.com/security/CVE-2025-38579",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38630",
                                "url": "https://ubuntu.com/security/CVE-2025-38630",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38632",
                                "url": "https://ubuntu.com/security/CVE-2025-38632",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38653",
                                "url": "https://ubuntu.com/security/CVE-2025-38653",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38581",
                                "url": "https://ubuntu.com/security/CVE-2025-38581",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38634",
                                "url": "https://ubuntu.com/security/CVE-2025-38634",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38583",
                                "url": "https://ubuntu.com/security/CVE-2025-38583",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38635",
                                "url": "https://ubuntu.com/security/CVE-2025-38635",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38587",
                                "url": "https://ubuntu.com/security/CVE-2025-38587",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38588",
                                "url": "https://ubuntu.com/security/CVE-2025-38588",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38590",
                                "url": "https://ubuntu.com/security/CVE-2025-38590",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38639",
                                "url": "https://ubuntu.com/security/CVE-2025-38639",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38640",
                                "url": "https://ubuntu.com/security/CVE-2025-38640",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38644",
                                "url": "https://ubuntu.com/security/CVE-2025-38644",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38553",
                                "url": "https://ubuntu.com/security/CVE-2025-38553",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38645",
                                "url": "https://ubuntu.com/security/CVE-2025-38645",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38601",
                                "url": "https://ubuntu.com/security/CVE-2025-38601",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38602",
                                "url": "https://ubuntu.com/security/CVE-2025-38602",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38604",
                                "url": "https://ubuntu.com/security/CVE-2025-38604",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38646",
                                "url": "https://ubuntu.com/security/CVE-2025-38646",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38608",
                                "url": "https://ubuntu.com/security/CVE-2025-38608",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38609",
                                "url": "https://ubuntu.com/security/CVE-2025-38609",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38610",
                                "url": "https://ubuntu.com/security/CVE-2025-38610",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38612",
                                "url": "https://ubuntu.com/security/CVE-2025-38612",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38648",
                                "url": "https://ubuntu.com/security/CVE-2025-38648",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38659",
                                "url": "https://ubuntu.com/security/CVE-2025-38659",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39734",
                                "url": "https://ubuntu.com/security/CVE-2025-39734",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38650",
                                "url": "https://ubuntu.com/security/CVE-2025-38650",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38615",
                                "url": "https://ubuntu.com/security/CVE-2025-38615",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38351",
                                "url": "https://ubuntu.com/security/CVE-2025-38351",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38675",
                                "url": "https://ubuntu.com/security/CVE-2025-38675",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38322",
                                "url": "https://ubuntu.com/security/CVE-2025-38322",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37777",
                                "url": "https://ubuntu.com/security/CVE-2025-37777",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37925",
                                "url": "https://ubuntu.com/security/CVE-2025-37925",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38663",
                                "url": "https://ubuntu.com/security/CVE-2025-38663",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38664",
                                "url": "https://ubuntu.com/security/CVE-2025-38664",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38670",
                                "url": "https://ubuntu.com/security/CVE-2025-38670",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38671",
                                "url": "https://ubuntu.com/security/CVE-2025-38671",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39726",
                                "url": "https://ubuntu.com/security/CVE-2025-39726",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38665",
                                "url": "https://ubuntu.com/security/CVE-2025-38665",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38668",
                                "url": "https://ubuntu.com/security/CVE-2025-38668",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38335",
                                "url": "https://ubuntu.com/security/CVE-2025-38335",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-22115",
                                "url": "https://ubuntu.com/security/CVE-2025-22115",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38549",
                                "url": "https://ubuntu.com/security/CVE-2025-38549",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38551",
                                "url": "https://ubuntu.com/security/CVE-2025-38551",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38531",
                                "url": "https://ubuntu.com/security/CVE-2025-38531",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38552",
                                "url": "https://ubuntu.com/security/CVE-2025-38552",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38491",
                                "url": "https://ubuntu.com/security/CVE-2025-38491",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38469",
                                "url": "https://ubuntu.com/security/CVE-2025-38469",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38499",
                                "url": "https://ubuntu.com/security/CVE-2025-38499",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38524",
                                "url": "https://ubuntu.com/security/CVE-2025-38524",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38468",
                                "url": "https://ubuntu.com/security/CVE-2025-38468",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38470",
                                "url": "https://ubuntu.com/security/CVE-2025-38470",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38471",
                                "url": "https://ubuntu.com/security/CVE-2025-38471",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38472",
                                "url": "https://ubuntu.com/security/CVE-2025-38472",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38550",
                                "url": "https://ubuntu.com/security/CVE-2025-38550",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38473",
                                "url": "https://ubuntu.com/security/CVE-2025-38473",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38474",
                                "url": "https://ubuntu.com/security/CVE-2025-38474",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38526",
                                "url": "https://ubuntu.com/security/CVE-2025-38526",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38548",
                                "url": "https://ubuntu.com/security/CVE-2025-38548",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38537",
                                "url": "https://ubuntu.com/security/CVE-2025-38537",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38527",
                                "url": "https://ubuntu.com/security/CVE-2025-38527",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38476",
                                "url": "https://ubuntu.com/security/CVE-2025-38476",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38528",
                                "url": "https://ubuntu.com/security/CVE-2025-38528",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38478",
                                "url": "https://ubuntu.com/security/CVE-2025-38478",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38480",
                                "url": "https://ubuntu.com/security/CVE-2025-38480",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38481",
                                "url": "https://ubuntu.com/security/CVE-2025-38481",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38482",
                                "url": "https://ubuntu.com/security/CVE-2025-38482",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38483",
                                "url": "https://ubuntu.com/security/CVE-2025-38483",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38529",
                                "url": "https://ubuntu.com/security/CVE-2025-38529",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38530",
                                "url": "https://ubuntu.com/security/CVE-2025-38530",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38485",
                                "url": "https://ubuntu.com/security/CVE-2025-38485",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38487",
                                "url": "https://ubuntu.com/security/CVE-2025-38487",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2024-50047",
                                "url": "https://ubuntu.com/security/CVE-2024-50047",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38488",
                                "url": "https://ubuntu.com/security/CVE-2025-38488",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38489",
                                "url": "https://ubuntu.com/security/CVE-2025-38489",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38532",
                                "url": "https://ubuntu.com/security/CVE-2025-38532",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38533",
                                "url": "https://ubuntu.com/security/CVE-2025-38533",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38490",
                                "url": "https://ubuntu.com/security/CVE-2025-38490",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38538",
                                "url": "https://ubuntu.com/security/CVE-2025-38538",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38493",
                                "url": "https://ubuntu.com/security/CVE-2025-38493",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38539",
                                "url": "https://ubuntu.com/security/CVE-2025-38539",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38494",
                                "url": "https://ubuntu.com/security/CVE-2025-38494",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38495",
                                "url": "https://ubuntu.com/security/CVE-2025-38495",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38496",
                                "url": "https://ubuntu.com/security/CVE-2025-38496",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38497",
                                "url": "https://ubuntu.com/security/CVE-2025-38497",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38535",
                                "url": "https://ubuntu.com/security/CVE-2025-38535",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38507",
                                "url": "https://ubuntu.com/security/CVE-2025-38507",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38511",
                                "url": "https://ubuntu.com/security/CVE-2025-38511",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38520",
                                "url": "https://ubuntu.com/security/CVE-2025-38520",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38521",
                                "url": "https://ubuntu.com/security/CVE-2025-38521",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38506",
                                "url": "https://ubuntu.com/security/CVE-2025-38506",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38104",
                                "url": "https://ubuntu.com/security/CVE-2025-38104",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38067",
                                "url": "https://ubuntu.com/security/CVE-2025-38067",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37984",
                                "url": "https://ubuntu.com/security/CVE-2025-37984",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38437",
                                "url": "https://ubuntu.com/security/CVE-2025-38437",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38510",
                                "url": "https://ubuntu.com/security/CVE-2025-38510",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38503",
                                "url": "https://ubuntu.com/security/CVE-2025-38503",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38439",
                                "url": "https://ubuntu.com/security/CVE-2025-38439",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38542",
                                "url": "https://ubuntu.com/security/CVE-2025-38542",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38441",
                                "url": "https://ubuntu.com/security/CVE-2025-38441",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38443",
                                "url": "https://ubuntu.com/security/CVE-2025-38443",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38444",
                                "url": "https://ubuntu.com/security/CVE-2025-38444",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38445",
                                "url": "https://ubuntu.com/security/CVE-2025-38445",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38543",
                                "url": "https://ubuntu.com/security/CVE-2025-38543",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38513",
                                "url": "https://ubuntu.com/security/CVE-2025-38513",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38448",
                                "url": "https://ubuntu.com/security/CVE-2025-38448",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38515",
                                "url": "https://ubuntu.com/security/CVE-2025-38515",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38449",
                                "url": "https://ubuntu.com/security/CVE-2025-38449",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38512",
                                "url": "https://ubuntu.com/security/CVE-2025-38512",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38516",
                                "url": "https://ubuntu.com/security/CVE-2025-38516",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38455",
                                "url": "https://ubuntu.com/security/CVE-2025-38455",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38456",
                                "url": "https://ubuntu.com/security/CVE-2025-38456",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38514",
                                "url": "https://ubuntu.com/security/CVE-2025-38514",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38544",
                                "url": "https://ubuntu.com/security/CVE-2025-38544",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38457",
                                "url": "https://ubuntu.com/security/CVE-2025-38457",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38458",
                                "url": "https://ubuntu.com/security/CVE-2025-38458",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38459",
                                "url": "https://ubuntu.com/security/CVE-2025-38459",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38546",
                                "url": "https://ubuntu.com/security/CVE-2025-38546",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38460",
                                "url": "https://ubuntu.com/security/CVE-2025-38460",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38461",
                                "url": "https://ubuntu.com/security/CVE-2025-38461",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38462",
                                "url": "https://ubuntu.com/security/CVE-2025-38462",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38463",
                                "url": "https://ubuntu.com/security/CVE-2025-38463",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38464",
                                "url": "https://ubuntu.com/security/CVE-2025-38464",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38465",
                                "url": "https://ubuntu.com/security/CVE-2025-38465",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38466",
                                "url": "https://ubuntu.com/security/CVE-2025-38466",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38467",
                                "url": "https://ubuntu.com/security/CVE-2025-38467",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38349",
                                "url": "https://ubuntu.com/security/CVE-2025-38349",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38407",
                                "url": "https://ubuntu.com/security/CVE-2025-38407",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38374",
                                "url": "https://ubuntu.com/security/CVE-2025-38374",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38373",
                                "url": "https://ubuntu.com/security/CVE-2025-38373",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38408",
                                "url": "https://ubuntu.com/security/CVE-2025-38408",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38279",
                                "url": "https://ubuntu.com/security/CVE-2025-38279",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38289",
                                "url": "https://ubuntu.com/security/CVE-2025-38289",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38392",
                                "url": "https://ubuntu.com/security/CVE-2025-38392",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38402",
                                "url": "https://ubuntu.com/security/CVE-2025-38402",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38405",
                                "url": "https://ubuntu.com/security/CVE-2025-38405",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38388",
                                "url": "https://ubuntu.com/security/CVE-2025-38388",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38390",
                                "url": "https://ubuntu.com/security/CVE-2025-38390",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2024-36350",
                                "url": "https://ubuntu.com/security/CVE-2024-36350",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2024-36357",
                                "url": "https://ubuntu.com/security/CVE-2024-36357",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38376",
                                "url": "https://ubuntu.com/security/CVE-2025-38376",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38396",
                                "url": "https://ubuntu.com/security/CVE-2025-38396",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38371",
                                "url": "https://ubuntu.com/security/CVE-2025-38371",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38384",
                                "url": "https://ubuntu.com/security/CVE-2025-38384",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38386",
                                "url": "https://ubuntu.com/security/CVE-2025-38386",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38406",
                                "url": "https://ubuntu.com/security/CVE-2025-38406",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38399",
                                "url": "https://ubuntu.com/security/CVE-2025-38399",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38409",
                                "url": "https://ubuntu.com/security/CVE-2025-38409",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38410",
                                "url": "https://ubuntu.com/security/CVE-2025-38410",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38377",
                                "url": "https://ubuntu.com/security/CVE-2025-38377",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38389",
                                "url": "https://ubuntu.com/security/CVE-2025-38389",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38385",
                                "url": "https://ubuntu.com/security/CVE-2025-38385",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38412",
                                "url": "https://ubuntu.com/security/CVE-2025-38412",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38382",
                                "url": "https://ubuntu.com/security/CVE-2025-38382",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38393",
                                "url": "https://ubuntu.com/security/CVE-2025-38393",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38400",
                                "url": "https://ubuntu.com/security/CVE-2025-38400",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38387",
                                "url": "https://ubuntu.com/security/CVE-2025-38387",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38401",
                                "url": "https://ubuntu.com/security/CVE-2025-38401",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38391",
                                "url": "https://ubuntu.com/security/CVE-2025-38391",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38395",
                                "url": "https://ubuntu.com/security/CVE-2025-38395",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38403",
                                "url": "https://ubuntu.com/security/CVE-2025-38403",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38375",
                                "url": "https://ubuntu.com/security/CVE-2025-38375",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37842",
                                "url": "https://ubuntu.com/security/CVE-2025-37842",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23155",
                                "url": "https://ubuntu.com/security/CVE-2025-23155",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-22101",
                                "url": "https://ubuntu.com/security/CVE-2025-22101",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38361",
                                "url": "https://ubuntu.com/security/CVE-2025-38361",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38364",
                                "url": "https://ubuntu.com/security/CVE-2025-38364",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38246",
                                "url": "https://ubuntu.com/security/CVE-2025-38246",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38250",
                                "url": "https://ubuntu.com/security/CVE-2025-38250",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38253",
                                "url": "https://ubuntu.com/security/CVE-2025-38253",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38264",
                                "url": "https://ubuntu.com/security/CVE-2025-38264",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38362",
                                "url": "https://ubuntu.com/security/CVE-2025-38362",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38354",
                                "url": "https://ubuntu.com/security/CVE-2025-38354",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38363",
                                "url": "https://ubuntu.com/security/CVE-2025-38363",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38239",
                                "url": "https://ubuntu.com/security/CVE-2025-38239",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38365",
                                "url": "https://ubuntu.com/security/CVE-2025-38365",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38244",
                                "url": "https://ubuntu.com/security/CVE-2025-38244",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38245",
                                "url": "https://ubuntu.com/security/CVE-2025-38245",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38249",
                                "url": "https://ubuntu.com/security/CVE-2025-38249",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38251",
                                "url": "https://ubuntu.com/security/CVE-2025-38251",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38255",
                                "url": "https://ubuntu.com/security/CVE-2025-38255",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38257",
                                "url": "https://ubuntu.com/security/CVE-2025-38257",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38258",
                                "url": "https://ubuntu.com/security/CVE-2025-38258",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38259",
                                "url": "https://ubuntu.com/security/CVE-2025-38259",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38230",
                                "url": "https://ubuntu.com/security/CVE-2025-38230",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38260",
                                "url": "https://ubuntu.com/security/CVE-2025-38260",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38262",
                                "url": "https://ubuntu.com/security/CVE-2025-38262",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38368",
                                "url": "https://ubuntu.com/security/CVE-2025-38368",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38436",
                                "url": "https://ubuntu.com/security/CVE-2025-38436",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38263",
                                "url": "https://ubuntu.com/security/CVE-2025-38263",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38369",
                                "url": "https://ubuntu.com/security/CVE-2025-38369",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-22128",
                                "url": "https://ubuntu.com/security/CVE-2025-22128",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38333",
                                "url": "https://ubuntu.com/security/CVE-2025-38333",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38210",
                                "url": "https://ubuntu.com/security/CVE-2025-38210",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38232",
                                "url": "https://ubuntu.com/security/CVE-2025-38232",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38320",
                                "url": "https://ubuntu.com/security/CVE-2025-38320",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38424",
                                "url": "https://ubuntu.com/security/CVE-2025-38424",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38321",
                                "url": "https://ubuntu.com/security/CVE-2025-38321",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38180",
                                "url": "https://ubuntu.com/security/CVE-2025-38180",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38323",
                                "url": "https://ubuntu.com/security/CVE-2025-38323",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38181",
                                "url": "https://ubuntu.com/security/CVE-2025-38181",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38182",
                                "url": "https://ubuntu.com/security/CVE-2025-38182",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38183",
                                "url": "https://ubuntu.com/security/CVE-2025-38183",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38184",
                                "url": "https://ubuntu.com/security/CVE-2025-38184",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38185",
                                "url": "https://ubuntu.com/security/CVE-2025-38185",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38324",
                                "url": "https://ubuntu.com/security/CVE-2025-38324",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38420",
                                "url": "https://ubuntu.com/security/CVE-2025-38420",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38326",
                                "url": "https://ubuntu.com/security/CVE-2025-38326",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38089",
                                "url": "https://ubuntu.com/security/CVE-2025-38089",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38084",
                                "url": "https://ubuntu.com/security/CVE-2025-38084",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38190",
                                "url": "https://ubuntu.com/security/CVE-2025-38190",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38191",
                                "url": "https://ubuntu.com/security/CVE-2025-38191",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38192",
                                "url": "https://ubuntu.com/security/CVE-2025-38192",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38193",
                                "url": "https://ubuntu.com/security/CVE-2025-38193",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38328",
                                "url": "https://ubuntu.com/security/CVE-2025-38328",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38194",
                                "url": "https://ubuntu.com/security/CVE-2025-38194",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38090",
                                "url": "https://ubuntu.com/security/CVE-2025-38090",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38197",
                                "url": "https://ubuntu.com/security/CVE-2025-38197",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38198",
                                "url": "https://ubuntu.com/security/CVE-2025-38198",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38331",
                                "url": "https://ubuntu.com/security/CVE-2025-38331",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38200",
                                "url": "https://ubuntu.com/security/CVE-2025-38200",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38332",
                                "url": "https://ubuntu.com/security/CVE-2025-38332",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38342",
                                "url": "https://ubuntu.com/security/CVE-2025-38342",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38334",
                                "url": "https://ubuntu.com/security/CVE-2025-38334",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38425",
                                "url": "https://ubuntu.com/security/CVE-2025-38425",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38343",
                                "url": "https://ubuntu.com/security/CVE-2025-38343",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38202",
                                "url": "https://ubuntu.com/security/CVE-2025-38202",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38422",
                                "url": "https://ubuntu.com/security/CVE-2025-38422",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38344",
                                "url": "https://ubuntu.com/security/CVE-2025-38344",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38345",
                                "url": "https://ubuntu.com/security/CVE-2025-38345",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38085",
                                "url": "https://ubuntu.com/security/CVE-2025-38085",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38208",
                                "url": "https://ubuntu.com/security/CVE-2025-38208",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38418",
                                "url": "https://ubuntu.com/security/CVE-2025-38418",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38419",
                                "url": "https://ubuntu.com/security/CVE-2025-38419",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38427",
                                "url": "https://ubuntu.com/security/CVE-2025-38427",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38086",
                                "url": "https://ubuntu.com/security/CVE-2025-38086",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38346",
                                "url": "https://ubuntu.com/security/CVE-2025-38346",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38211",
                                "url": "https://ubuntu.com/security/CVE-2025-38211",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38212",
                                "url": "https://ubuntu.com/security/CVE-2025-38212",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38214",
                                "url": "https://ubuntu.com/security/CVE-2025-38214",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38215",
                                "url": "https://ubuntu.com/security/CVE-2025-38215",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38087",
                                "url": "https://ubuntu.com/security/CVE-2025-38087",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38416",
                                "url": "https://ubuntu.com/security/CVE-2025-38416",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38217",
                                "url": "https://ubuntu.com/security/CVE-2025-38217",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38218",
                                "url": "https://ubuntu.com/security/CVE-2025-38218",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38219",
                                "url": "https://ubuntu.com/security/CVE-2025-38219",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38347",
                                "url": "https://ubuntu.com/security/CVE-2025-38347",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38428",
                                "url": "https://ubuntu.com/security/CVE-2025-38428",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38220",
                                "url": "https://ubuntu.com/security/CVE-2025-38220",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38222",
                                "url": "https://ubuntu.com/security/CVE-2025-38222",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38336",
                                "url": "https://ubuntu.com/security/CVE-2025-38336",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38429",
                                "url": "https://ubuntu.com/security/CVE-2025-38429",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38225",
                                "url": "https://ubuntu.com/security/CVE-2025-38225",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38226",
                                "url": "https://ubuntu.com/security/CVE-2025-38226",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38229",
                                "url": "https://ubuntu.com/security/CVE-2025-38229",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38337",
                                "url": "https://ubuntu.com/security/CVE-2025-38337",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38338",
                                "url": "https://ubuntu.com/security/CVE-2025-38338",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38231",
                                "url": "https://ubuntu.com/security/CVE-2025-38231",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38430",
                                "url": "https://ubuntu.com/security/CVE-2025-38430",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38348",
                                "url": "https://ubuntu.com/security/CVE-2025-38348",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38101",
                                "url": "https://ubuntu.com/security/CVE-2025-38101",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38269",
                                "url": "https://ubuntu.com/security/CVE-2025-38269",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38303",
                                "url": "https://ubuntu.com/security/CVE-2025-38303",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38414",
                                "url": "https://ubuntu.com/security/CVE-2025-38414",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38125",
                                "url": "https://ubuntu.com/security/CVE-2025-38125",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38129",
                                "url": "https://ubuntu.com/security/CVE-2025-38129",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38156",
                                "url": "https://ubuntu.com/security/CVE-2025-38156",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38162",
                                "url": "https://ubuntu.com/security/CVE-2025-38162",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38292",
                                "url": "https://ubuntu.com/security/CVE-2025-38292",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38164",
                                "url": "https://ubuntu.com/security/CVE-2025-38164",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38169",
                                "url": "https://ubuntu.com/security/CVE-2025-38169",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38299",
                                "url": "https://ubuntu.com/security/CVE-2025-38299",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38100",
                                "url": "https://ubuntu.com/security/CVE-2025-38100",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38102",
                                "url": "https://ubuntu.com/security/CVE-2025-38102",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38103",
                                "url": "https://ubuntu.com/security/CVE-2025-38103",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38107",
                                "url": "https://ubuntu.com/security/CVE-2025-38107",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38108",
                                "url": "https://ubuntu.com/security/CVE-2025-38108",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38109",
                                "url": "https://ubuntu.com/security/CVE-2025-38109",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38304",
                                "url": "https://ubuntu.com/security/CVE-2025-38304",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38110",
                                "url": "https://ubuntu.com/security/CVE-2025-38110",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38111",
                                "url": "https://ubuntu.com/security/CVE-2025-38111",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38112",
                                "url": "https://ubuntu.com/security/CVE-2025-38112",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38113",
                                "url": "https://ubuntu.com/security/CVE-2025-38113",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38088",
                                "url": "https://ubuntu.com/security/CVE-2025-38088",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38115",
                                "url": "https://ubuntu.com/security/CVE-2025-38115",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38305",
                                "url": "https://ubuntu.com/security/CVE-2025-38305",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38117",
                                "url": "https://ubuntu.com/security/CVE-2025-38117",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38119",
                                "url": "https://ubuntu.com/security/CVE-2025-38119",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38307",
                                "url": "https://ubuntu.com/security/CVE-2025-38307",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38310",
                                "url": "https://ubuntu.com/security/CVE-2025-38310",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38120",
                                "url": "https://ubuntu.com/security/CVE-2025-38120",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38122",
                                "url": "https://ubuntu.com/security/CVE-2025-38122",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38123",
                                "url": "https://ubuntu.com/security/CVE-2025-38123",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38124",
                                "url": "https://ubuntu.com/security/CVE-2025-38124",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38126",
                                "url": "https://ubuntu.com/security/CVE-2025-38126",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38127",
                                "url": "https://ubuntu.com/security/CVE-2025-38127",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38131",
                                "url": "https://ubuntu.com/security/CVE-2025-38131",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38274",
                                "url": "https://ubuntu.com/security/CVE-2025-38274",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38135",
                                "url": "https://ubuntu.com/security/CVE-2025-38135",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38136",
                                "url": "https://ubuntu.com/security/CVE-2025-38136",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38138",
                                "url": "https://ubuntu.com/security/CVE-2025-38138",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38275",
                                "url": "https://ubuntu.com/security/CVE-2025-38275",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38142",
                                "url": "https://ubuntu.com/security/CVE-2025-38142",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38277",
                                "url": "https://ubuntu.com/security/CVE-2025-38277",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38143",
                                "url": "https://ubuntu.com/security/CVE-2025-38143",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38312",
                                "url": "https://ubuntu.com/security/CVE-2025-38312",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38145",
                                "url": "https://ubuntu.com/security/CVE-2025-38145",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38313",
                                "url": "https://ubuntu.com/security/CVE-2025-38313",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38415",
                                "url": "https://ubuntu.com/security/CVE-2025-38415",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38146",
                                "url": "https://ubuntu.com/security/CVE-2025-38146",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38147",
                                "url": "https://ubuntu.com/security/CVE-2025-38147",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38278",
                                "url": "https://ubuntu.com/security/CVE-2025-38278",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38148",
                                "url": "https://ubuntu.com/security/CVE-2025-38148",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38149",
                                "url": "https://ubuntu.com/security/CVE-2025-38149",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38280",
                                "url": "https://ubuntu.com/security/CVE-2025-38280",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38153",
                                "url": "https://ubuntu.com/security/CVE-2025-38153",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38154",
                                "url": "https://ubuntu.com/security/CVE-2025-38154",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38155",
                                "url": "https://ubuntu.com/security/CVE-2025-38155",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38282",
                                "url": "https://ubuntu.com/security/CVE-2025-38282",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38157",
                                "url": "https://ubuntu.com/security/CVE-2025-38157",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38283",
                                "url": "https://ubuntu.com/security/CVE-2025-38283",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38158",
                                "url": "https://ubuntu.com/security/CVE-2025-38158",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39890",
                                "url": "https://ubuntu.com/security/CVE-2025-39890",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38159",
                                "url": "https://ubuntu.com/security/CVE-2025-38159",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38285",
                                "url": "https://ubuntu.com/security/CVE-2025-38285",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38286",
                                "url": "https://ubuntu.com/security/CVE-2025-38286",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38160",
                                "url": "https://ubuntu.com/security/CVE-2025-38160",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38161",
                                "url": "https://ubuntu.com/security/CVE-2025-38161",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38290",
                                "url": "https://ubuntu.com/security/CVE-2025-38290",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38163",
                                "url": "https://ubuntu.com/security/CVE-2025-38163",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38165",
                                "url": "https://ubuntu.com/security/CVE-2025-38165",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38166",
                                "url": "https://ubuntu.com/security/CVE-2025-38166",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38293",
                                "url": "https://ubuntu.com/security/CVE-2025-38293",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38295",
                                "url": "https://ubuntu.com/security/CVE-2025-38295",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38167",
                                "url": "https://ubuntu.com/security/CVE-2025-38167",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38170",
                                "url": "https://ubuntu.com/security/CVE-2025-38170",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38319",
                                "url": "https://ubuntu.com/security/CVE-2025-38319",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38298",
                                "url": "https://ubuntu.com/security/CVE-2025-38298",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38173",
                                "url": "https://ubuntu.com/security/CVE-2025-38173",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38300",
                                "url": "https://ubuntu.com/security/CVE-2025-38300",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38174",
                                "url": "https://ubuntu.com/security/CVE-2025-38174",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38265",
                                "url": "https://ubuntu.com/security/CVE-2025-38265",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38053",
                                "url": "https://ubuntu.com/security/CVE-2025-38053",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38055",
                                "url": "https://ubuntu.com/security/CVE-2025-38055",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38057",
                                "url": "https://ubuntu.com/security/CVE-2025-38057",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38060",
                                "url": "https://ubuntu.com/security/CVE-2025-38060",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38098",
                                "url": "https://ubuntu.com/security/CVE-2025-38098",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38099",
                                "url": "https://ubuntu.com/security/CVE-2025-38099",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38073",
                                "url": "https://ubuntu.com/security/CVE-2025-38073",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38051",
                                "url": "https://ubuntu.com/security/CVE-2025-38051",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38077",
                                "url": "https://ubuntu.com/security/CVE-2025-38077",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38078",
                                "url": "https://ubuntu.com/security/CVE-2025-38078",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38003",
                                "url": "https://ubuntu.com/security/CVE-2025-38003",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38004",
                                "url": "https://ubuntu.com/security/CVE-2025-38004",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38031",
                                "url": "https://ubuntu.com/security/CVE-2025-38031",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38079",
                                "url": "https://ubuntu.com/security/CVE-2025-38079",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38052",
                                "url": "https://ubuntu.com/security/CVE-2025-38052",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38097",
                                "url": "https://ubuntu.com/security/CVE-2025-38097",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38058",
                                "url": "https://ubuntu.com/security/CVE-2025-38058",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38059",
                                "url": "https://ubuntu.com/security/CVE-2025-38059",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38034",
                                "url": "https://ubuntu.com/security/CVE-2025-38034",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38035",
                                "url": "https://ubuntu.com/security/CVE-2025-38035",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38037",
                                "url": "https://ubuntu.com/security/CVE-2025-38037",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38039",
                                "url": "https://ubuntu.com/security/CVE-2025-38039",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38080",
                                "url": "https://ubuntu.com/security/CVE-2025-38080",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38040",
                                "url": "https://ubuntu.com/security/CVE-2025-38040",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38061",
                                "url": "https://ubuntu.com/security/CVE-2025-38061",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38062",
                                "url": "https://ubuntu.com/security/CVE-2025-38062",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38063",
                                "url": "https://ubuntu.com/security/CVE-2025-38063",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38043",
                                "url": "https://ubuntu.com/security/CVE-2025-38043",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38044",
                                "url": "https://ubuntu.com/security/CVE-2025-38044",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38065",
                                "url": "https://ubuntu.com/security/CVE-2025-38065",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38066",
                                "url": "https://ubuntu.com/security/CVE-2025-38066",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38068",
                                "url": "https://ubuntu.com/security/CVE-2025-38068",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38045",
                                "url": "https://ubuntu.com/security/CVE-2025-38045",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38071",
                                "url": "https://ubuntu.com/security/CVE-2025-38071",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38072",
                                "url": "https://ubuntu.com/security/CVE-2025-38072",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38081",
                                "url": "https://ubuntu.com/security/CVE-2025-38081",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38074",
                                "url": "https://ubuntu.com/security/CVE-2025-38074",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38048",
                                "url": "https://ubuntu.com/security/CVE-2025-38048",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38075",
                                "url": "https://ubuntu.com/security/CVE-2025-38075",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37968",
                                "url": "https://ubuntu.com/security/CVE-2025-37968",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38011",
                                "url": "https://ubuntu.com/security/CVE-2025-38011",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-21931",
                                "url": "https://ubuntu.com/security/CVE-2025-21931",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37960",
                                "url": "https://ubuntu.com/security/CVE-2025-37960",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37967",
                                "url": "https://ubuntu.com/security/CVE-2025-37967",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-22102",
                                "url": "https://ubuntu.com/security/CVE-2025-22102",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38008",
                                "url": "https://ubuntu.com/security/CVE-2025-38008",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38014",
                                "url": "https://ubuntu.com/security/CVE-2025-38014",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38015",
                                "url": "https://ubuntu.com/security/CVE-2025-38015",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38005",
                                "url": "https://ubuntu.com/security/CVE-2025-38005",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38009",
                                "url": "https://ubuntu.com/security/CVE-2025-38009",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38010",
                                "url": "https://ubuntu.com/security/CVE-2025-38010",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38095",
                                "url": "https://ubuntu.com/security/CVE-2025-38095",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38018",
                                "url": "https://ubuntu.com/security/CVE-2025-38018",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38019",
                                "url": "https://ubuntu.com/security/CVE-2025-38019",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38013",
                                "url": "https://ubuntu.com/security/CVE-2025-38013",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38027",
                                "url": "https://ubuntu.com/security/CVE-2025-38027",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38020",
                                "url": "https://ubuntu.com/security/CVE-2025-38020",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38094",
                                "url": "https://ubuntu.com/security/CVE-2025-38094",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38006",
                                "url": "https://ubuntu.com/security/CVE-2025-38006",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37992",
                                "url": "https://ubuntu.com/security/CVE-2025-37992",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38023",
                                "url": "https://ubuntu.com/security/CVE-2025-38023",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38007",
                                "url": "https://ubuntu.com/security/CVE-2025-38007",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38024",
                                "url": "https://ubuntu.com/security/CVE-2025-38024",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37957",
                                "url": "https://ubuntu.com/security/CVE-2025-37957",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37963",
                                "url": "https://ubuntu.com/security/CVE-2025-37963",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37948",
                                "url": "https://ubuntu.com/security/CVE-2025-37948",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37994",
                                "url": "https://ubuntu.com/security/CVE-2025-37994",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37995",
                                "url": "https://ubuntu.com/security/CVE-2025-37995",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37949",
                                "url": "https://ubuntu.com/security/CVE-2025-37949",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37954",
                                "url": "https://ubuntu.com/security/CVE-2025-37954",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37951",
                                "url": "https://ubuntu.com/security/CVE-2025-37951",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37969",
                                "url": "https://ubuntu.com/security/CVE-2025-37969",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37970",
                                "url": "https://ubuntu.com/security/CVE-2025-37970",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37972",
                                "url": "https://ubuntu.com/security/CVE-2025-37972",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37959",
                                "url": "https://ubuntu.com/security/CVE-2025-37959",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37961",
                                "url": "https://ubuntu.com/security/CVE-2025-37961",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37998",
                                "url": "https://ubuntu.com/security/CVE-2025-37998",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37952",
                                "url": "https://ubuntu.com/security/CVE-2025-37952",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37947",
                                "url": "https://ubuntu.com/security/CVE-2025-37947",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37956",
                                "url": "https://ubuntu.com/security/CVE-2025-37956",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37973",
                                "url": "https://ubuntu.com/security/CVE-2025-37973",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37920",
                                "url": "https://ubuntu.com/security/CVE-2025-37920",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37900",
                                "url": "https://ubuntu.com/security/CVE-2025-37900",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37931",
                                "url": "https://ubuntu.com/security/CVE-2025-37931",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37903",
                                "url": "https://ubuntu.com/security/CVE-2025-37903",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37905",
                                "url": "https://ubuntu.com/security/CVE-2025-37905",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37933",
                                "url": "https://ubuntu.com/security/CVE-2025-37933",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37909",
                                "url": "https://ubuntu.com/security/CVE-2025-37909",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37911",
                                "url": "https://ubuntu.com/security/CVE-2025-37911",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37935",
                                "url": "https://ubuntu.com/security/CVE-2025-37935",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37891",
                                "url": "https://ubuntu.com/security/CVE-2025-37891",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37912",
                                "url": "https://ubuntu.com/security/CVE-2025-37912",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37913",
                                "url": "https://ubuntu.com/security/CVE-2025-37913",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37914",
                                "url": "https://ubuntu.com/security/CVE-2025-37914",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37915",
                                "url": "https://ubuntu.com/security/CVE-2025-37915",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37916",
                                "url": "https://ubuntu.com/security/CVE-2025-37916",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37917",
                                "url": "https://ubuntu.com/security/CVE-2025-37917",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37918",
                                "url": "https://ubuntu.com/security/CVE-2025-37918",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37921",
                                "url": "https://ubuntu.com/security/CVE-2025-37921",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37897",
                                "url": "https://ubuntu.com/security/CVE-2025-37897",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37922",
                                "url": "https://ubuntu.com/security/CVE-2025-37922",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37923",
                                "url": "https://ubuntu.com/security/CVE-2025-37923",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37924",
                                "url": "https://ubuntu.com/security/CVE-2025-37924",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37927",
                                "url": "https://ubuntu.com/security/CVE-2025-37927",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37928",
                                "url": "https://ubuntu.com/security/CVE-2025-37928",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37990",
                                "url": "https://ubuntu.com/security/CVE-2025-37990",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37901",
                                "url": "https://ubuntu.com/security/CVE-2025-37901",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37936",
                                "url": "https://ubuntu.com/security/CVE-2025-37936",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37991",
                                "url": "https://ubuntu.com/security/CVE-2025-37991",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37930",
                                "url": "https://ubuntu.com/security/CVE-2025-37930",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37986",
                                "url": "https://ubuntu.com/security/CVE-2025-37986",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37809",
                                "url": "https://ubuntu.com/security/CVE-2025-37809",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37816",
                                "url": "https://ubuntu.com/security/CVE-2025-37816",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37822",
                                "url": "https://ubuntu.com/security/CVE-2025-37822",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37987",
                                "url": "https://ubuntu.com/security/CVE-2025-37987",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37826",
                                "url": "https://ubuntu.com/security/CVE-2025-37826",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37827",
                                "url": "https://ubuntu.com/security/CVE-2025-37827",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37977",
                                "url": "https://ubuntu.com/security/CVE-2025-37977",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37944",
                                "url": "https://ubuntu.com/security/CVE-2025-37944",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37761",
                                "url": "https://ubuntu.com/security/CVE-2025-37761",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37763",
                                "url": "https://ubuntu.com/security/CVE-2025-37763",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37764",
                                "url": "https://ubuntu.com/security/CVE-2025-37764",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37869",
                                "url": "https://ubuntu.com/security/CVE-2025-37869",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37978",
                                "url": "https://ubuntu.com/security/CVE-2025-37978",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37975",
                                "url": "https://ubuntu.com/security/CVE-2025-37975",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37872",
                                "url": "https://ubuntu.com/security/CVE-2025-37872",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37873",
                                "url": "https://ubuntu.com/security/CVE-2025-37873",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-22120",
                                "url": "https://ubuntu.com/security/CVE-2025-22120",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37799",
                                "url": "https://ubuntu.com/security/CVE-2025-37799",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37800",
                                "url": "https://ubuntu.com/security/CVE-2025-37800",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37878",
                                "url": "https://ubuntu.com/security/CVE-2025-37878",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37803",
                                "url": "https://ubuntu.com/security/CVE-2025-37803",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37879",
                                "url": "https://ubuntu.com/security/CVE-2025-37879",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37983",
                                "url": "https://ubuntu.com/security/CVE-2025-37983",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37881",
                                "url": "https://ubuntu.com/security/CVE-2025-37881",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37805",
                                "url": "https://ubuntu.com/security/CVE-2025-37805",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37883",
                                "url": "https://ubuntu.com/security/CVE-2025-37883",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37884",
                                "url": "https://ubuntu.com/security/CVE-2025-37884",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37808",
                                "url": "https://ubuntu.com/security/CVE-2025-37808",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37985",
                                "url": "https://ubuntu.com/security/CVE-2025-37985",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37810",
                                "url": "https://ubuntu.com/security/CVE-2025-37810",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37811",
                                "url": "https://ubuntu.com/security/CVE-2025-37811",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37812",
                                "url": "https://ubuntu.com/security/CVE-2025-37812",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37813",
                                "url": "https://ubuntu.com/security/CVE-2025-37813",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37815",
                                "url": "https://ubuntu.com/security/CVE-2025-37815",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37885",
                                "url": "https://ubuntu.com/security/CVE-2025-37885",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37817",
                                "url": "https://ubuntu.com/security/CVE-2025-37817",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37819",
                                "url": "https://ubuntu.com/security/CVE-2025-37819",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37820",
                                "url": "https://ubuntu.com/security/CVE-2025-37820",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37886",
                                "url": "https://ubuntu.com/security/CVE-2025-37886",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37887",
                                "url": "https://ubuntu.com/security/CVE-2025-37887",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37823",
                                "url": "https://ubuntu.com/security/CVE-2025-37823",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37988",
                                "url": "https://ubuntu.com/security/CVE-2025-37988",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37824",
                                "url": "https://ubuntu.com/security/CVE-2025-37824",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37989",
                                "url": "https://ubuntu.com/security/CVE-2025-37989",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37828",
                                "url": "https://ubuntu.com/security/CVE-2025-37828",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37829",
                                "url": "https://ubuntu.com/security/CVE-2025-37829",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37830",
                                "url": "https://ubuntu.com/security/CVE-2025-37830",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37831",
                                "url": "https://ubuntu.com/security/CVE-2025-37831",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37938",
                                "url": "https://ubuntu.com/security/CVE-2025-37938",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39989",
                                "url": "https://ubuntu.com/security/CVE-2025-39989",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-22026",
                                "url": "https://ubuntu.com/security/CVE-2025-22026",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37836",
                                "url": "https://ubuntu.com/security/CVE-2025-37836",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37846",
                                "url": "https://ubuntu.com/security/CVE-2025-37846",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37942",
                                "url": "https://ubuntu.com/security/CVE-2025-37942",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37856",
                                "url": "https://ubuntu.com/security/CVE-2025-37856",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37861",
                                "url": "https://ubuntu.com/security/CVE-2025-37861",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37744",
                                "url": "https://ubuntu.com/security/CVE-2025-37744",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37745",
                                "url": "https://ubuntu.com/security/CVE-2025-37745",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37945",
                                "url": "https://ubuntu.com/security/CVE-2025-37945",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37759",
                                "url": "https://ubuntu.com/security/CVE-2025-37759",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23140",
                                "url": "https://ubuntu.com/security/CVE-2025-23140",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-22126",
                                "url": "https://ubuntu.com/security/CVE-2025-22126",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37765",
                                "url": "https://ubuntu.com/security/CVE-2025-37765",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37766",
                                "url": "https://ubuntu.com/security/CVE-2025-37766",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37767",
                                "url": "https://ubuntu.com/security/CVE-2025-37767",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37768",
                                "url": "https://ubuntu.com/security/CVE-2025-37768",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37769",
                                "url": "https://ubuntu.com/security/CVE-2025-37769",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37770",
                                "url": "https://ubuntu.com/security/CVE-2025-37770",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37771",
                                "url": "https://ubuntu.com/security/CVE-2025-37771",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37772",
                                "url": "https://ubuntu.com/security/CVE-2025-37772",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37773",
                                "url": "https://ubuntu.com/security/CVE-2025-37773",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37775",
                                "url": "https://ubuntu.com/security/CVE-2025-37775",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37778",
                                "url": "https://ubuntu.com/security/CVE-2025-37778",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37863",
                                "url": "https://ubuntu.com/security/CVE-2025-37863",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37780",
                                "url": "https://ubuntu.com/security/CVE-2025-37780",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37781",
                                "url": "https://ubuntu.com/security/CVE-2025-37781",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37979",
                                "url": "https://ubuntu.com/security/CVE-2025-37979",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37784",
                                "url": "https://ubuntu.com/security/CVE-2025-37784",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37786",
                                "url": "https://ubuntu.com/security/CVE-2025-37786",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37864",
                                "url": "https://ubuntu.com/security/CVE-2025-37864",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37865",
                                "url": "https://ubuntu.com/security/CVE-2025-37865",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37787",
                                "url": "https://ubuntu.com/security/CVE-2025-37787",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37788",
                                "url": "https://ubuntu.com/security/CVE-2025-37788",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37874",
                                "url": "https://ubuntu.com/security/CVE-2025-37874",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37789",
                                "url": "https://ubuntu.com/security/CVE-2025-37789",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37980",
                                "url": "https://ubuntu.com/security/CVE-2025-37980",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37790",
                                "url": "https://ubuntu.com/security/CVE-2025-37790",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37875",
                                "url": "https://ubuntu.com/security/CVE-2025-37875",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37792",
                                "url": "https://ubuntu.com/security/CVE-2025-37792",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37867",
                                "url": "https://ubuntu.com/security/CVE-2025-37867",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37793",
                                "url": "https://ubuntu.com/security/CVE-2025-37793",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37982",
                                "url": "https://ubuntu.com/security/CVE-2025-37982",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37794",
                                "url": "https://ubuntu.com/security/CVE-2025-37794",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37796",
                                "url": "https://ubuntu.com/security/CVE-2025-37796",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23141",
                                "url": "https://ubuntu.com/security/CVE-2025-23141",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37940",
                                "url": "https://ubuntu.com/security/CVE-2025-37940",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37844",
                                "url": "https://ubuntu.com/security/CVE-2025-37844",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23142",
                                "url": "https://ubuntu.com/security/CVE-2025-23142",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23144",
                                "url": "https://ubuntu.com/security/CVE-2025-23144",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37892",
                                "url": "https://ubuntu.com/security/CVE-2025-37892",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23145",
                                "url": "https://ubuntu.com/security/CVE-2025-23145",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23146",
                                "url": "https://ubuntu.com/security/CVE-2025-23146",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37839",
                                "url": "https://ubuntu.com/security/CVE-2025-37839",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23147",
                                "url": "https://ubuntu.com/security/CVE-2025-23147",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23148",
                                "url": "https://ubuntu.com/security/CVE-2025-23148",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23149",
                                "url": "https://ubuntu.com/security/CVE-2025-23149",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23150",
                                "url": "https://ubuntu.com/security/CVE-2025-23150",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23151",
                                "url": "https://ubuntu.com/security/CVE-2025-23151",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23156",
                                "url": "https://ubuntu.com/security/CVE-2025-23156",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23157",
                                "url": "https://ubuntu.com/security/CVE-2025-23157",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37840",
                                "url": "https://ubuntu.com/security/CVE-2025-37840",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37849",
                                "url": "https://ubuntu.com/security/CVE-2025-37849",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23158",
                                "url": "https://ubuntu.com/security/CVE-2025-23158",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23159",
                                "url": "https://ubuntu.com/security/CVE-2025-23159",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23160",
                                "url": "https://ubuntu.com/security/CVE-2025-23160",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37850",
                                "url": "https://ubuntu.com/security/CVE-2025-37850",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37851",
                                "url": "https://ubuntu.com/security/CVE-2025-37851",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23161",
                                "url": "https://ubuntu.com/security/CVE-2025-23161",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37852",
                                "url": "https://ubuntu.com/security/CVE-2025-37852",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37853",
                                "url": "https://ubuntu.com/security/CVE-2025-37853",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37854",
                                "url": "https://ubuntu.com/security/CVE-2025-37854",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23163",
                                "url": "https://ubuntu.com/security/CVE-2025-23163",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37857",
                                "url": "https://ubuntu.com/security/CVE-2025-37857",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37738",
                                "url": "https://ubuntu.com/security/CVE-2025-37738",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37739",
                                "url": "https://ubuntu.com/security/CVE-2025-37739",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37943",
                                "url": "https://ubuntu.com/security/CVE-2025-37943",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37740",
                                "url": "https://ubuntu.com/security/CVE-2025-37740",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37741",
                                "url": "https://ubuntu.com/security/CVE-2025-37741",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37858",
                                "url": "https://ubuntu.com/security/CVE-2025-37858",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37742",
                                "url": "https://ubuntu.com/security/CVE-2025-37742",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37859",
                                "url": "https://ubuntu.com/security/CVE-2025-37859",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37862",
                                "url": "https://ubuntu.com/security/CVE-2025-37862",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37841",
                                "url": "https://ubuntu.com/security/CVE-2025-37841",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37748",
                                "url": "https://ubuntu.com/security/CVE-2025-37748",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37749",
                                "url": "https://ubuntu.com/security/CVE-2025-37749",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37754",
                                "url": "https://ubuntu.com/security/CVE-2025-37754",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37755",
                                "url": "https://ubuntu.com/security/CVE-2025-37755",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37757",
                                "url": "https://ubuntu.com/security/CVE-2025-37757",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37758",
                                "url": "https://ubuntu.com/security/CVE-2025-37758",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37801",
                                "url": "https://ubuntu.com/security/CVE-2025-37801",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39946",
                                "url": "https://ubuntu.com/security/CVE-2025-39946",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38584",
                                "url": "https://ubuntu.com/security/CVE-2025-38584",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40019",
                                "url": "https://ubuntu.com/security/CVE-2025-40019",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38561",
                                "url": "https://ubuntu.com/security/CVE-2025-38561",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39698",
                                "url": "https://ubuntu.com/security/CVE-2025-39698",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * noble/linux: 6.8.0-98.98 -proposed tracker (LP: #2137901)",
                            "",
                            "  * Packaging resync (LP: #1786013)",
                            "    - [Packaging] debian.master/dkms-versions -- update from kernel-versions",
                            "      (main/2026.01.12)",
                            "",
                            "  * ubuntu_kselftests:_net/net:gre_gso.sh failing (LP: #2136820)",
                            "    - SAUCE increase socat timeout in gre_gso.sh",
                            "",
                            "  * TPM timeouts occur on some Infineon TPMs (LP: #2137528)",
                            "    - tpm: Make chip->{status,cancel,req_canceled} opt",
                            "    - tpm: Check for completion after timeout",
                            "",
                            "  * power: intel_pstate: Fix unchecked MSR (LP: #2130244)",
                            "    - cpufreq: intel_pstate: Unchecked MSR aceess in legacy mode",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722)",
                            "    - selftests/futex: futex_waitv wouldblock test should fail",
                            "    - drm/i915/dg2: wait for HuC load completion before running selftests",
                            "    - drm/i915: Disable RPG during live selftest",
                            "    - objtool: Fix INSN_CONTEXT_SWITCH handling in validate_unret()",
                            "    - octeontx2-pf: qos: fix VF root node parent queue index",
                            "    - tc: Ensure we have enough buffer space when sending filter netlink",
                            "      notifications",
                            "    - net: ethtool: Don't call .cleanup_data when prepare_data fails",
                            "    - drm/tests: modeset: Fix drm_display_mode memory leak",
                            "    - drm/tests: helpers: Add atomic helpers",
                            "    - drm/tests: Add helper to create mock plane",
                            "    - drm/tests: Add helper to create mock crtc",
                            "    - drm/tests: helpers: Add helper for drm_display_mode_from_cea_vic()",
                            "    - drm/tests: helpers: Fix compiler warning",
                            "    - drm/tests: helpers: Create kunit helper to destroy a drm_display_mode",
                            "    - drm/tests: cmdline: Fix drm_display_mode memory leak",
                            "    - drm/tests: modes: Fix drm_display_mode memory leak",
                            "    - drm/tests: probe-helper: Fix drm_display_mode memory leak",
                            "    - ata: sata_sx4: Add error handling in pdc20621_i2c_read()",
                            "    - nvmet-fcloop: swap list_add_tail arguments",
                            "    - net_sched: sch_sfq: use a temporary work area for validating",
                            "      configuration",
                            "    - Revert \"net_sched: sch_sfq: move the limit validation\"",
                            "    - net_sched: sch_sfq: move the limit validation",
                            "    - ipv6: Align behavior across nexthops during path selection",
                            "    - nft_set_pipapo: fix incorrect avx2 match of 5th field octet",
                            "    - fs: consistently deref the files table with rcu_dereference_raw()",
                            "    - umount: Allow superblock owners to force umount",
                            "    - x86/mm: Clear _PAGE_DIRTY for kernel mappings when we clear _PAGE_RW",
                            "    - x86/ia32: Leave NULL selector values 0~3 unchanged",
                            "    - x86/cpu: Don't clear X86_FEATURE_LAHF_LM flag in init_amd_k8() on AMD",
                            "      when running in a virtual machine",
                            "    - perf: arm_pmu: Don't disable counter in armpmu_add()",
                            "    - arm64: cputype: Add QCOM_CPU_PART_KRYO_3XX_GOLD",
                            "    - xen/mcelog: Add __nonstring annotations for unterminated strings",
                            "    - zstd: Increase DYNAMIC_BMI2 GCC version cutoff from 4.8 to 11.0 to work",
                            "      around compiler segfault",
                            "    - ASoC: SOF: topology: Use krealloc_array() to replace krealloc()",
                            "    - HID: pidff: Convert infinite length from Linux API to PID standard",
                            "    - HID: pidff: Do not send effect envelope if it's empty",
                            "    - HID: pidff: Add MISSING_DELAY quirk and its detection",
                            "    - HID: pidff: Add MISSING_PBO quirk and its detection",
                            "    - HID: pidff: Add PERMISSIVE_CONTROL quirk",
                            "    - HID: pidff: Add hid_pidff_init_with_quirks and export as GPL symbol",
                            "    - HID: pidff: Add FIX_WHEEL_DIRECTION quirk",
                            "    - HID: Add hid-universal-pidff driver and supported device ids",
                            "    - [Config] enable hid-universal-pidff driver",
                            "    - HID: pidff: Add PERIODIC_SINE_ONLY quirk",
                            "    - ALSA: hda: intel: Fix Optimus when GPU has no sound",
                            "    - ALSA: hda: intel: Add Lenovo IdeaPad Z570 to probe denylist",
                            "    - ASoC: fsl_audmix: register card device depends on 'dais' property",
                            "    - media: uvcvideo: Add quirk for Actions UVC05",
                            "    - mmc: dw_mmc: add a quirk for accessing 64-bit FIFOs in two halves",
                            "    - ALSA: usb-audio: Fix CME quirk for UF series keyboards",
                            "    - ASoC: amd: Add DMI quirk for ACP6X mic support",
                            "    - ASoC: amd: yc: update quirk data for new Lenovo model",
                            "    - f2fs: don't retry IO for corrupted data scenario",
                            "    - scsi: target: spc: Fix RSOC parameter data header size",
                            "    - net: usb: asix_devices: add FiberGecko DeviceID",
                            "    - fs/jfs: cast inactags to s64 to prevent potential overflow",
                            "    - ata: libata-eh: Do not use ATAPI DMA for a device limited to PIO mode",
                            "    - net: sfp: add quirk for 2.5G OEM BX SFP",
                            "    - ahci: add PCI ID for Marvell 88SE9215 SATA Controller",
                            "    - ext4: protect ext4_release_dquot against freezing",
                            "    - Revert \"f2fs: rebuild nat_bits during umount\"",
                            "    - cdc_ether|r8152: ThinkPad Hybrid USB-C/A Dock quirk",
                            "    - wifi: mt76: mt76x2u: add TP-Link TL-WDN6200 ID to device table",
                            "    - tracing: fix return value in __ftrace_event_enable_disable for",
                            "      TRACE_REG_UNREGISTER",
                            "    - Bluetooth: hci_uart: fix race during initialization",
                            "    - Bluetooth: qca: simplify WCN399x NVM loading",
                            "    - drm: allow encoder mode_set even when connectors change for crtc",
                            "    - drm/amd/display: Update Cursor request mode to the beginning prefetch",
                            "      always",
                            "    - drm/amd/display: add workaround flag to link to force FFE preset",
                            "    - drm: panel-orientation-quirks: Add support for AYANEO 2S",
                            "    - drm: panel-orientation-quirks: Add quirks for AYA NEO Flip DS and KB",
                            "    - drm: panel-orientation-quirks: Add quirk for AYA NEO Slide",
                            "    - drm: panel-orientation-quirks: Add new quirk for GPD Win 2",
                            "    - drm: panel-orientation-quirks: Add quirk for OneXPlayer Mini (Intel)",
                            "    - drm/bridge: panel: forbid initializing a panel with unknown connector",
                            "      type",
                            "    - drivers: base: devres: Allow to release group on device release",
                            "    - drm/amdkfd: clamp queue size to minimum",
                            "    - drm/amdkfd: Fix pqm_destroy_queue race with GPU reset",
                            "    - drm/mediatek: mtk_dpi: Move the input_2p_en bit to platform data",
                            "    - drm/mediatek: mtk_dpi: Explicitly manage TVD clock in power on/off",
                            "    - drm/amdgpu: grab an additional reference on the gang fence v2",
                            "    - tracing: probe-events: Add comments about entry data storing code",
                            "    - ktest: Fix Test Failures Due to Missing LOG_FILE Directories",
                            "    - tpm, tpm_tis: Workaround failed command reception on Infineon devices",
                            "    - pwm: rcar: Improve register calculation",
                            "    - pwm: fsl-ftm: Handle clk_get_rate() returning 0",
                            "    - bpf: support SKF_NET_OFF and SKF_LL_OFF on skb frags",
                            "    - ext4: don't treat fhandle lookup of ea_inode as FS corruption",
                            "    - dt-bindings: media: st,stmipid02: correct lane-polarities maxItems",
                            "    - media: mtk-vcodec: venc: avoid -Wenum-compare-conditional warning",
                            "    - media: i2c: adv748x: Fix test pattern selection mask",
                            "    - media: vim2m: print device name after registering device",
                            "    - media: siano: Fix error handling in smsdvb_module_init()",
                            "    - xenfs/xensyms: respect hypervisor's \"next\" indication",
                            "    - arm64: cputype: Add MIDR_CORTEX_A76AE",
                            "    - arm64: errata: Add QCOM_KRYO_4XX_GOLD to the spectre_bhb_k24_list",
                            "    - arm64: errata: Assume that unknown CPUs _are_ vulnerable to Spectre BHB",
                            "    - arm64: errata: Add KRYO 2XX/3XX/4XX silver cores to Spectre BHB safe",
                            "      list",
                            "    - spi: cadence-qspi: Fix probe on AM62A LP SK",
                            "    - tpm, tpm_tis: Fix timeout handling when waiting for TPM status",
                            "    - media: streamzap: prevent processing IR data on URB failure",
                            "    - media: visl: Fix ERANGE error when setting enum controls",
                            "    - media: platform: stm32: Add check for clk_enable()",
                            "    - media: v4l2-dv-timings: prevent possible overflow in v4l2_detect_gtf()",
                            "    - media: i2c: ccs: Set the device's runtime PM status correctly in remove",
                            "    - media: i2c: ccs: Set the device's runtime PM status correctly in probe",
                            "    - media: i2c: ov7251: Set enable GPIO low in probe",
                            "    - media: i2c: ov7251: Introduce 1 ms delay between regulators and en GPIO",
                            "    - media: i2c: imx219: Rectify runtime PM handling in probe and remove",
                            "    - mptcp: sockopt: fix getting IPV6_V6ONLY",
                            "    - mtd: Add check for devm_kcalloc()",
                            "    - net: dsa: mv88e6xxx: workaround RGMII transmit delay erratum for 6320",
                            "      family",
                            "    - mtd: Replace kcalloc() with devm_kcalloc()",
                            "    - clocksource/drivers/stm32-lptimer: Use wakeup capable instead of init",
                            "      wakeup",
                            "    - wifi: mt76: Add check for devm_kstrdup()",
                            "    - wifi: mac80211: fix integer overflow in hwmp_route_info_get()",
                            "    - io_uring/kbuf: reject zero sized provided buffers",
                            "    - ASoC: q6apm: add q6apm_get_hw_pointer helper",
                            "    - ASoC: qdsp6: q6apm-dai: set 10 ms period and buffer alignment.",
                            "    - ASoC: qdsp6: q6apm-dai: fix capture pipeline overruns.",
                            "    - ASoC: qdsp6: q6asm-dai: fix q6asm_dai_compr_set_params error path",
                            "    - f2fs: fix to avoid atomicity corruption of atomic file",
                            "    - vdpa/mlx5: Fix oversized null mkey longer than 32bit",
                            "    - udf: Fix inode_getblk() return value",
                            "    - smb311 client: fix missing tcon check when mounting with linux/posix",
                            "      extensions",
                            "    - i3c: master: svc: Use readsb helper for reading MDB",
                            "    - leds: rgb: leds-qcom-lpg: Fix pwm resolution max for Hi-Res PWMs",
                            "    - leds: rgb: leds-qcom-lpg: Fix calculation of best period Hi-Res PWMs",
                            "    - mailbox: tegra-hsp: Define dimensioning masks in SoC data",
                            "    - locking/lockdep: Decrease nr_unused_locks if lock unused in zap_class()",
                            "    - lib: scatterlist: fix sg_split_phys to preserve original scatterlist",
                            "      offsets",
                            "    - mptcp: only inc MPJoinAckHMacFailure for HMAC failures",
                            "    - mtd: rawnand: Add status chack in r852_ready()",
                            "    - arm64: mm: Correct the update of max_pfn",
                            "    - arm64: dts: mediatek: mt8173: Fix disp-pwm compatible string",
                            "    - btrfs: fix non-empty delayed iputs list on unmount due to compressed",
                            "      write workers",
                            "    - btrfs: zoned: fix zone activation with missing devices",
                            "    - btrfs: zoned: fix zone finishing with missing devices",
                            "    - iommufd: Fix uninitialized rc in iommufd_access_rw()",
                            "    - sparc/mm: disable preemption in lazy mmu mode",
                            "    - sparc/mm: avoid calling arch_enter/leave_lazy_mmu() in set_ptes",
                            "    - mm/rmap: reject hugetlb folios in folio_make_device_exclusive()",
                            "    - mm: make page_mapped_in_vma() hugetlb walk aware",
                            "    - mm: fix lazy mmu docs and usage",
                            "    - mm/mremap: correctly handle partial mremap() of VMA starting at 0",
                            "    - mm: add missing release barrier on PGDAT_RECLAIM_LOCKED unlock",
                            "    - mm/userfaultfd: fix release hang over concurrent GUP",
                            "    - mm/hwpoison: do not send SIGBUS to processes with recovered clean pages",
                            "    - mm/hugetlb: move hugetlb_sysctl_init() to the __init section",
                            "    - x86/xen: fix balloon target initialization for PVH dom0",
                            "    - tracing: Do not add length to print format in synthetic events",
                            "    - thermal/drivers/rockchip: Add missing rk3328 mapping entry",
                            "    - cifs: fix integer overflow in match_server()",
                            "    - clk: qcom: clk-branch: Fix invert halt status bit check for votable",
                            "      clocks",
                            "    - clk: qcom: gdsc: Release pm subdomains in reverse add order",
                            "    - clk: qcom: gdsc: Capture pm_genpd_add_subdomain result code",
                            "    - clk: qcom: gdsc: Set retain_ff before moving to HW CTRL",
                            "    - crypto: ccp - Fix check for the primary ASP device",
                            "    - dm-ebs: fix prefetch-vs-suspend race",
                            "    - dm-integrity: set ti->error on memory allocation failure",
                            "    - dm-verity: fix prefetch-vs-suspend race",
                            "    - dt-bindings: coresight: qcom,coresight-tpda: Fix too many 'reg'",
                            "    - dt-bindings: coresight: qcom,coresight-tpdm: Fix too many 'reg'",
                            "    - gpio: tegra186: fix resource handling in ACPI probe path",
                            "    - gpio: zynq: Fix wakeup source leaks on device unbind",
                            "    - gve: handle overflow when reporting TX consumed descriptors",
                            "    - KVM: x86: Explicitly zero-initialize on-stack CPUID unions",
                            "    - ntb: use 64-bit arithmetic for the MSI doorbell mask",
                            "    - of/irq: Fix device node refcount leakage in API of_irq_parse_one()",
                            "    - of/irq: Fix device node refcount leakage in API of_irq_parse_raw()",
                            "    - of/irq: Fix device node refcount leakages in of_irq_count()",
                            "    - of/irq: Fix device node refcount leakage in API irq_of_parse_and_map()",
                            "    - of/irq: Fix device node refcount leakages in of_irq_init()",
                            "    - PCI: brcmstb: Fix missing of_node_put() in brcm_pcie_probe()",
                            "    - PCI: Fix reference leak in pci_alloc_child_bus()",
                            "    - phy: freescale: imx8m-pcie: assert phy reset and perst in power off",
                            "    - pinctrl: qcom: Clear latched interrupt status when changing IRQ type",
                            "    - selftests: mptcp: close fd_in before returning in main_loop",
                            "    - selftests: mptcp: fix incorrect fd checks in main_loop",
                            "    - arm64: errata: Add newer ARM cores to the spectre_bhb_loop_affected()",
                            "      lists",
                            "    - ACPI: platform-profile: Fix CFI violation when accessing sysfs files",
                            "    - iommufd: Fail replace if device has not been attached",
                            "    - x86/e820: Fix handling of subpage regions when calculating nosave ranges",
                            "      in e820__register_nosave_regions()",
                            "    - media: mediatek: vcodec: mark vdec_vp9_slice_map_counts_eob_coef",
                            "      noinline",
                            "    - Bluetooth: hci_uart: Fix another race during initialization",
                            "    - scsi: hisi_sas: Enable force phy when SATA disk directly connected",
                            "    - wifi: mac80211: Update skb's control block key in ieee80211_tx_dequeue()",
                            "    - scsi: iscsi: Fix missing scsi_host_put() in error path",
                            "    - md/raid10: fix missing discard IO accounting",
                            "    - md/md-bitmap: fix stats collection for external bitmaps",
                            "    - ASoC: dwc: always enable/disable i2s irqs",
                            "    - ovl: remove unused forward declaration",
                            "    - RDMA/usnic: Fix passing zero to PTR_ERR in usnic_ib_pci_probe()",
                            "    - RDMA/hns: Fix wrong maximum DMA segment size",
                            "    - ASoC: cs42l43: Reset clamp override on jack removal",
                            "    - Bluetooth: hci_event: Fix sending MGMT_EV_DEVICE_FOUND for invalid",
                            "      address",
                            "    - Bluetooth: l2cap: Check encryption key size on incoming connection",
                            "    - Revert \"wifi: mac80211: Update skb's control block key in",
                            "      ieee80211_tx_dequeue()\"",
                            "    - igc: increase wait time before retrying PTM",
                            "    - igc: move ktime snapshot into PTM retry loop",
                            "    - igc: handle the IGC_PTP_ENABLED flag correctly",
                            "    - igc: cleanup PTP module if probe fails",
                            "    - igc: add lock preventing multiple simultaneous PTM transactions",
                            "    - test suite: use %zu to print size_t",
                            "    - pds_core: fix memory leak in pdsc_debugfs_add_qcq()",
                            "    - net: ethernet: ti: am65-cpsw-nuss: rename phy_node -> port_np",
                            "    - net: ethernet: ti: am65-cpsw: fix port_np reference counting",
                            "    - ata: libata-sata: Save all fields from sense data descriptor",
                            "    - netlink: specs: rt-link: add an attr layer around alt-ifname",
                            "    - netlink: specs: rt-link: adjust mctp attribute naming",
                            "    - net: b53: enable BPDU reception for management port",
                            "    - net: bridge: switchdev: do not notify new brentries as changed",
                            "    - net: dsa: avoid refcount warnings when ds->ops->tag_8021q_vlan_del()",
                            "      fails",
                            "    - ptp: ocp: fix start time alignment in ptp_ocp_signal_set",
                            "    - net: ti: icss-iep: Add pwidth configuration for perout signal",
                            "    - net: ti: icss-iep: Add phase offset configuration for perout signal",
                            "    - net: ethernet: mtk_eth_soc: correct the max weight of the queue limit",
                            "      for 100Mbps",
                            "    - net: ethernet: mtk_eth_soc: revise QDMA packet scheduler settings",
                            "    - riscv: Properly export reserved regions in /proc/iomem",
                            "    - kunit: qemu_configs: SH: Respect kunit cmdline",
                            "    - riscv: KGDB: Do not inline arch_kgdb_breakpoint()",
                            "    - riscv: KGDB: Remove \".option norvc/.option rvc\" for kgdb_compiled_break",
                            "    - cpufreq/sched: Fix the usage of CPUFREQ_NEED_UPDATE_LIMITS",
                            "    - writeback: fix false warning in inode_to_wb()",
                            "    - ASoC: codecs:lpass-wsa-macro: Fix vi feedback rate",
                            "    - ASoC: codecs:lpass-wsa-macro: Fix logic of enabling vi channels",
                            "    - asus-laptop: Fix an uninitialized variable",
                            "    - nfs: add missing selections of CONFIG_CRC32",
                            "    - nfsd: decrease sc_count directly if fail to queue dl_recall",
                            "    - i2c: atr: Fix wrong include",
                            "    - ftrace: fix incorrect hash size in register_ftrace_direct()",
                            "    - Bluetooth: l2cap: Process valid commands in too long frame",
                            "    - Bluetooth: vhci: Avoid needless snprintf() calls",
                            "    - btrfs: correctly escape subvol in btrfs_show_options()",
                            "    - crypto: caam/qi - Fix drv_ctx refcount bug",
                            "    - Revert \"UBUNTU: SAUCE: fs: hfs/hfsplus: add key_len boundary check to",
                            "      hfs_bnode_read_key\"",
                            "    - hfs/hfsplus: fix slab-out-of-bounds in hfs_bnode_read_key",
                            "    - loop: properly send KOBJ_CHANGED uevent for disk device",
                            "    - loop: LOOP_SET_FD: send uevents for partitions",
                            "    - mm/gup: fix wrongly calculated returned value in",
                            "      fault_in_safe_writeable()",
                            "    - mm: fix filemap_get_folios_contig returning batches of identical folios",
                            "    - mm: fix apply_to_existing_page_range()",
                            "    - ksmbd: Prevent integer overflow in calculation of deadtime",
                            "    - Revert \"smb: client: fix TCP timers deadlock after rmmod\"",
                            "    - riscv: Avoid fortify warning in syscall_get_arguments()",
                            "    - selftests/mm: generate a temporary mountpoint for cgroup filesystem",
                            "    - smb3 client: fix open hardlink on deferred close file error",
                            "    - string: Add load_unaligned_zeropad() code path to sized_strscpy()",
                            "    - tracing: Fix filter string testing",
                            "    - x86/microcode/AMD: Extend the SHA check to Zen5, block loading of any",
                            "      unreleased standalone Zen5 microcode patches",
                            "    - x86/cpu/amd: Fix workaround for erratum 1054",
                            "    - x86/boot/sev: Avoid shared GHCB page for early memory acceptance",
                            "    - scsi: megaraid_sas: Block zero-length ATA VPD inquiry",
                            "    - scsi: ufs: exynos: Ensure consistent phy reference counts",
                            "    - perf/x86/intel: Allow to update user space GPRs from PEBS records",
                            "    - perf/x86/intel/uncore: Fix the scale of IIO free running counters on SNR",
                            "    - perf/x86/intel/uncore: Fix the scale of IIO free running counters on ICX",
                            "    - perf/x86/intel/uncore: Fix the scale of IIO free running counters on SPR",
                            "    - drm/repaper: fix integer overflows in repeat functions",
                            "    - drm/msm/a6xx: Fix stale rpmh votes from GPU",
                            "    - drm/amd: Handle being compiled without SI or CIK support better",
                            "    - drm/amdgpu/dma_buf: fix page_link check",
                            "    - drm/sti: remove duplicate object names",
                            "    - drm/i915/gvt: fix unterminated-string-initialization warning",
                            "    - io_uring/net: fix accept multishot handling",
                            "    - cpufreq: Reference count policy in cpufreq_update_limits()",
                            "    - kbuild: Add '-fno-builtin-wcslen'",
                            "    - mptcp: sockopt: fix getting freebind & transparent",
                            "    - misc: pci_endpoint_test: Fix 'irq_type' to convey the correct type",
                            "    - efi/libstub: Bump up EFI_MMAP_NR_SLACK_SLOTS to 32",
                            "    - x86/xen: move xen_reserve_extra_memory()",
                            "    - x86/xen: fix memblock_reserve() usage on PVH",
                            "    - x86/split_lock: Fix the delayed detection logic",
                            "    - LoongArch: Eliminate superfluous get_numa_distances_cnt()",
                            "    - Revert \"usb: typec: fix potential array underflow in",
                            "      ucsi_ccg_sync_control()\"",
                            "    - usb: typec: fix potential array underflow in ucsi_ccg_sync_control()",
                            "    - usb: typec: fix pm usage counter imbalance in ucsi_ccg_sync_control()",
                            "    - landlock: Add the errata interface",
                            "    - nvmet-fc: Remove unused functions",
                            "    - xdp: Reset bpf_redirect_info before running a xdp's BPF prog.",
                            "    - sign-file,extract-cert: move common SSL helper functions to a header",
                            "    - sign-file,extract-cert: avoid using deprecated ERR_get_error_line()",
                            "    - sign-file,extract-cert: use pkcs11 provider for OPENSSL MAJOR >= 3",
                            "    - MIPS: dec: Declare which_prom() as static",
                            "    - MIPS: cevt-ds1287: Add missing ds1287.h include",
                            "    - MIPS: ds1287: Match ds1287_set_base_clock() function types",
                            "    - drm/tests: Build KMS helpers when DRM_KUNIT_TEST_HELPERS is enabled",
                            "    - ASoC: Intel: adl: add 2xrt1316 audio configuration",
                            "    - cgroup/cpuset: Fix incorrect isolated_cpus update in",
                            "      update_parent_effective_cpumask()",
                            "    - cgroup/cpuset: Correct invalid remote parition prs",
                            "    - cgroup/cpuset: Fix error handling in remote_partition_disable()",
                            "    - cgroup/cpuset: Revert \"Allow suppression of sched domain rebuild in",
                            "      update_cpumasks_hier()\"",
                            "    - cgroup/cpuset: Enforce at most one rebuild_sched_domains_locked() call",
                            "      per operation",
                            "    - cgroup/cpuset: Further optimize code if CONFIG_CPUSETS_V1 not set",
                            "    - cgroup/cpuset: Fix race between newly created partition and dying one",
                            "    - gpiolib: of: Fix the choice for Ingenic NAND quirk",
                            "    - ublk: refactor recovery configuration flag helpers",
                            "    - net: phy: move phy_link_change() prior to mdio_bus_phy_may_suspend()",
                            "    - iommu/exynos: Fix suspend/resume with IDENTITY domain",
                            "    - perf/dwc_pcie: fix some unreleased resources",
                            "    - Flush console log from kernel_power_off()",
                            "    - ASoC: amd: ps: use macro for ACP6.3 pci revision id",
                            "    - media: s5p-mfc: Corrected NV12M/NV21M plane-sizes",
                            "    - wifi: ath11k: Fix DMA buffer allocation to resolve SWIOTLB issues",
                            "    - wifi: ath11k: fix memory leak in ath11k_xxx_remove()",
                            "    - wifi: mac80211: ensure sdata->work is canceled before initialized.",
                            "    - can: flexcan: Add quirk to handle separate interrupt lines for mailboxes",
                            "    - can: flexcan: add NXP S32G2/S32G3 SoC support",
                            "    - Bluetooth: btusb: Add 2 HWIDs for MT7922",
                            "    - Bluetooth: Add quirk for broken READ_VOICE_SETTING",
                            "    - Bluetooth: Add quirk for broken READ_PAGE_SCAN_TYPE",
                            "    - drm/debugfs: fix printk format for bridge index",
                            "    - drm/amd/display: stop DML2 from removing pipes based on planes",
                            "    - drm/xe/xelp: Move Wa_16011163337 from tunings to workarounds",
                            "    - PCI: Add Rockchip Vendor ID",
                            "    - HID: pidff: Clamp PERIODIC effect period to device's logical range",
                            "    - HID: pidff: Stop all effects before enabling actuators",
                            "    - HID: pidff: Completely rework and fix pidff_reset function",
                            "    - HID: pidff: Simplify pidff_upload_effect function",
                            "    - HID: pidff: Define values used in pidff_find_special_fields",
                            "    - HID: pidff: Rescale time values to match field units",
                            "    - HID: pidff: Factor out code for setting gain",
                            "    - HID: pidff: Move all hid-pidff definitions to a dedicated header",
                            "    - HID: pidff: Simplify pidff_rescale_signed",
                            "    - HID: pidff: Use macros instead of hardcoded min/max values for shorts",
                            "    - HID: pidff: Factor out pool report fetch and remove excess declaration",
                            "    - HID: hid-universal-pidff: Add Asetek wheelbases support",
                            "    - HID: pidff: Comment and code style update",
                            "    - HID: pidff: Support device error response from PID_BLOCK_LOAD",
                            "    - HID: pidff: Remove redundant call to pidff_find_special_keys",
                            "    - HID: pidff: Rename two functions to align them with naming convention",
                            "    - HID: pidff: Clamp effect playback LOOP_COUNT value",
                            "    - HID: pidff: Compute INFINITE value instead of using hardcoded 0xffff",
                            "    - HID: pidff: Fix 90 degrees direction name North -> East",
                            "    - HID: pidff: Fix set_device_control()",
                            "    - media: mgb4: Fix CMT registers update logic",
                            "    - media: mgb4: Fix switched CMT frequency range \"magic values\" sets",
                            "    - media: rockchip: rga: fix rga offset lookup",
                            "    - media: v4l: Add a helper for setting up link-frequencies control",
                            "    - media: v4l2-common.h: kerneldoc: correctly format return values",
                            "    - media: imx219: Adjust PLL settings based on the number of MIPI lanes",
                            "    - media: nuvoton: Fix reference handling of ece_node",
                            "    - media: nuvoton: Fix reference handling of ece_pdev",
                            "    - media: i2c: imx319: Rectify runtime PM handling probe and remove",
                            "    - media: i2c: imx214: Rectify probe error handling related to runtime PM",
                            "    - media: chips-media: wave5: Fix gray color on screen",
                            "    - media: chips-media: wave5: Fix a hang after seeking",
                            "    - wifi: mt76: mt7925: ensure wow pattern command align fw format",
                            "    - wifi: mt76: mt7925: fix country count limitation for CLC",
                            "    - ALSA: hda/realtek: Enable Mute LED on HP OMEN 16 Laptop xd000xx",
                            "    - accel/ivpu: Fix warning in ivpu_ipc_send_receive_internal()",
                            "    - ima: limit the number of open-writers integrity violations",
                            "    - arm64: dts: exynos: gs101: disable pinctrl_gsacore node",
                            "    - btrfs: tests: fix chunk map leak after failure to add it to the tree",
                            "    - mm/damon/ops: have damon_get_folio return folio even for tail pages",
                            "    - CIFS: Propagate min offload along with other parameters from primary to",
                            "      secondary channels.",
                            "    - dm-integrity: fix non-constant-time tag verification",
                            "    - landlock: Move code to ease future backports",
                            "    - landlock: Add erratum for TCP fix",
                            "    - misc: pci_endpoint_test: Fix displaying 'irq_type' after 'request_irq'",
                            "      error",
                            "    - net: mana: Switch to page pool for jumbo frames",
                            "    - PCI: j721e: Fix the value of .linkdown_irq_regfield for J784S4",
                            "    - pinctrl: samsung: add support for eint_fltcon_offset",
                            "    - s390/virtio_ccw: Don't allocate/assign airqs for non-existing queues",
                            "    - thermal/drivers/mediatek/lvts_thermal: Allow early empty sensor slots",
                            "    - thermal/drivers/mediatek/lvts_thermal: Fix wrong lvts_ctrl index",
                            "    - thermal/drivers/mediatek/lvts: Disable monitor mode during suspend",
                            "    - thermal/drivers/mediatek/lvts: Disable Stage 3 thermal threshold",
                            "    - NFSD: fix decoding in nfs4_xdr_dec_cb_getattr",
                            "    - libbpf: Prevent compiler warnings/errors",
                            "    - Upstream stable to v6.6.88, v6.12.24",
                            "    - SAUCE: Enable upstream config option \"CONFIG_CPUSETS_V1\"",
                            "",
                            "  * [SRU] ixgbe: Add support for E610 in Noble (LP: #2131265)",
                            "    - ixgbe: Add support for E610 FW Admin Command Interface",
                            "    - ixgbe: Add support for E610 device capabilities detection",
                            "    - ixgbe: Add link management support for E610 device",
                            "    - ixgbe: Add support for NVM handling in E610 device",
                            "    - ixgbe: Add support for EEPROM dump in E610 device",
                            "    - ixgbe: Add ixgbe_x540 multiple header inclusion protection",
                            "    - ixgbe: Clean up the E610 link management related code",
                            "    - ixgbe: Enable link management in E610 device",
                            "    - ixgbe: fix media type detection for E610 device",
                            "    - ixgbe: fix media cage present detection for E610 device",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586)",
                            "    - io_uring: don't use int for ABI",
                            "    - ALSA: hda/realtek: Fix headset mic on HONOR BRB-X",
                            "    - ALSA: hda/realtek: Add Framework Laptop 13 (AMD Ryzen AI 300) to quirks",
                            "    - smb: client: remove redundant lstrp update in negotiate protocol",
                            "    - gpio: virtio: Fix config space reading.",
                            "    - gpio: mlxbf2: use platform_get_irq_optional()",
                            "    - gpio: mlxbf3: use platform_get_irq_optional()",
                            "    - netlink: avoid infinite retry looping in netlink_unicast()",
                            "    - net: phy: micrel: fix KSZ8081/KSZ8091 cable test",
                            "    - net: gianfar: fix device leak when querying time stamp info",
                            "    - net: enetc: fix device and OF node leak at probe",
                            "    - net: mtk_eth_soc: fix device leak at probe",
                            "    - net: ti: icss-iep: fix device and OF node leaks at probe",
                            "    - net: dpaa: fix device leak when querying time stamp info",
                            "    - NFSD: detect mismatch of file handle and delegation stateid in OPEN op",
                            "    - PCI: Extend isolated function probing to LoongArch",
                            "    - LoongArch: BPF: Fix jump offset calculation in tailcall",
                            "    - sunvdc: Balance device refcount in vdc_port_mpgroup_check",
                            "    - Documentation: ACPI: Fix parent device references",
                            "    - ACPI: processor: perflib: Fix initial _PPC limit application",
                            "    - ACPI: processor: perflib: Move problematic pr->performance check",
                            "    - smb: client: let send_done() cleanup before calling",
                            "      smbd_disconnect_rdma_connection()",
                            "    - smb: client: don't wait for info->send_pending == 0 on error",
                            "    - KVM: x86: Plumb \"force_immediate_exit\" into kvm_entry() tracepoint",
                            "    - KVM: VMX: Re-enter guest in fastpath for \"spurious\" preemption timer",
                            "      exits",
                            "    - KVM: VMX: Handle forced exit due to preemption timer in fastpath",
                            "    - KVM: x86: Move handling of is_guest_mode() into fastpath exit handlers",
                            "    - KVM: VMX: Handle KVM-induced preemption timer exits in fastpath for L2",
                            "    - KVM: x86: Fully defer to vendor code to decide how to force immediate",
                            "      exit",
                            "    - KVM: x86: Convert vcpu_run()'s immediate exit param into a generic",
                            "      bitmap",
                            "    - KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag",
                            "    - KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is supported",
                            "    - KVM: VMX: Extract checking of guest's DEBUGCTL into helper",
                            "    - KVM: nVMX: Check vmcs12->guest_ia32_debugctl on nested VM-Enter",
                            "    - KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter APIs",
                            "    - KVM: VMX: Preserve host's DEBUGCTLMSR_FREEZE_IN_SMM while running the",
                            "      guest",
                            "    - udp: also consider secpath when evaluating ipsec use for checksumming",
                            "    - net: ti: icss-iep: Fix incorrect type for return value in extts_enable()",
                            "    - intel_idle: Allow loading ACPI tables for any family",
                            "    - ptp: prevent possible ABBA deadlock in ptp_clock_freerun()",
                            "    - arm64: Handle KCOV __init vs inline mismatches",
                            "    - nvme-pci: try function level reset on init failure",
                            "    - udf: Verify partition map count",
                            "    - hfs: fix not erasing deleted b-tree node issue",
                            "    - better lockdep annotations for simple_recursive_removal()",
                            "    - ata: libata-sata: Disallow changing LPM state if not supported",
                            "    - fs/ntfs3: correctly create symlink for relative path",
                            "    - ext2: Handle fiemap on empty files to prevent EINVAL",
                            "    - fix locking in efi_secret_unlink()",
                            "    - securityfs: don't pin dentries twice, once is enough...",
                            "    - tracefs: Add d_delete to remove negative dentries",
                            "    - usb: xhci: print xhci->xhc_state when queue_command failed",
                            "    - platform/x86/amd: pmc: Add Lenovo Yoga 6 13ALC6 to pmc quirk list",
                            "    - cpufreq: CPPC: Mark driver with NEED_UPDATE_LIMITS flag",
                            "    - selftests/futex: Define SYS_futex on 32-bit architectures with 64-bit",
                            "      time_t",
                            "    - usb: typec: ucsi: psy: Set current max to 100mA for BC 1.2 and Default",
                            "    - usb: xhci: Avoid showing warnings for dying controller",
                            "    - usb: xhci: Set avg_trb_len = 8 for EP0 during Address Device Command",
                            "    - usb: xhci: Avoid showing errors during surprise removal",
                            "    - soc: qcom: rpmh-rsc: Add RSC version 4 support",
                            "    - remoteproc: imx_rproc: skip clock enable when M-core is managed by the",
                            "      SCU",
                            "    - gpio: wcd934x: check the return value of regmap_update_bits()",
                            "    - cpufreq: Exit governor when failed to start old governor",
                            "    - PM / devfreq: governor: Replace sscanf() with kstrtoul() in",
                            "      set_freq_store()",
                            "    - EDAC/synopsys: Clear the ECC counters on init",
                            "    - ASoC: soc-dapm: set bias_level if snd_soc_dapm_set_bias_level() was",
                            "      successed",
                            "    - thermal/drivers/qcom-spmi-temp-alarm: Enable stage 2 shutdown when",
                            "      required",
                            "    - tools/nolibc: define time_t in terms of __kernel_old_time_t",
                            "    - iio: adc: ad_sigma_delta: don't overallocate scan buffer",
                            "    - gpio: tps65912: check the return value of regmap_update_bits()",
                            "    - tools/build: Fix s390(x) cross-compilation with clang",
                            "    - selftests: tracing: Use mutex_unlock for testing glob filter",
                            "    - ACPI: PRM: Reduce unnecessary printing to avoid user confusion",
                            "    - firmware: tegra: Fix IVC dependency problems",
                            "    - PM: runtime: Clear power.needs_force_resume in pm_runtime_reinit()",
                            "    - thermal: sysfs: Return ENODATA instead of EAGAIN for reads",
                            "    - PM: sleep: console: Fix the black screen issue",
                            "    - ACPI: processor: fix acpi_object initialization",
                            "    - mmc: sdhci-msm: Ensure SD card power isn't ON when card removed",
                            "    - ACPI: APEI: GHES: add TAINT_MACHINE_CHECK on GHES panic path",
                            "    - pps: clients: gpio: fix interrupt handling order in remove path",
                            "    - reset: brcmstb: Enable reset drivers for ARCH_BCM2835",
                            "    - char: misc: Fix improper and inaccurate error code returned by",
                            "      misc_init()",
                            "    - mei: bus: Check for still connected devices in mei_cl_bus_dev_release()",
                            "    - mmc: rtsx_usb_sdmmc: Fix error-path in sd_set_power_mode()",
                            "    - ALSA: hda: Handle the jack polling always via a work",
                            "    - ALSA: hda: Disable jack polling at shutdown",
                            "    - x86/bugs: Avoid warning when overriding return thunk",
                            "    - ASoC: hdac_hdmi: Rate limit logging on connection and disconnection",
                            "    - ALSA: intel8x0: Fix incorrect codec index usage in mixer for ICH4",
                            "    - usb: typec: intel_pmc_mux: Defer probe if SCU IPC isn't present",
                            "    - usb: core: usb_submit_urb: downgrade type check",
                            "    - pm: cpupower: Fix the snapshot-order of tsc,mperf, clock in mperf_stop()",
                            "    - imx8m-blk-ctrl: set ISI panic write hurry level",
                            "    - soc: qcom: mdt_loader: Actually use the e_phoff",
                            "    - platform/x86: thinkpad_acpi: Handle KCOV __init vs inline mismatches",
                            "    - platform/chrome: cros_ec_typec: Defer probe on missing EC parent",
                            "    - ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control",
                            "    - ALSA: pcm: Rewrite recalculate_boundary() to avoid costly loop",
                            "    - ALSA: usb-audio: Avoid precedence issues in mixer_quirks macros",
                            "    - iio: adc: ad7768-1: Ensure SYNC_IN pulse minimum timing requirement",
                            "    - ASoC: codecs: rt5640: Retry DEVICE_ID verification",
                            "    - ASoC: qcom: use drvdata instead of component to keep id",
                            "    - powerpc/thp: tracing: Hide hugepage events under CONFIG_PPC_BOOK3S_64",
                            "    - Bluetooth: hci_sock: Reset cookie to zero in hci_sock_free_cookie()",
                            "    - xen/netfront: Fix TX response spurious interrupts",
                            "    - net: usb: cdc-ncm: check for filtering capability",
                            "    - ktest.pl: Prevent recursion of default variable options",
                            "    - wifi: cfg80211: reject HTC bit for management frames",
                            "    - s390/time: Use monotonic clock in get_cycles()",
                            "    - be2net: Use correct byte order and format string for TCP seq and ack_seq",
                            "    - wifi: rtw89: Lower the timeout in rtw89_fw_read_c2h_reg() for USB",
                            "    - et131x: Add missing check after DMA map",
                            "    - net: ag71xx: Add missing check after DMA map",
                            "    - net/mlx5e: Properly access RCU protected qdisc_sleeping variable",
                            "    - arm64: Mark kernel as tainted on SAE and SError panic",
                            "    - net: mctp: Prevent duplicate binds",
                            "    - wifi: cfg80211: Fix interface type validation",
                            "    - net: ipv4: fix incorrect MTU in broadcast routes",
                            "    - net: thunderx: Fix format-truncation warning in bgx_acpi_match_id()",
                            "    - net: phy: micrel: Add ksz9131_resume()",
                            "    - perf/cxlpmu: Remove unintended newline from IRQ name format string",
                            "    - wifi: iwlwifi: mvm: set gtk id also in older FWs",
                            "    - um: Re-evaluate thread flags repeatedly",
                            "    - wifi: iwlwifi: mvm: fix scan request validation",
                            "    - s390/stp: Remove udelay from stp_sync_clock()",
                            "    - sched/fair: Bump sd->max_newidle_lb_cost when newidle balance fails",
                            "    - wifi: mac80211: don't complete management TX on SAE commit",
                            "    - (powerpc/512) Fix possible `dma_unmap_single()` on uninitialized pointer",
                            "    - ipv6: mcast: Check inet6_dev->dead under idev->mc_lock in",
                            "      __ipv6_dev_mc_inc().",
                            "    - wifi: mac80211: fix rx link assignment for non-MLO stations",
                            "    - drm/msm: use trylock for debugfs",
                            "    - wifi: rtw89: Fix rtw89_mac_power_switch() for USB",
                            "    - wifi: rtw89: Disable deep power saving for USB/SDIO",
                            "    - wifi: mt76: mt7915: mcu: re-init MCU before loading FW patch",
                            "    - kselftest/arm64: Specify SVE data when testing VL set in sve-ptrace",
                            "    - net: thunderbolt: Enable end-to-end flow control also in transmit",
                            "    - net: thunderbolt: Fix the parameter passing of",
                            "      tb_xdomain_enable_paths()/tb_xdomain_disable_paths()",
                            "    - net: atlantic: add set_power to fw_ops for atl2 to fix wol",
                            "    - net: fec: allow disable coalescing",
                            "    - drm/amd/display: Separate set_gsl from set_gsl_source_select",
                            "    - wifi: ath12k: Add memset and update default rate value in wmi tx",
                            "      completion",
                            "    - wifi: iwlwifi: dvm: fix potential overflow in rs_fill_link_cmd()",
                            "    - wifi: iwlwifi: fw: Fix possible memory leak in iwl_fw_dbg_collect",
                            "    - drm/amd/display: Fix 'failed to blank crtc!'",
                            "    - wifi: mac80211: update radar_required in channel context after channel",
                            "      switch",
                            "    - wifi: rtlwifi: fix possible skb memory leak in",
                            "      `_rtl_pci_rx_interrupt()`.",
                            "    - wifi: ath12k: Enable REO queue lookup table feature on QCN9274 hw2.0",
                            "    - powerpc: floppy: Add missing checks after DMA map",
                            "    - netmem: fix skb_frag_address_safe with unreadable skbs",
                            "    - wifi: iwlegacy: Check rate_idx range after addition",
                            "    - neighbour: add support for NUD_PERMANENT proxy entries",
                            "    - dpaa_eth: don't use fixed_phy_change_carrier",
                            "    - drm/amd: Allow printing VanGogh OD SCLK levels without setting dpm to",
                            "      manual",
                            "    - net: vlan: Make is_vlan_dev() a stub when VLAN is not configured",
                            "    - net: vlan: Replace BUG() with WARN_ON_ONCE() in vlan_dev_* stubs",
                            "    - gve: Return error for unknown admin queue command",
                            "    - net: dsa: b53: fix b53_imp_vlan_setup for BCM5325",
                            "    - net: dsa: b53: prevent GMII_PORT_OVERRIDE_CTRL access on BCM5325",
                            "    - net: dsa: b53: prevent DIS_LEARNING access on BCM5325",
                            "    - net: dsa: b53: prevent SWITCH_CTRL access on BCM5325",
                            "    - bpftool: Fix JSON writer resource leak in version command",
                            "    - ptp: Use ratelimite for freerun error message",
                            "    - wifi: rtlwifi: fix possible skb memory leak in",
                            "      _rtl_pci_init_one_rxdesc()",
                            "    - ionic: clean dbpage in de-init",
                            "    - net: ncsi: Fix buffer overflow in fetching version id",
                            "    - drm: renesas: rz-du: mipi_dsi: Add min check for VCLK range",
                            "    - drm/ttm: Should to return the evict error",
                            "    - uapi: in6: restore visibility of most IPv6 socket options",
                            "    - bpf: Make reg_not_null() true for CONST_PTR_TO_MAP",
                            "    - selftests/bpf: Fix a user_ringbuf failure with arm64 64KB page size",
                            "    - drm/amd/display: Avoid trying AUX transactions on disconnected ports",
                            "    - drm/ttm: Respect the shrinker core free target",
                            "    - net: dsa: b53: fix IP_MULTICAST_CTRL on BCM5325",
                            "    - vsock/virtio: Resize receive buffers so that each SKB fits in a 4K page",
                            "    - vhost: fail early when __vhost_add_used() fails",
                            "    - drm/amd/display: Only finalize atomic_obj if it was initialized",
                            "    - drm/amd/display: Avoid configuring PSR granularity if PSR-SU not",
                            "      supported",
                            "    - watchdog: sbsa: Adjust keepalive timeout to avoid MediaTek WS0 race",
                            "      condition",
                            "    - cifs: Fix calling CIFSFindFirst() for root path without msearch",
                            "    - crypto: hisilicon/hpre - fix dma unmap sequence",
                            "    - clk: tegra: periph: Fix error handling and resolve unsigned compare",
                            "      warning",
                            "    - mfd: axp20x: Set explicit ID for AXP313 regulator",
                            "    - phy: rockchip-pcie: Properly disable TEST_WRITE strobe signal",
                            "    - fs/orangefs: use snprintf() instead of sprintf()",
                            "    - watchdog: dw_wdt: Fix default timeout",
                            "    - hwmon: (emc2305) Set initial PWM minimum value during probe based on",
                            "      thermal state",
                            "    - clk: qcom: ipq5018: keep XO clock always on",
                            "    - MIPS: vpe-mt: add missing prototypes for vpe_{alloc,start,stop,free}",
                            "    - watchdog: iTCO_wdt: Report error if timeout configuration fails",
                            "    - crypto: jitter - fix intermediary handling",
                            "    - MIPS: lantiq: falcon: sysctrl: fix request memory check logic",
                            "    - media: v4l2-common: Reduce warnings about missing V4L2_CID_LINK_FREQ",
                            "      control",
                            "    - leds: leds-lp50xx: Handle reg to get correct multi_index",
                            "    - dmaengine: stm32-dma: configure next sg only if there are more than 2",
                            "      sgs",
                            "    - RDMA/core: reduce stack using in nldev_stat_get_doit()",
                            "    - power: supply: qcom_battmgr: Add lithium-polymer entry",
                            "    - scsi: mpt3sas: Correctly handle ATA device errors",
                            "    - scsi: mpi3mr: Correctly handle ATA device errors",
                            "    - pinctrl: stm32: Manage irq affinity settings",
                            "    - media: tc358743: Check I2C succeeded during probe",
                            "    - media: tc358743: Return an appropriate colorspace from tc358743_set_fmt",
                            "    - media: tc358743: Increase FIFO trigger level to 374",
                            "    - media: usb: hdpvr: disable zero-length read messages",
                            "    - media: uvcvideo: Fix bandwidth issue for Alcor camera",
                            "    - crypto: octeontx2 - add timeout for load_fvc completion poll",
                            "    - soundwire: amd: serialize amd manager resume sequence during pm_prepare",
                            "    - soundwire: Move handle_nested_irq outside of sdw_dev_lock",
                            "    - md: dm-zoned-target: Initialize return variable r to avoid uninitialized",
                            "      use",
                            "    - module: Prevent silent truncation of module name in delete_module(2)",
                            "    - i3c: add missing include to internal header",
                            "    - rtc: ds1307: handle oscillator stop flag (OSF) for ds1341",
                            "    - i3c: don't fail if GETHDRCAP is unsupported",
                            "    - i3c: master: Initialize ret in i3c_i2c_notifier_call()",
                            "    - dm-mpath: don't print the \"loaded\" message if registering fails",
                            "    - dm-table: fix checking for rq stackable devices",
                            "    - apparmor: use the condition in AA_BUG_FMT even with debug disabled",
                            "    - i2c: Force DLL0945 touchpad i2c freq to 100khz",
                            "    - f2fs: check the generic conditions first",
                            "    - kconfig: lxdialog: replace strcpy() with strncpy() in inputbox.c",
                            "    - vfio/type1: conditional rescheduling while pinning",
                            "    - kconfig: nconf: Ensure null termination where strncpy is used",
                            "    - scsi: Fix sas_user_scan() to handle wildcard and multi-channel scans",
                            "    - scsi: target: core: Generate correct identifiers for PR OUT transport",
                            "      IDs",
                            "    - scsi: aacraid: Stop using PCI_IRQ_AFFINITY",
                            "    - vfio/mlx5: fix possible overflow in tracking max message size",
                            "    - ipmi: Use dev_warn_ratelimited() for incorrect message warnings",
                            "    - kconfig: gconf: avoid hardcoding model2 in on_treeview2_cursor_changed()",
                            "    - kconfig: gconf: fix potential memory leak in renderer_edited()",
                            "    - kconfig: lxdialog: fix 'space' to (de)select options",
                            "    - ipmi: Fix strcpy source and destination the same",
                            "    - net: phy: smsc: add proper reset flags for LAN8710A",
                            "    - ASoC: Intel: avs: Fix uninitialized pointer error in probe()",
                            "    - pNFS: Fix stripe mapping in block/scsi layout",
                            "    - pNFS: Fix disk addr range check in block/scsi layout",
                            "    - pNFS: Handle RPC size limit for layoutcommits",
                            "    - rtc: ds1307: remove clear of oscillator stop flag (OSF) in probe",
                            "    - scsi: lpfc: Remove redundant assignment to avoid memory leak",
                            "    - ASoC: fsl_sai: replace regmap_write with regmap_update_bits",
                            "    - cifs: reset iface weights when we cannot find a candidate",
                            "    - iommufd: Report unmapped bytes in the error path of",
                            "      iopt_unmap_iova_range",
                            "    - ext4: fix zombie groups in average fragment size lists",
                            "    - ext4: fix largest free orders lists corruption on mb_optimize_scan",
                            "      switch",
                            "    - misc: rtsx: usb: Ensure mmc child device is active when card is present",
                            "    - usb: typec: ucsi: Update power_supply on power role change",
                            "    - thunderbolt: Fix copy+paste error in match_service_id()",
                            "    - cdc-acm: fix race between initial clearing halt and open",
                            "    - btrfs: zoned: use filesystem size not disk size for reclaim decision",
                            "    - btrfs: abort transaction during log replay if walk_log_tree() failed",
                            "    - btrfs: zoned: do not remove unwritten non-data block group",
                            "    - btrfs: clear dirty status from extent buffer on error at",
                            "      insert_new_root()",
                            "    - btrfs: fix log tree replay failure due to file with 0 links and extents",
                            "    - btrfs: zoned: do not select metadata BG as finish target",
                            "    - parisc: Makefile: fix a typo in palo.conf",
                            "    - media: uvcvideo: Do not mark valid metadata as invalid",
                            "    - tools/nolibc: fix spelling of FD_SETBITMASK in FD_* macros",
                            "    - HID: magicmouse: avoid setting up battery timer when not needed",
                            "    - HID: apple: avoid setting up battery timer for devices without battery",
                            "    - rcu: Fix racy re-initialization of irq_work causing hangs",
                            "    - cpufreq: armada-8k: Fix off by one in armada_8k_cpufreq_free_table()",
                            "    - platform/chrome: cros_ec: Unregister notifier in cros_ec_unregister()",
                            "    - m68k: Fix lost column on framebuffer debug console",
                            "    - usb: atm: cxacru: Merge cxacru_upload_firmware() into",
                            "      cxacru_heavy_init()",
                            "    - usb: gadget: udc: renesas_usb3: fix device leak at unbind",
                            "    - usb: musb: omap2430: fix device leak at unbind",
                            "    - usb: dwc3: meson-g12a: fix device leaks at unbind",
                            "    - bus: mhi: host: Fix endianness of BHI vector table",
                            "    - vt: keyboard: Don't process Unicode characters in K_OFF mode",
                            "    - vt: defkeymap: Map keycodes above 127 to K_HOLE",
                            "    - lib/crypto: mips/chacha: Fix clang build and remove unneeded byteswap",
                            "    - crypto: qat - lower priority for skcipher and aead algorithms",
                            "    - ksmbd: extend the connection limiting mechanism to support IPv6",
                            "    - tracing: fprobe-event: Sanitize wildcard for fprobe event name",
                            "    - ext4: check fast symlink for ea_inode correctly",
                            "    - ext4: fix fsmap end of range reporting with bigalloc",
                            "    - ext4: fix reserved gdt blocks handling in fsmap",
                            "    - ext4: don't try to clear the orphan_present feature block device is r/o",
                            "    - ext4: use kmalloc_array() for array space allocation",
                            "    - ext4: fix hole length calculation overflow in non-extent inodes",
                            "    - btrfs: zoned: fix write time activation failure for metadata block group",
                            "    - arm64: dts: ti: k3-pinctrl: Enable Schmitt Trigger by default",
                            "    - arm64: dts: ti: k3-am62a7-sk: fix pinmux for main_uart1",
                            "    - arm64: dts: ti: k3-am62-verdin: Enable pull-ups on I2C buses",
                            "    - dt-bindings: display: sprd,sharkl3-dpu: Fix missing clocks constraints",
                            "    - dt-bindings: display: sprd,sharkl3-dsi-host: Fix missing clocks",
                            "      constraints",
                            "    - scsi: mpi3mr: Fix race between config read submit and interrupt",
                            "      completion",
                            "    - ata: libata-scsi: Fix ata_to_sense_error() status handling",
                            "    - scsi: ufs: ufs-pci: Fix hibernate state transition for Intel MTL-like",
                            "      host controllers",
                            "    - scsi: ufs: ufs-pci: Fix default runtime and system PM levels",
                            "    - ata: libata-scsi: Fix CDL control",
                            "    - zynq_fpga: use sgtable-based scatterlist wrappers",
                            "    - iio: adc: ad_sigma_delta: change to buffer predisable",
                            "    - wifi: brcmsmac: Remove const from tbl_ptr parameter in",
                            "      wlc_lcnphy_common_read_table()",
                            "    - wifi: ath12k: fix dest ring-buffer corruption",
                            "    - wifi: ath12k: fix source ring-buffer corruption",
                            "    - wifi: ath12k: fix dest ring-buffer corruption when ring is full",
                            "    - wifi: ath11k: fix dest ring-buffer corruption",
                            "    - wifi: ath11k: fix source ring-buffer corruption",
                            "    - wifi: ath11k: fix dest ring-buffer corruption when ring is full",
                            "    - pwm: imx-tpm: Reset counter if CMOD is 0",
                            "    - pwm: mediatek: Handle hardware enable and clock enable separately",
                            "    - pwm: mediatek: Fix duty and period setting",
                            "    - hwmon: (gsc-hwmon) fix fan pwm setpoint show functions",
                            "    - mtd: spi-nor: Fix spi_nor_try_unlock_all()",
                            "    - mtd: spinand: propagate spinand_wait() errors from spinand_write_page()",
                            "    - mtd: rawnand: fsmc: Add missing check after DMA map",
                            "    - mtd: rawnand: renesas: Add missing check after DMA map",
                            "    - PCI: endpoint: Fix configfs group removal on driver teardown",
                            "    - vhost/vsock: Avoid allocating arbitrarily-sized SKBs",
                            "    - phy: qcom: phy-qcom-m31: Update IPQ5332 M31 USB phy initialization",
                            "      sequence",
                            "    - soc/tegra: pmc: Ensure power-domains are in a known state",
                            "    - parisc: Check region is readable by user in raw_copy_from_user()",
                            "    - parisc: Define and use set_pte_at()",
                            "    - parisc: Makefile: explain that 64BIT requires both 32-bit and 64-bit",
                            "      compilers",
                            "    - parisc: Rename pte_needs_flush() to pte_needs_cache_flush() in cache.c",
                            "    - parisc: Try to fixup kernel exception in bad_area_nosemaphore path of",
                            "      do_page_fault()",
                            "    - parisc: Update comments in make_insert_tlb",
                            "    - media: gspca: Add bounds checking to firmware parser",
                            "    - media: hi556: correct the test pattern configuration",
                            "    - media: imx: fix a potential memory leak in",
                            "      imx_media_csc_scaler_device_init()",
                            "    - media: vivid: fix wrong pixel_array control size",
                            "    - media: verisilicon: Fix AV1 decoder clock frequency",
                            "    - media: v4l2-ctrls: Don't reset handler's error in",
                            "      v4l2_ctrl_handler_free()",
                            "    - media: ov2659: Fix memory leaks in ov2659_probe()",
                            "    - media: qcom: camss: cleanup media device allocated resource on error",
                            "      path",
                            "    - media: venus: hfi: explicitly release IRQ during teardown",
                            "    - media: venus: vdec: Clamp param smaller than 1fps and bigger than 240.",
                            "    - media: venus: venc: Clamp param smaller than 1fps and bigger than 240",
                            "    - drm/amd: Restore cached power limit during resume",
                            "    - drm/amdgpu: update mmhub 3.0.1 client id mappings",
                            "    - drm/amd/display: Add primary plane to commits for correct VRR handling",
                            "    - drm/amd/display: Don't overwrite dce60_clk_mgr",
                            "    - mptcp: drop skb if MPTCP skb extension allocation fails",
                            "    - mptcp: pm: kernel: flush: do not reset ADD_ADDR limit",
                            "    - selftests/memfd: add test for mapping write-sealed memfd read-only",
                            "    - net: Add net_passive_inc() and net_passive_dec().",
                            "    - smb: client: fix netns refcount leak after net_passive changes",
                            "    - net_sched: sch_ets: implement lockless ets_dump()",
                            "    - leds: flash: leds-qcom-flash: Limit LED current based on thermal",
                            "      condition",
                            "    - leds: flash: leds-qcom-flash: Fix registry access after re-bind",
                            "    - fscrypt: Don't use problematic non-inline crypto engines",
                            "    - block: Make REQ_OP_ZONE_FINISH a write operation",
                            "    - usb: typec: fusb302: cache PD RX state",
                            "    - btrfs: don't ignore inode missing when replaying log tree",
                            "    - btrfs: move transaction aborts to the error site in",
                            "      add_block_group_free_space()",
                            "    - btrfs: always abort transaction on failure to add block group to free",
                            "      space tree",
                            "    - xfs: fully decouple XFS_IBULK* flags from XFS_IWALK* flags",
                            "    - btrfs: fix ssd_spread overallocation",
                            "    - btrfs: constify more pointer parameters",
                            "    - btrfs: populate otime when logging an inode item",
                            "    - btrfs: send: factor out common logic when sending xattrs",
                            "    - btrfs: send: only use boolean variables at process_recorded_refs()",
                            "    - btrfs: send: add and use helper to rename current inode when processing",
                            "      refs",
                            "    - btrfs: send: keep the current inode's path cached",
                            "    - btrfs: send: avoid path allocation for the current inode when issuing",
                            "      commands",
                            "    - btrfs: send: use fallocate for hole punching with send stream v2",
                            "    - btrfs: send: make fs_path_len() inline and constify its argument",
                            "    - wifi: mac80211: check basic rates validity in sta_link_apply_parameters",
                            "    - usb: dwc3: imx8mp: fix device leak at unbind",
                            "    - ata: Fix SATA_MOBILE_LPM_POLICY description in Kconfig",
                            "    - PM: runtime: Take active children into account in",
                            "      pm_runtime_get_if_in_use()",
                            "    - ata: libata-scsi: Return aborted command when missing sense and result",
                            "      TF",
                            "    - kbuild: userprogs: use correct linker when mixing clang and GNU ld",
                            "    - memstick: Fix deadlock by moving removing flag earlier",
                            "    - mmc: sdhci-pci-gli: GL9763e: Rename the gli_set_gl9763e() for",
                            "      consistency",
                            "    - squashfs: fix memory leak in squashfs_fill_super",
                            "    - mm/memory-failure: fix infinite UCE for VM_PFNMAP pfn",
                            "    - ALSA: hda/realtek: Add support for HP EliteBook x360 830 G6 and",
                            "      EliteBook 830 G6",
                            "    - drm/amd/display: Fix fractional fb divider in set_pixel_clock_v3",
                            "    - drm/amd/display: Fix DP audio DTO1 clock source on DCE 6.",
                            "    - drm/amd/display: Find first CRTC and its line time in",
                            "      dce110_fill_display_configs",
                            "    - drm/amd/display: Fill display clock and vblank time in",
                            "      dce110_fill_display_configs",
                            "    - soc: qcom: mdt_loader: Fix error return values in mdt_header_valid()",
                            "    - PCI: rockchip: Use standard PCIe definitions",
                            "    - PCI: rockchip: Set Target Link Speed to 5.0 GT/s before retraining",
                            "    - PCI: imx6: Delay link start until configfs 'start' written",
                            "    - PCI: imx6: Add IMX8MM_EP and IMX8MP_EP fixed 256-byte BAR 4 in",
                            "      epc_features",
                            "    - scsi: mpi3mr: Drop unnecessary volatile from __iomem pointers",
                            "    - scsi: mpi3mr: Serialize admin queue BAR writes on 32-bit systems",
                            "    - ext4: preserve SB_I_VERSION on remount",
                            "    - arm64: dts: ti: k3-am62-main: Remove eMMC High Speed DDR support",
                            "    - mptcp: remove duplicate sk_reset_timer call",
                            "    - mptcp: disable add_addr retransmission when timeout is 0",
                            "    - selftests: mptcp: pm: check flush doesn't reset limits",
                            "    - mmc: sdhci-pci-gli: Use PCI AER definitions, not hard-coded values",
                            "    - mmc: sdhci-pci-gli: Add a new function to simplify the code",
                            "    - cpuidle: menu: Remove iowait influence",
                            "    - cpuidle: governors: menu: Avoid selecting states with too much latency",
                            "    - fpga: zynq_fpga: Fix the wrong usage of dma_map_sgtable()",
                            "    - iio: pressure: bmp280: Use IS_ERR() in bmp280_common_probe()",
                            "    - iio: proximity: isl29501: fix buffered read on big-endian systems",
                            "    - most: core: Drop device reference after usage in get_channel()",
                            "    - cdx: Fix off-by-one error in cdx_rpmsg_probe()",
                            "    - usb: quirks: Add DELAY_INIT quick for another SanDisk 3.2Gen1 Flash",
                            "      Drive",
                            "    - usb: core: hcd: fix accessing unmapped memory in SINGLE_STEP_SET_FEATURE",
                            "      test",
                            "    - usb: renesas-xhci: Fix External ROM access timeouts",
                            "    - USB: storage: Add unusual-devs entry for Novatek NTK96550-based camera",
                            "    - usb: storage: realtek_cr: Use correct byte order for bcs->Residue",
                            "    - USB: storage: Ignore driver CD mode for Realtek multi-mode Wi-Fi dongles",
                            "    - usb: dwc3: Ignore late xferNotReady event to prevent halt timeout",
                            "    - usb: dwc3: pci: add support for the Intel Wildcat Lake",
                            "    - drm/amd/display: Don't overclock DCE 6 by 15%",
                            "    - compiler: remove __ADDRESSABLE_ASM{_STR,}() again",
                            "    - mmc: sdhci-pci-gli: GL9763e: Mask the replay timer timeout of AER",
                            "    - powerpc/boot: Fix build with gcc 15",
                            "    - tracing: Remove unneeded goto out logic",
                            "    - iio: temperature: maxim_thermocouple: use DMA-safe buffer for spi_read()",
                            "    - iio: imu: inv_icm42600: switch timestamp type from int64_t __aligned(8)",
                            "      to aligned_s64",
                            "    - iio: imu: inv_icm42600: use = { } instead of memset()",
                            "    - iio: imu: inv_icm42600: Convert to uXX and sXX integer types",
                            "    - iio: imu: inv_icm42600: change invalid data error to -EBUSY",
                            "    - usb: xhci: Fix slot_id resource race conflict",
                            "    - usb: typec: maxim_contaminant: re-enable cc toggle if cc is open and",
                            "      port is clean",
                            "    - usb: typec: maxim_contaminant: disable low power mode when reading",
                            "      comparator values",
                            "    - spi: spi-fsl-lpspi: Clamp too high speed_hz",
                            "    - cgroup/cpuset: Use static_branch_enable_cpuslocked() on",
                            "      cpusets_insane_config_key",
                            "    - iosys-map: Fix undefined behavior in iosys_map_clear()",
                            "    - RDMA/erdma: Fix ignored return value of init_kernel_qp",
                            "    - RDMA/bnxt_re: Fix to do SRQ armena by default",
                            "    - RDMA/bnxt_re: Fix to remove workload check in SRQ limit path",
                            "    - RDMA/bnxt_re: Fix to initialize the PBL array",
                            "    - Bluetooth: hci_event: fix MTU for BN == 0 in CIS Established",
                            "    - Bluetooth: hci_conn: do return error from hci_enhanced_setup_sync()",
                            "    - mlxsw: spectrum: Forward packets with an IPv4 link-local source IP",
                            "    - ALSA: usb-audio: Fix size validation in convert_chmap_v3()",
                            "    - ipv6: sr: validate HMAC algorithm ID in seg6_hmac_info_add",
                            "    - net: ethernet: mtk_ppe: add RCU lock around dev_fill_forward_path",
                            "    - phy: mscc: Fix timestamping for vsc8584",
                            "    - net: usb: asix_devices: Fix PHY address mask in MDIO bus initialization",
                            "    - LoongArch: Optimize module load time by optimizing PLT/GOT counting",
                            "    - ixgbe: xsk: resolve the negative overflow of budget in ixgbe_xmit_zc",
                            "    - igc: fix disabling L1.2 PCI-E link substate on I226 on init",
                            "    - net/sched: Remove unnecessary WARNING condition for empty child qdisc in",
                            "      htb_activate",
                            "    - bonding: update LACP activity flag after setting lacp_active",
                            "    - bonding: Add independent control state machine",
                            "    - bonding: send LACPDUs periodically in passive mode after receiving",
                            "      partner's LACPDU",
                            "    - Octeontx2-af: Skip overlap check for SPI field",
                            "    - net/mlx5: Base ECVF devlink port attrs from 0",
                            "    - net/mlx5e: Preserve shared buffer capacity during headroom updates",
                            "    - ALSA: usb-audio: Use correct sub-type for UAC3 feature unit validation",
                            "    - s390/hypfs: Avoid unnecessary ioctl registration in debugfs",
                            "    - s390/hypfs: Enable limited access during lockdown",
                            "    - alloc_fdtable(): change calling conventions.",
                            "    - LoongArch: Avoid in-place string operation on FDT content",
                            "    - clk: samsung: gs101: fix CLK_DOUT_CMU_G3D_BUSD",
                            "    - mm/memory-tier: fix abstract distance calculation overflow",
                            "    - nvme-tcp: log TLS handshake failures at error level",
                            "    - ata: ahci: Disallow LPM policy control if not supported",
                            "    - ata: ahci: Disable DIPM if host lacks support",
                            "    - usb: typec: tcpm/tcpci_maxim: fix irq wake usage",
                            "    - pmdomain: ti: Select PM_GENERIC_DOMAINS",
                            "    - cpufreq: intel_pstate: Add Granite Rapids support in no-HWP mode",
                            "    - platform/chrome: cros_ec_sensorhub: Retries when a sensor is not ready",
                            "    - ASoC: SOF: topology: Parse the dapm_widget_tokens in case of DSPless",
                            "      mode",
                            "    - tty: serial: fix print format specifiers",
                            "    - netfilter: nft_set_pipapo: prefer kvmalloc for scratch maps",
                            "    - wifi: iwlwifi: mvm: avoid outdated reorder buffer head_sn",
                            "    - idpf: preserve coalescing settings across resets",
                            "    - wifi: mac80211: don't unreserve never reserved chanctx",
                            "    - sched/deadline: Fix accounting after global limits change",
                            "    - wifi: mac80211: avoid weird state in error path",
                            "    - perf/arm: Add missing .suppress_bind_attrs",
                            "    - drm/imagination: Clear runtime PM errors while resetting the GPU",
                            "    - drm/xe/xe_query: Use separate iterator while filling GT list",
                            "    - wifi: ath12k: Fix station association with MBSSID Non-TX BSS",
                            "    - lib: packing: Include necessary headers",
                            "    - arm64: stacktrace: Check kretprobe_find_ret_addr() return value",
                            "    - net: dsa: b53: ensure BCM5325 PHYs are enabled",
                            "    - drm/amd/display: Update DMCUB loading sequence for DCN3.5",
                            "    - drm/amd/display: Disable dsc_power_gate for dcn314 by default",
                            "    - RDMA/bnxt_re: Fix size of uverbs_copy_to() in",
                            "      BNXT_RE_METHOD_GET_TOGGLE_MEM",
                            "    - media: ipu-bridge: Add _HID for OV5670",
                            "    - scsi: lpfc: Ensure HBA_SETUP flag is used only for SLI4 in",
                            "      dev_loss_tmo_callbk",
                            "    - media: uvcvideo: Add quirk for HP Webcam HD 2300",
                            "    - crypto: ccp - Add missing bootloader info reg for pspv6",
                            "    - soundwire: amd: cancel pending slave status handling workqueue during",
                            "      remove sequence",
                            "    - tools/power turbostat: Fix build with musl",
                            "    - tools/power turbostat: Handle cap_get_proc() ENOSYS",
                            "    - smb: client: don't call init_waitqueue_head(&info->conn_wait) twice in",
                            "      _smbd_get_connection",
                            "    - lib/sbitmap: convert shallow_depth from one word to the whole sbitmap",
                            "    - drm/amdgpu: fix vram reservation issue",
                            "    - btrfs: qgroup: set quota enabled bit if quota disable fails flushing",
                            "      reservations",
                            "    - btrfs: qgroup: fix qgroup create ioctl returning success after quotas",
                            "      disabled",
                            "    - btrfs: don't skip remaining extrefs if dir not found during log replay",
                            "    - btrfs: error on missing block group when unaccounting log tree extent",
                            "      buffers",
                            "    - btrfs: fix iteration bug in __qgroup_excl_accounting()",
                            "    - xfs: fix scrub trace with null pointer in quotacheck",
                            "    - media: v4l2: Add support for NV12M tiled variants to v4l2_format_info()",
                            "    - PCI: Store all PCIe Supported Link Speeds",
                            "    - PCI: Allow PCI bridges to go to D3Hot on all non-x86",
                            "    - PCI/ACPI: Fix runtime PM ref imbalance on Hot-Plug Capable ports",
                            "    - ata: libata-sata: Add link_power_management_supported sysfs attribute",
                            "    - io_uring/rw: cast rw->flags assignment to rwf_t",
                            "    - PCI: Honor Max Link Speed when determining supported speeds",
                            "    - ACPI: Return -ENODEV from acpi_parse_spcr() when SPCR support is",
                            "      disabled",
                            "    - crypto: octeontx2 - Fix address alignment issue on ucode loading",
                            "    - crypto: octeontx2 - Fix address alignment on CN10K A0/A1 and OcteonTX2",
                            "    - crypto: octeontx2 - Fix address alignment on CN10KB and CN10KA-B0",
                            "    - btrfs: fix incorrect log message for nobarrier mount option",
                            "    - btrfs: restore mount option info messages during mount",
                            "    - btrfs: fix printing of mount info messages for NODATACOW/NODATASUM",
                            "    - apparmor: Fix 8-byte alignment for initial dfa blob streams",
                            "    - PCI/portdrv: Use is_pciehp instead of is_hotplug_bridge",
                            "    - PCI: imx6: Remove apps_reset toggling from",
                            "      imx_pcie_{assert/deassert}_core_reset",
                            "    - amdgpu/amdgpu_discovery: increase timeout limit for IFWI init",
                            "    - ASoC: SOF: amd: acp-loader: Use GFP_KERNEL for DMA allocations in resume",
                            "      context",
                            "    - drm/amdgpu/discovery: fix fw based ip discovery",
                            "    - lib/string_choices: Add str_true_false()/str_false_true() helper",
                            "    - USB: typec: Use str_enable_disable-like helpers",
                            "    - btrfs: qgroup: drop unused parameter fs_info from __del_qgroup_rb()",
                            "    - btrfs: explicitly ref count block_group on new_bgs list",
                            "    - btrfs: codify pattern for adding block_group to bg_list",
                            "    - btrfs: zoned: requeue to unused block group list if zone finish failed",
                            "    - drm/vblank: Introduce drm_crtc_vblank_crtc()",
                            "    - drm/vblank: add dynamic per-crtc vblank configuration support",
                            "    - drm/amd/display: Fix Xorg desktop unresponsive on Replay panel",
                            "    - arch: consolidate existing CONFIG_PAGE_SIZE_*KB definitions",
                            "    - arch: simplify architecture specific page size configuration",
                            "    - [Config] update page size configuration",
                            "    - arch: define CONFIG_PAGE_SIZE_*KB on all architectures",
                            "    - [Config] update page size on all architectures",
                            "    - Mark xe driver as BROKEN if kernel page size is not 4kB",
                            "    - [Config] disable xe driver where page size is not 4kB",
                            "    - arm64: dts: ti: k3-am6*: Add boot phase flag to support MMC boot",
                            "    - arm64: dts: ti: k3-am62*: Add non-removable flag for eMMC",
                            "    - arm64: dts: ti: k3-am6*: Add bootph-all property in MMC node",
                            "    - arm64: dts: ti: k3-am6*: Remove DLL properties for soft PHYs",
                            "    - arm64: dts: ti: k3-am6*: Remove disable-wp for eMMC",
                            "    - arm64: dts: ti: k3-am62*: Move eMMC pinmux to top level board file",
                            "    - kcov, usb: Don't disable interrupts in kcov_remote_start_usb_softirq()",
                            "    - drm/i915/icl+/tc: Convert AUX powered WARN to a debug message",
                            "    - drm/i915/display: add intel_encoder_is_*() and _to_*() functions",
                            "    - drm/i915/icl+/tc: Cache the max lane count value",
                            "    - ovl: use I_MUTEX_PARENT when locking parent in ovl_create_temp()",
                            "    - cgroup/cpuset: Fix a partition error with CPU hotplug",
                            "    - drm/tests: Fix endian warning",
                            "    - RDMA/bnxt_re: Fix a possible memory leak in the driver",
                            "    - RDMA/hns: Fix dip entries leak on devices newer than hip09",
                            "    - net: xilinx: axienet: Fix RX skb ring management in DMAengine mode",
                            "    - drm/hisilicon/hibmc: refactored struct hibmc_drm_private",
                            "    - drm/hisilicon/hibmc: fix the i2c device resource leak when vdac init",
                            "      failed",
                            "    - drm/amd/display: Don't print errors for nonexistent connectors",
                            "    - net: dsa: microchip: Fix KSZ9477 HSR port setup issue",
                            "    - net/mlx5: Relocate function declarations from port.h to mlx5_core.h",
                            "    - net/mlx5e: Extract checking of FEC support for a link mode",
                            "    - net/mlx5e: Support FEC settings for 100G/lane modes",
                            "    - net/mlx5: Add IFC bits and enums for buf_ownership",
                            "    - net/mlx5e: Query FW for buffer ownership",
                            "    - Upstream stable to v6.6.103, v6.12.43, v6.12.44",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39779",
                            "    - btrfs: subpage: keep TOWRITE tag until folio is cleaned",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39759",
                            "    - btrfs: qgroup: fix race between quota disable and quota rescan ioctl",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39705",
                            "    - drm/amd/display: fix a Null pointer dereference vulnerability",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39707",
                            "    - drm/amdgpu: check if hubbub is NULL in debugfs/amdgpu_dm_capabilities",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39712",
                            "    - media: mt9m114: Fix deadlock in get_frame_interval/set_frame_interval",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38686",
                            "    - userfaultfd: fix a crash in UFFDIO_MOVE when PMD is a migration entry",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38703",
                            "    - drm/xe: Make dma-fences compliant with the safe access rules",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39746",
                            "    - wifi: ath10k: shutdown driver when hardware is unreliable",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39747",
                            "    - drm/msm: Add error handling for krealloc in metadata setup",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38704",
                            "    - rcu/nocb: Fix possible invalid rdp's->nocb_cb_kthread pointer access",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39748",
                            "    - bpf: Forget ranges when refining tnum after JSET",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38705",
                            "    - drm/amd/pm: fix null pointer access",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38710",
                            "    - gfs2: Validate i_depth for exhash directories",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38722",
                            "    - habanalabs: fix UAF in export_dmabuf()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38732",
                            "    - netfilter: nf_reject: don't leak dst refcount for loopback packets",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39766",
                            "    - net/sched: Make cake_enqueue return NET_XMIT_CN when past buffer_limit",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38734",
                            "    - net/smc: fix UAF on smcsk after smc_listen_out()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38735",
                            "    - gve: prevent ethtool ops after shutdown",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39673",
                            "    - ppp: fix race conditions in ppp_fill_forward_path",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39770",
                            "    - net: gso: Forbid IPv6 TSO with extensions on devices with only IPV6_CSUM",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39675",
                            "    - drm/amd/display: Add null pointer check in",
                            "      mod_hdcp_hdcp1_create_session()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39772",
                            "    - drm/hisilicon/hibmc: fix the hibmc loaded failed bug",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38676",
                            "    - iommu/amd: Avoid stack buffer overflow from kernel cmdline",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39676",
                            "    - scsi: qla4xxx: Prevent a potential error pointer dereference",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39773",
                            "    - net: bridge: fix soft lockup in br_multicast_query_expired()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39679",
                            "    - drm/nouveau/nvif: Fix potential memory leak in nvif_vmm_ctor().",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39681",
                            "    - x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39687",
                            "    - iio: light: as73211: Ensure buffer holes are zeroed",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39683",
                            "    - tracing: Limit access to parser->buffer when trace_get_user failed",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39801",
                            "    - usb: dwc3: Remove WARN_ON for device endpoint command timeouts",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39684",
                            "    - comedi: Fix use of uninitialized memory in do_insn_ioctl() and",
                            "      do_insnlist_ioctl()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39685",
                            "    - comedi: pcl726: Prevent invalid irq number",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39686",
                            "    - comedi: Make insn_rw_emulate_bits() do insn->n samples",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39689",
                            "    - ftrace: Also allocate and copy hash for reading of filter files",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39691",
                            "    - fs/buffer: fix use-after-free when call bh_read() helper",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39692",
                            "    - smb: server: split ksmbd_rdma_stop_listening() out of",
                            "      ksmbd_rdma_destroy()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39788",
                            "    - scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39693",
                            "    - drm/amd/display: Avoid a NULL pointer dereference",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39694",
                            "    - s390/sclp: Fix SCCB present check",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39776",
                            "    - mm/debug_vm_pgtable: clear page table entries at destroy_args()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38681",
                            "    - mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39800",
                            "    - btrfs: abort transaction on unexpected eb generation at",
                            "      btrfs_copy_root()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38684",
                            "    - net/sched: ets: use old 'nbands' while purging unused classes",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-21884",
                            "    - net: better track kernel sockets lifetime",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39701",
                            "    - ACPI: pfr_update: Fix the driver update version check",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39702",
                            "    - ipv6: sr: Fix MAC comparison to be constant-time",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39703",
                            "    - net, hsr: reject HSR frame if skb can't hold tag",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39706",
                            "    - drm/amdkfd: Destroy KFD debugfs after destroy KFD wq",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39709",
                            "    - media: venus: protect against spurious interrupts during probe",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39710",
                            "    - media: venus: Add a check for packet size after reading from shared",
                            "      memory",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39711",
                            "    - media: ivsc: Fix crash at shutdown due to missing mei_cldev_disable()",
                            "      calls",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39713",
                            "    - media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39714",
                            "    - media: usbtv: Lock resolution while streaming",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39715",
                            "    - parisc: Revise gateway LWS calls to probe user read access",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39716",
                            "    - parisc: Revise __get_user() to probe user read access",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39781",
                            "    - parisc: Drop WARN_ON_ONCE() from flush_cache_vmap",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39782",
                            "    - jbd2: prevent softlockup in jbd2_log_do_checkpoint()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38677",
                            "    - f2fs: fix to avoid out-of-boundary access in dnode page",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39718",
                            "    - vsock/virtio: Validate length in packet header before skb_put()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39783",
                            "    - PCI: endpoint: Fix configfs group list head handling",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39719",
                            "    - iio: imu: bno055: fix OOB access of hw_xlate array",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39787",
                            "    - soc: qcom: mdt_loader: Ensure we don't read past the ELF header",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39720",
                            "    - ksmbd: fix refcount leak causing resource not released",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39721",
                            "    - crypto: qat - flush misc workqueue during device shutdown",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39790",
                            "    - bus: mhi: host: Detect events pointing to unexpected TREs",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39724",
                            "    - serial: 8250: fix panic due to PSLVERR",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39758",
                            "    - RDMA/siw: Fix the sendmsg byte count in siw_tcp_sendpages",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38679",
                            "    - media: venus: Fix OOB read due to missing payload bound check",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38680",
                            "    - media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39736",
                            "    - mm/kmemleak: avoid deadlock by moving pr_warn() outside kmemleak_lock",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39737",
                            "    - mm/kmemleak: avoid soft lockup in __kmemleak_do_cleanup()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38683",
                            "    - hv_netvsc: Fix panic during namespace deletion with VF",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38685",
                            "    - fbdev: Fix vmalloc out-of-bounds write in fast_imageblit",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39738",
                            "    - btrfs: do not allow relocation of partially dropped subvolumes",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38687",
                            "    - comedi: fix race between polling and detaching",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39760",
                            "    - usb: core: config: Prevent OOB read in SS endpoint companion parsing",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38688",
                            "    - iommufd: Prevent ALIGN() overflow",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39739",
                            "    - iommu/arm-smmu-qcom: Add SM6115 MDSS compatible",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38691",
                            "    - pNFS: Fix uninited ptr deref in block/scsi layout",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39795",
                            "    - block: avoid possible overflow for chunk_sectors check in",
                            "      blk_stack_limits()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38692",
                            "    - exfat: add cluster chain loop check for dir",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38693",
                            "    - media: dvb-frontends: w7090p: fix null-ptr-deref in",
                            "      w7090p_tuner_write_serpar and w7090p_tuner_read_serpar",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38694",
                            "    - media: dvb-frontends: dib7090p: fix null-ptr-deref in",
                            "      dib7090p_rw_on_apb()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38695",
                            "    - scsi: lpfc: Check for hdwq null ptr when cleaning up lpfc_vport",
                            "      structure",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39742",
                            "    - RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38696",
                            "    - MIPS: Don't crash in stack_top() for tasks without ABI or vDSO",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38697",
                            "    - jfs: upper bound check of tree index in dbAllocAG",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38698",
                            "    - jfs: Regular file corruption check",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39743",
                            "    - jfs: truncate good inode pages when hard link is 0",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38699",
                            "    - scsi: bfa: Double-free fix",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38700",
                            "    - scsi: libiscsi: Initialize iscsi_conn->dd_data only if memory is",
                            "      allocated",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38701",
                            "    - ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38702",
                            "    - fbdev: fix potential buffer overflow in do_register_framebuffer()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39744",
                            "    - rcu: Fix rcu_read_unlock() deadloop due to IRQ work",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39761",
                            "    - wifi: ath12k: Decrement TID on RX peer frag setup error handling",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39797",
                            "    - xfrm: Duplicate SPI Handling",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39749",
                            "    - rcu: Protect ->defer_qs_iw_pending from data race",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39750",
                            "    - wifi: ath12k: Correct tid cleanup when tid setup fails",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38706",
                            "    - ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39794",
                            "    - ARM: tegra: Use I/O memcpy to write to IRAM",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39752",
                            "    - ARM: rockchip: fix kernel hang during smp initialization",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39763",
                            "    - ACPI: APEI: send SIGBUS to current task if synchronous memory error not",
                            "      recovered",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38707",
                            "    - fs/ntfs3: Add sanity check for file name",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38708",
                            "    - drbd: add missing kref_get in handle_write_conflicts",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39753",
                            "    - gfs2: Set .migrate_folio in gfs2_{rgrp,meta}_aops",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38711",
                            "    - smb/server: avoid deadlock when linking with ReplaceIfExists",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38712",
                            "    - hfsplus: don't use BUG_ON() in hfsplus_create_attributes_file()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38713",
                            "    - hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38714",
                            "    - hfsplus: fix slab-out-of-bounds in hfsplus_bnode_read()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38715",
                            "    - hfs: fix slab-out-of-bounds in hfs_bnode_read()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38716",
                            "    - hfs: fix general protection fault in hfs_find_init()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38718",
                            "    - sctp: linearize cloned gso packets in sctp_rcv",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38721",
                            "    - netfilter: ctnetlink: fix refcount leak on table dump",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38614",
                            "    - eventpoll: Fix semi-unbounded recursion",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39756",
                            "    - fs: Prevent file descriptor table allocations exceeding INT_MAX",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39798",
                            "    - NFS: Fix the setting of capabilities when automounting a new filesystem",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38724",
                            "    - nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38730",
                            "    - io_uring/net: commit partial buffers on retry",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38725",
                            "    - net: usb: asix_devices: add phy_mask for ax88772 mdio bus",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38728",
                            "    - smb3: fix for slab out of bounds on mount to ksmbd",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39757",
                            "    - ALSA: usb-audio: Validate UAC3 cluster segment descriptors",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38729",
                            "    - ALSA: usb-audio: Validate UAC3 power domain descriptors, too",
                            "",
                            "  * CVE-2025-40297",
                            "    - net: bridge: fix use-after-free due to MST port state bypass",
                            "",
                            "  * CVE-2025-40256",
                            "    - xfrm: also call xfrm_state_delete_tunnel at destroy time for states that",
                            "      were never added",
                            "",
                            "  * CVE-2025-40215",
                            "    - xfrm: delete x->tunnel as we delete x",
                            "",
                            "  * CVE-2025-40214",
                            "    - af_unix: Initialise scc_index in unix_add_edge().",
                            "",
                            "  * CVE-2025-38248",
                            "    - bridge: mcast: Fix use-after-free during router port configuration",
                            "",
                            "  * Enabling crypto selftests causes boot stall on 6.8 (LP: #2135716)",
                            "    - SAUCE: Revert \"crypto: api - Fix boot-up self-test race\"",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261)",
                            "    - ASoC: fsl_asrc: use internal measured ratio for non-ideal ratio mode",
                            "    - perf/core: Fix the WARN_ON_ONCE is out of lock protected region",
                            "    - ASoC: cs35l56: probe() should fail if the device ID is not recognized",
                            "    - Bluetooth: hci_sync: Fix not disabling advertising instance",
                            "    - Bluetooth: hci_event: Fix not marking Broadcast Sink BIS as connected",
                            "    - pinctrl: amd: Clear GPIO debounce for suspend",
                            "    - fix proc_sys_compare() handling of in-lookup dentries",
                            "    - vsock: fix `vsock_proto` declaration",
                            "    - vsock: Fix IOCTL_VM_SOCKETS_GET_LOCAL_CID to check also",
                            "      `transport_local`",
                            "    - net: stmmac: Fix interrupt handling for level-triggered mode in",
                            "      DWC_XGMAC2",
                            "    - net: phy: smsc: Fix Auto-MDIX configuration when disabled by strap",
                            "    - net: phy: smsc: Force predictable MDI-X state on LAN87xx",
                            "    - net: phy: smsc: Fix link failure in forced mode with Auto-MDIX",
                            "    - perf: build: Setup PKG_CONFIG_LIBDIR for cross compilation",
                            "    - x86/mce/amd: Add default names for MCA banks and blocks",
                            "    - x86/mce/amd: Fix threshold limit reset",
                            "    - x86/mce: Don't remove sysfs if thresholding sysfs init fails",
                            "    - x86/mce: Make sure CMCI banks are cleared during shutdown on Intel",
                            "    - KVM: x86/xen: Allow 'out of range' event channel ports in IRQ routing",
                            "      table.",
                            "    - gre: Fix IPv6 multicast route creation.",
                            "    - md/md-bitmap: fix GPF in bitmap_get_stats()",
                            "    - drm/ttm: fix error handling in ttm_buffer_object_transfer",
                            "    - drm/gem: Fix race in drm_gem_handle_create_tail()",
                            "    - Revert \"usb: gadget: u_serial: Add null pointer check in gs_start_io\"",
                            "    - drm/framebuffer: Acquire internal references on GEM handles",
                            "    - kallsyms: fix build without execinfo",
                            "    - maple_tree: fix mt_destroy_walk() on root leaf node",
                            "    - mm: fix the inaccurate memory statistics issue for users",
                            "    - scripts/gdb: fix interrupts display after MCP on x86",
                            "    - scripts/gdb: de-reference per-CPU MCE interrupts",
                            "    - scripts/gdb: fix interrupts.py after maple tree conversion",
                            "    - mm/vmalloc: leave lazy MMU mode on PTE mapping error",
                            "    - pwm: mediatek: Ensure to disable clocks in error path",
                            "    - x86/rdrand: Disable RDSEED on AMD Cyan Skillfish",
                            "    - x86/mm: Disable hugetlb page table sharing on 32-bit",
                            "    - smb: server: make use of rdma_destroy_qp()",
                            "    - ksmbd: fix a mount write count leak in ksmbd_vfs_kern_path_locked()",
                            "    - erofs: fix to add missing tracepoint in erofs_read_folio()",
                            "    - netlink: Fix rmem check in netlink_broadcast_deliver().",
                            "    - netlink: make sure we allow at least one dump skb",
                            "    - smb: client: avoid unnecessary reconnects when refreshing referrals",
                            "    - smb: client: fix DFS interlink failover",
                            "    - cifs: all initializations for tcon should happen in tcon_info_alloc",
                            "    - ibmvnic: Fix hardcoded NUM_RX_STATS/NUM_TX_STATS with dynamic sizeof",
                            "    - net: phy: microchip: limit 100M workaround to link-down events on",
                            "      LAN88xx",
                            "    - can: m_can: m_can_handle_lost_msg(): downgrade msg lost in rx message to",
                            "      debug level",
                            "    - net: ll_temac: Fix missing tx_pending check in ethtools_set_ringparam()",
                            "    - bnxt_en: Fix DCB ETS validation",
                            "    - ublk: sanity check add_dev input for underflow",
                            "    - atm: idt77252: Add missing `dma_map_error()`",
                            "    - um: vector: Reduce stack usage in vector_eth_configure()",
                            "    - io_uring: make fallocate be hashed work",
                            "    - ASoC: amd: yc: add quirk for Acer Nitro ANV15-41 internal mic",
                            "    - ALSA: hda/realtek - Enable mute LED on HP Pavilion Laptop 15-eg100",
                            "    - net: usb: qmi_wwan: add SIMCom 8230C composition",
                            "    - HID: lenovo: Add support for ThinkPad X1 Tablet Thin Keyboard Gen2",
                            "    - net: mana: Record doorbell physical address in PF mode",
                            "    - vt: add missing notification when switching back to text mode",
                            "    - bpf: Adjust free target to avoid global starvation of LRU map",
                            "    - HID: Add IGNORE quirk for SMARTLINKTECHNOLOGY",
                            "    - selftests/bpf: adapt one more case in test_lru_map to the new",
                            "      target_free",
                            "    - smb: client: fix potential race in cifs_put_tcon()",
                            "    - drm/amdgpu/discovery: use specific ip_discovery.bin for legacy asics",
                            "    - drm/amdgpu/ip_discovery: add missing ip_discovery fw",
                            "    - x86/mce: Ensure user polling settings are honored when restarting timer",
                            "    - ASoC: fsl_sai: Force a software reset when starting in consumer mode",
                            "    - wifi: mt76: mt7921: prevent decap offload config before STA",
                            "      initialization",
                            "    - wifi: mt76: mt7925: fix the wrong config for tx interrupt",
                            "    - wifi: mt76: mt7925: fix invalid array index in ssid assignment during hw",
                            "      scan",
                            "    - drm/xe: Allocate PF queue size on pow2 boundary",
                            "    - clk: scmi: Handle case where child clocks are initialized before their",
                            "      parents",
                            "    - erofs: address D-cache aliasing",
                            "    - wifi: cfg80211/mac80211: correctly parse S1G beacon optional elements",
                            "    - wifi: cfg80211: fix S1G beacon head validation in nl80211",
                            "    - wifi: mac80211: correctly identify S1G short beacon",
                            "    - wifi: mac80211: fix non-transmitted BSSID profile search",
                            "    - drm/nouveau/gsp: fix potential leak of memory used during acpi init",
                            "    - erofs: free pclusters if no cached folio is attached",
                            "    - erofs: get rid of `z_erofs_next_pcluster_t`",
                            "    - erofs: tidy up zdata.c",
                            "    - erofs: refine readahead tracepoint",
                            "    - erofs: fix to add missing tracepoint in erofs_readahead()",
                            "    - net: phy: microchip: Use genphy_soft_reset() to purge stale LPA bits",
                            "    - selftests: net: lib: Move logging from forwarding/lib.sh here",
                            "    - selftests: net: lib: fix shift count out of range",
                            "    - net/mlx5e: Add new prio for promiscuous mode",
                            "    - ALSA: hda/realtek: Add mic-mute LED setup for ASUS UM5606",
                            "    - ALSA: hda/realtek: Add quirks for some Clevo laptops",
                            "    - riscv: vdso: Exclude .rodata from the PT_DYNAMIC segment",
                            "    - erofs: fix rare pcluster memory leak after unmounting",
                            "    - net: libwx: fix alloc msix vectors failed",
                            "    - net: wangxun: revert the adjustment of the IRQ vector sequence",
                            "    - arm64: Filter out SME hwcaps when FEAT_SME isn't implemented",
                            "    - KVM: SVM: Set synthesized TSA CPUID flags",
                            "    - Upstream stable to v6.6.98, v6.6.99, v6.12.38, v6.12.39",
                            "    - SAUCE: selftests: net: altnames.sh fix following upstream updates",
                            "",
                            "  * vrf_route_leaking.sh in net from ubuntu_kernel_selftests linux ADT test",
                            "    failure with linux/5.11.0-18.19 (Ping received ICMP Packet too big)",
                            "    (LP: #1928890)",
                            "    - selftests: net: use slowwait to stabilize vrf_route_leaking test",
                            "",
                            "  * ubuntu_bpf failed to build on Noble ( error: ‘struct prog_test_def’ has no",
                            "    member named ‘should_tmon’) (LP: #2112357)",
                            "    - selftests/bpf: Factor out get_xlated_program() helper",
                            "    - selftests/bpf: extract utility function for BPF disassembly",
                            "    - selftests/bpf: Add traffic monitor functions.",
                            "    - selftests/bpf: Add the traffic monitor option to test_progs.",
                            "",
                            "  * ipsec_offload in rtnetlink.sh from ubunsu_kselftests_net fails on O/J",
                            "    (LP: #2096976)",
                            "    - netdevsim: fix rtnetlink.sh selftest",
                            "    - [SAUCE] Fix selftest/net/rtnetlink.sh for Big Endian",
                            "",
                            "  * fib_tests.sh in ubuntu_kernel_selftests failed with IPv4 mangling tests",
                            "    Connection check - server side (LP: #2012859)",
                            "    - selftests: rtnetlink: correct error message in rtnetlink.sh fou test",
                            "",
                            "  * net:rtnetlink.sh in ubuntu_kernel_selftests failed with FAIL: address",
                            "    proto IPv4 / IPv6 (LP: #2031531)",
                            "    - selftests: rtnetlink: skip tests if tools or feats are missing",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740)",
                            "    - ASoC: amd: yc: Add DMI quirk for HP Laptop 17 cp-2033dx",
                            "    - ethernet: intel: fix building with large NR_CPUS",
                            "    - ASoC: amd: yc: Add DMI entries to support HP 15-fb1xxx",
                            "    - ASoC: Intel: fix SND_SOC_SOF dependencies",
                            "    - ASoC: amd: yc: add DMI quirk for ASUS M6501RM",
                            "    - audit,module: restore audit logging in load failure case",
                            "    - fs_context: fix parameter name in infofc() macro",
                            "    - ublk: use vmalloc for ublk_device's __queues",
                            "    - hfsplus: make splice write available again",
                            "    - hfs: make splice write available again",
                            "    - ASoC: soc-dai: tidyup return value of snd_soc_xlate_tdm_slot_mask()",
                            "    - ASoC: ops: dynamically allocate struct snd_ctl_elem_value",
                            "    - ASoC: mediatek: use reserved memory or enable buffer pre-allocation",
                            "    - selftests: Fix errno checking in syscall_user_dispatch test",
                            "    - soc: qcom: QMI encoding/decoding for big endian",
                            "    - arm64: dts: qcom: sdm845: Expand IMEM region",
                            "    - arm64: dts: qcom: sc7180: Expand IMEM region",
                            "    - arm64: dts: qcom: msm8976: Make blsp_dma controlled-remotely",
                            "    - ARM: dts: vfxxx: Correctly use two tuples for timer address",
                            "    - usb: host: xhci-plat: fix incorrect type for of_match variable in",
                            "      xhci_plat_probe()",
                            "    - usb: misc: apple-mfi-fastcharge: Make power supply names unique",
                            "    - vmci: Prevent the dispatching of uninitialized payloads",
                            "    - pps: fix poll support",
                            "    - Revert \"vmci: Prevent the dispatching of uninitialized payloads\"",
                            "    - usb: early: xhci-dbc: Fix early_ioremap leak",
                            "    - arm: dts: ti: omap: Fixup pinheader typo",
                            "    - soc/tegra: cbb: Clear ERR_FORCE register with ERR_STATUS",
                            "    - ARM: dts: imx6ul-kontron-bl-common: Fix RTS polarity for RS485 interface",
                            "    - arm64: dts: imx8mm-beacon: Fix HS400 USDHC clock speed",
                            "    - arm64: dts: imx8mn-beacon: Fix HS400 USDHC clock speed",
                            "    - cpufreq: intel_pstate: Always use HWP_DESIRED_PERF in passive mode",
                            "    - cpufreq: Initialize cpufreq-based frequency-invariance later",
                            "    - cpufreq: Init policy->rwsem before it may be possibly used",
                            "    - samples: mei: Fix building on musl libc",
                            "    - soc: qcom: pmic_glink: fix OF node leak",
                            "    - interconnect: qcom: sc8280xp: specify num_links for qnm_a1noc_cfg",
                            "    - interconnect: qcom: sc8180x: specify num_nodes",
                            "    - staging: nvec: Fix incorrect null termination of battery manufacturer",
                            "    - drm/rockchip: cleanup fb when drm_gem_fb_afbc_init failed",
                            "    - bpf, sockmap: Fix psock incorrectly pointing to sk",
                            "    - selftests/bpf: fix signedness bug in redir_partial()",
                            "    - net: ipv6: ip6mr: Fix in/out netdev to pass to the FORWARD chain",
                            "    - drm/vmwgfx: Fix Host-Backed userspace on Guest-Backed kernel",
                            "    - bpftool: Fix memory leak in dump_xx_nlmsg on realloc failure",
                            "    - caif: reduce stack size, again",
                            "    - wifi: iwlwifi: Fix memory leak in iwl_mvm_init()",
                            "    - tcp: fix tcp_ofo_queue() to avoid including too much DUP SACK range",
                            "    - net: dst: annotate data-races around dst->input",
                            "    - net: dst: annotate data-races around dst->output",
                            "    - kselftest/arm64: Fix check for setting new VLs in sve-ptrace",
                            "    - drm/msm/dpu: Fill in min_prefill_lines for SC8180X",
                            "    - m68k: Don't unregister boot console needlessly",
                            "    - drm/amd/pm/powerplay/hwmgr/smu_helper: fix order of mask and value",
                            "    - sched/psi: Optimize psi_group_change() cpu_clock() usage",
                            "    - fbcon: Fix outdated registered_fb reference in comment",
                            "    - netfilter: nf_tables: Drop dead code from fill_*_info routines",
                            "    - netfilter: nf_tables: adjust lockdep assertions handling",
                            "    - arch: powerpc: defconfig: Drop obsolete CONFIG_NET_CLS_TCINDEX",
                            "    - um: rtc: Avoid shadowing err in uml_rtc_start()",
                            "    - net_sched: act_ctinfo: use atomic64_t for three counters",
                            "    - xen/gntdev: remove struct gntdev_copy_batch from stack",
                            "    - tcp: call tcp_measure_rcv_mss() for ooo packets",
                            "    - wifi: rtl8xxxu: Fix RX skb size for aggregation disabled",
                            "    - mwl8k: Add missing check after DMA map",
                            "    - iommu/amd: Fix geometry.aperture_end for V2 tables",
                            "    - wifi: plfxlc: Fix error handling in usb driver probe",
                            "    - wifi: mac80211: Do not schedule stopped TXQs",
                            "    - wifi: mac80211: Don't call fq_flow_idx() for management frames",
                            "    - wifi: mac80211: Check 802.11 encaps offloading in",
                            "      ieee80211_tx_h_select_key()",
                            "    - Reapply \"wifi: mac80211: Update skb's control block key in",
                            "      ieee80211_tx_dequeue()\"",
                            "    - wifi: ath12k: fix endianness handling while accessing wmi service bit",
                            "    - wifi: brcmfmac: fix P2P discovery failure in P2P peer due to missing P2P",
                            "      IE",
                            "    - wifi: mac80211: Write cnt before copying in ieee80211_copy_rnr_beacon()",
                            "    - kcsan: test: Initialize dummy variable",
                            "    - Bluetooth: hci_event: Mask data status from LE ext adv reports",
                            "    - tools/rv: Do not skip idle in trace",
                            "    - can: peak_usb: fix USB FD devices potential malfunction",
                            "    - can: kvaser_pciefd: Store device channel index",
                            "    - can: kvaser_usb: Assign netdev.dev_port based on device channel index",
                            "    - net/mlx5e: Clear Read-Only port buffer size in PBMC before update",
                            "    - selftests: rtnetlink.sh: remove esp4_offload after test",
                            "    - vrf: Drop existing dst reference in vrf_ip6_input_dst",
                            "    - ipv6: annotate data-races around rt->fib6_nsiblings",
                            "    - bpf/preload: Don't select USERMODE_DRIVER",
                            "    - PCI: rockchip-host: Fix \"Unexpected Completion\" log message",
                            "    - crypto: sun8i-ce - fix nents passed to dma_unmap_sg()",
                            "    - crypto: qat - use unmanaged allocation for dc_data",
                            "    - crypto: marvell/cesa - Fix engine load inaccuracy",
                            "    - mtd: fix possible integer overflow in erase_xfer()",
                            "    - media: v4l2-ctrls: Fix H264 SEPARATE_COLOUR_PLANE check",
                            "    - power: supply: max14577: Handle NULL pdata when CONFIG_OF is not set",
                            "    - crypto: arm/aes-neonbs - work around gcc-15 warning",
                            "    - PCI: endpoint: pci-epf-vntb: Return -ENOENT if",
                            "      pci_epc_get_next_free_bar() fails",
                            "    - pinctrl: sunxi: Fix memory leak on krealloc failure",
                            "    - fanotify: sanitize handle_type values when reporting fid",
                            "    - clk: clk-axi-clkgen: fix fpfd_max frequency for zynq",
                            "    - Fix dma_unmap_sg() nents value",
                            "    - perf tools: Fix use-after-free in help_unknown_cmd()",
                            "    - perf sched: Free thread->priv using priv_destructor",
                            "    - perf sched: Fix memory leaks for evsel->priv in timehist",
                            "    - perf sched: Fix memory leaks in 'perf sched latency'",
                            "    - crypto: inside-secure - Fix `dma_unmap_sg()` nents value",
                            "    - RDMA/hns: Fix -Wframe-larger-than issue",
                            "    - kernel: trace: preemptirq_delay_test: use offstack cpu mask",
                            "    - perf tests bp_account: Fix leaked file descriptor",
                            "    - clk: sunxi-ng: v3s: Fix de clock definition",
                            "    - scsi: ibmvscsi_tgt: Fix dma_unmap_sg() nents value",
                            "    - scsi: elx: efct: Fix dma_unmap_sg() nents value",
                            "    - scsi: mvsas: Fix dma_unmap_sg() nents value",
                            "    - scsi: isci: Fix dma_unmap_sg() nents value",
                            "    - watchdog: ziirave_wdt: check record length in ziirave_firm_verify()",
                            "    - hwrng: mtk - handle devm_pm_runtime_enable errors",
                            "    - crypto: keembay - Fix dma_unmap_sg() nents value",
                            "    - crypto: img-hash - Fix dma_unmap_sg() nents value",
                            "    - soundwire: stream: restore params when prepare ports fail",
                            "    - PCI: endpoint: pci-epf-vntb: Fix the incorrect usage of __iomem",
                            "      attribute",
                            "    - fs/orangefs: Allow 2 more characters in do_c_string()",
                            "    - dmaengine: mv_xor: Fix missing check after DMA map and missing unmap",
                            "    - dmaengine: nbpfaxi: Add missing check after DMA map",
                            "    - ASoC: fsl_xcvr: get channel status data when PHY is not exists",
                            "    - sh: Do not use hyphen in exported variable name",
                            "    - perf tools: Remove libtraceevent in .gitignore",
                            "    - crypto: qat - fix DMA direction for compression on GEN2 devices",
                            "    - crypto: qat - fix seq_file position update in adf_ring_next()",
                            "    - jfs: fix metapage reference count leak in dbAllocCtl",
                            "    - mtd: rawnand: atmel: Fix dma_mapping_error() address",
                            "    - mtd: rawnand: rockchip: Add missing check after DMA map",
                            "    - mtd: rawnand: atmel: set pmecc data setup time",
                            "    - vhost-scsi: Fix log flooding with target does not exist errors",
                            "    - bpf: Check flow_dissector ctx accesses are aligned",
                            "    - bpf: Check netfilter ctx accesses are aligned",
                            "    - apparmor: ensure WB_HISTORY_SIZE value is a power of 2",
                            "    - apparmor: fix loop detection used in conflicting attachment resolution",
                            "    - module: Restore the moduleparam prefix length check",
                            "    - ucount: fix atomic_long_inc_below() argument type",
                            "    - rtc: ds1307: fix incorrect maximum clock rate handling",
                            "    - rtc: hym8563: fix incorrect maximum clock rate handling",
                            "    - rtc: nct3018y: fix incorrect maximum clock rate handling",
                            "    - rtc: pcf85063: fix incorrect maximum clock rate handling",
                            "    - rtc: pcf8563: fix incorrect maximum clock rate handling",
                            "    - rtc: rv3028: fix incorrect maximum clock rate handling",
                            "    - f2fs: doc: fix wrong quota mount option description",
                            "    - f2fs: fix to update upper_p in __get_secs_required() correctly",
                            "    - f2fs: fix to calculate dirty data during has_not_enough_free_secs()",
                            "    - vfio: Fix unbalanced vfio_df_close call in no-iommu mode",
                            "    - vfio: Prevent open_count decrement to negative",
                            "    - vfio/pci: Separate SR-IOV VF dev_set",
                            "    - scsi: mpt3sas: Fix a fw_event memory leak",
                            "    - scsi: Revert \"scsi: iscsi: Fix HW conn removal use after free\"",
                            "    - scsi: ufs: core: Use link recovery when h8 exit fails during runtime",
                            "      resume",
                            "    - scsi: sd: Make sd shutdown issue START STOP UNIT appropriately",
                            "    - kconfig: qconf: fix ConfigList::updateListAllforAll()",
                            "    - sched/psi: Fix psi_seq initialization",
                            "    - PCI: pnv_php: Work around switches with broken presence detection",
                            "    - powerpc/eeh: Export eeh_unfreeze_pe()",
                            "    - pNFS/flexfiles: don't attempt pnfs on fatal DS errors",
                            "    - sched: Add test_and_clear_wake_up_bit() and atomic_dec_and_wake_up()",
                            "    - NFS: Fix wakeup of __nfs_lookup_revalidate() in unblock_revalidate()",
                            "    - NFSv4.2: another fix for listxattr",
                            "    - NFS: Fixup allocation flags for nfsiod's __GFP_NORETRY",
                            "    - md/md-cluster: handle REMOVE message earlier",
                            "    - netpoll: prevent hanging NAPI when netcons gets enabled",
                            "    - phy: mscc: Fix parsing of unicast frames",
                            "    - net: ipa: add IPA v5.1 and v5.5 to ipa_version_string()",
                            "    - netlink: specs: ethtool: fix module EEPROM input/output arguments",
                            "    - net/mlx5: Correctly set gso_segs when LRO is used",
                            "    - net/sched: taprio: enforce minimum value for picos_per_byte",
                            "    - benet: fix BUG when creating VFs",
                            "    - irqchip: Build IMX_MU_MSI only on ARM",
                            "    - ALSA: hda/ca0132: Fix missing error handling in ca0132_alt_select_out()",
                            "    - smb: server: remove separate empty_recvmsg_queue",
                            "    - smb: server: make sure we call ib_dma_unmap_single() only if we called",
                            "      ib_dma_map_single already",
                            "    - smb: server: let recv_done() consistently call",
                            "      put_recvmsg/smb_direct_disconnect_rdma_connection",
                            "    - smb: server: let recv_done() avoid touching data_transfer after",
                            "      cleanup/move",
                            "    - smb: client: Use min() macro",
                            "    - smb: client: Correct typos in multiple comments across various files",
                            "    - smb: smbdirect: add smbdirect_socket.h",
                            "    - smb: client: make use of common smbdirect_socket",
                            "    - smb: client: make sure we call ib_dma_unmap_single() only if we called",
                            "      ib_dma_map_single already",
                            "    - smb: client: let recv_done() cleanup before notifying the callers.",
                            "    - pptp: fix pptp_xmit() error path",
                            "    - smb: client: return an error if rdma_connect does not return within 5",
                            "      seconds",
                            "    - selftests/perf_events: Add a mmap() correctness test",
                            "    - ksmbd: fix corrupted mtime and ctime in smb2_open",
                            "    - smb: server: Fix extension string in ksmbd_extract_shortname()",
                            "    - USB: serial: option: add Foxconn T99W709",
                            "    - Bluetooth: btusb: Add USB ID 3625:010b for TP-LINK Archer TX10UB Nano",
                            "    - net: usbnet: Avoid potential RCU stall on LINK_CHANGE event",
                            "    - net: usbnet: Fix the wrong netif_carrier_on() call",
                            "    - ALSA: intel_hdmi: Fix off-by-one error in __hdmi_lpe_audio_probe()",
                            "    - ALSA: scarlett2: Add retry on -EPROTO from scarlett2_usb_tx()",
                            "    - x86/fpu: Delay instruction pointer fixup until after warning",
                            "    - MIPS: mm: tlb-r4k: Uniquify TLB entries on init",
                            "    - mm/hmm: move pmd_to_hmm_pfn_flags() to the respective #ifdeffery",
                            "    - ALSA: hda/cs35l56: Workaround bad dev-index on Lenovo Yoga Book 9i GenX",
                            "    - arm64: dts: exynos: gs101: Add 'local-timer-stop' to cpuidle nodes",
                            "    - arm64: dts: ti: k3-am62p-j722s: fix pinctrl-single size",
                            "    - mei: vsc: Destroy mutex after freeing the IRQ",
                            "    - mei: vsc: Event notifier fixes",
                            "    - mei: vsc: Unset the event callback on remove and probe errors",
                            "    - arm64: dts: st: fix timer used for ticks",
                            "    - selftests: breakpoints: use suspend_stats to reliably check suspend",
                            "      success",
                            "    - PM / devfreq: Fix a index typo in trans_stat",
                            "    - drm/panfrost: Fix panfrost device variable name in devfreq",
                            "    - selftests/bpf: Fix unintentional switch case fall through",
                            "    - drm/amdgpu: Remove nbiov7.9 replay count reporting",
                            "    - bpf: Ensure RCU lock is held around bpf_prog_ksym_find",
                            "    - refscale: Check that nreaders and loops multiplication doesn't overflow",
                            "    - iommu/amd: Enable PASID and ATS capabilities in the correct order",
                            "    - file: add take_fd() cleanup helper",
                            "    - file: fix typo in take_fd() comment",
                            "    - rcu: Fix delayed execution of hurry callbacks",
                            "    - ring-buffer: Remove ring_buffer_read_prepare_sync()",
                            "    - net: dsa: microchip: Fix wrong rx drop MIB counter for KSZ8863",
                            "    - stmmac: xsk: fix negative overflow of budget in zerocopy mode",
                            "    - pinctrl: berlin: fix memory leak in berlin_pinctrl_build_state()",
                            "    - dmaengine: mmp: Fix again Wvoid-pointer-to-enum-cast warning",
                            "    - phy: qualcomm: phy-qcom-eusb2-repeater: Don't zero-out registers",
                            "    - perf dso: Add missed dso__put to dso__load_kcore",
                            "    - mtd: spi-nor: spansion: Fixup params->set_4byte_addr_mode for SEMPER",
                            "    - perf sched: Make sure it frees the usage string",
                            "    - perf sched: Fix memory leaks in 'perf sched map'",
                            "    - perf sched: Use RC_CHK_EQUAL() to compare pointers",
                            "    - RDMA/hns: Fix HW configurations not cleared in error flow",
                            "    - RDMA/hns: Get message length of ack_req from FW",
                            "    - RDMA/hns: Add mutex_destroy()",
                            "    - RDMA/hns: Fix accessing uninitialized resources",
                            "    - RDMA/hns: Drop GFP_NOWARN",
                            "    - crypto: qat - disable ZUC-256 capability for QAT GEN5",
                            "    - remoteproc: xlnx: Disable unsupported features",
                            "    - perf record: Cache build-ID of hit DSOs only",
                            "    - vdpa: Fix IDR memory leak in VDUSE module exit",
                            "    - vhost: Reintroduce kthread API and add mode selection",
                            "    - [Config] enable VHOST_ENABLE_FORK_OWNER_CONTROL",
                            "    - apparmor: Fix unaligned memory accesses in KUnit test",
                            "    - f2fs: turn off one_time when forcibly set to foreground GC",
                            "    - exfat: fdatasync flag should be same like generic_write_sync()",
                            "    - s390/ap: Unmask SLCF bit in card and queue ap functions sysfs",
                            "    - block: Fix default IO priority if there is no IO context",
                            "    - ASoC: tas2781: Fix the wrong step for TLV on tas2781",
                            "    - s390/mm: Allocate page table with PAGE_SIZE granularity",
                            "    - smb: client: remove separate empty_packet_queue",
                            "    - smb: client: let recv_done() avoid touching data_transfer after",
                            "      cleanup/move",
                            "    - drm/i915/ddi: change intel_ddi_init_{dp, hdmi}_connector() return type",
                            "    - drm/i915/hdmi: propagate errors from intel_hdmi_init_connector()",
                            "    - drm/i915/hdmi: add error handling in g4x_hdmi_init()",
                            "    - drm/i915/ddi: gracefully handle errors from",
                            "      intel_ddi_init_hdmi_connector()",
                            "    - drm/i915/display: add intel_encoder_is_hdmi()",
                            "    - drm/i915/ddi: only call shutdown hooks for valid encoders",
                            "    - PCI/ASPM: Save parent L1SS config in pci_save_aspm_l1ss_state()",
                            "    - PCI/ASPM: Fix L1SS saving",
                            "    - ALSA: hda/realtek - Fix mute LED for HP Victus 16-r1xxx",
                            "    - ALSA: hda/realtek - Fix mute LED for HP Victus 16-s0xxx",
                            "    - ALSA: hda/realtek - Fix mute LED for HP Victus 16-d1xxx (MB 8A26)",
                            "    - s390/mm: Remove possible false-positive warning in pte_free_defer()",
                            "    - Upstream stable to v6.6.102, v6.12.42",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38619",
                            "    - media: ti: j721e-csi2rx: fix list_del corruption",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38582",
                            "    - RDMA/hns: Fix double destruction of rsv_qp",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38585",
                            "    - staging: media: atomisp: Fix stack buffer overflow in gmin_get_var_int()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38593",
                            "    - Bluetooth: hci_sync: fix double free in 'hci_discovery_filter_clear()'",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-39732",
                            "    - wifi: ath11k: fix sleeping-in-atomic in ath11k_mac_op_set_bitrate_mask()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38595",
                            "    - xen: fix UAF in dmabuf_exp_from_pages()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38660",
                            "    - parse_longname(): strrchr() expects NUL-terminated string",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38555",
                            "    - usb: gadget : fix use-after-free in composite_dev_cleanup()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2024-36331 // CVE-2025-38560",
                            "    - x86/sev: Evict cache lines during SNP memory validation",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38501",
                            "    - ksmbd: limit repeated connections from clients with the same IP",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38562",
                            "    - ksmbd: fix null pointer dereference error in generate_encryptionkey",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38566",
                            "    - sunrpc: fix handling of server side tls alerts",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38568",
                            "    - net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38571",
                            "    - sunrpc: fix client side handling of tls alerts",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38622",
                            "    - net: drop UFO packets in udp_rcv_segment()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38572",
                            "    - ipv6: reject malicious packets in ipv6_gso_segment()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38574",
                            "    - pptp: ensure minimal skb length in pptp_xmit()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-39730",
                            "    - NFS: Fix filehandle bounds checking in nfs_fh_to_dentry()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38623",
                            "    - PCI: pnv_php: Fix surprise plug detection and recovery",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38576",
                            "    - powerpc/eeh: Make EEH driver device hotplug safe",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38624",
                            "    - PCI: pnv_php: Clean up allocated IRQs on unplug",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38625",
                            "    - vfio/pds: Fix missing detach_ioas op",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38626",
                            "    - f2fs: fix to trigger foreground gc during f2fs_map_blocks() in lfs mode",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-39731",
                            "    - f2fs: vm_unmap_ram() may be called from an invalid context",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38652",
                            "    - f2fs: fix to avoid out-of-boundary access in devs.path",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38577",
                            "    - f2fs: fix to avoid panic in f2fs_evict_inode",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38578",
                            "    - f2fs: fix to avoid UAF in f2fs_sync_inode_meta()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38579",
                            "    - f2fs: fix KMSAN uninit-value in extent_info usage",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38630",
                            "    - fbdev: imxfb: Check fb_add_videomode to prevent null-ptr-deref",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38632",
                            "    - pinmux: fix race causing mux_owner NULL with active mux_usecount",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38653",
                            "    - proc: use the same treatment to check proc_lseek as ones for",
                            "      proc_read_iter et.al",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38581",
                            "    - crypto: ccp - Fix crash when rebind ccp device for ccp.ko",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38634",
                            "    - power: supply: cpcap-charger: Fix null check for",
                            "      power_supply_get_by_name",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38583",
                            "    - clk: xilinx: vcu: unregister pll_post only if registered correctly",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38635",
                            "    - clk: davinci: Add NULL check in davinci_lpsc_clk_register()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38587",
                            "    - ipv6: fix possible infinite loop in fib6_info_uses_dev()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38588",
                            "    - ipv6: prevent infinite loop in rt6_nlmsg_size()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38590",
                            "    - net/mlx5e: Remove skb secpath if xfrm state is not found",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38639",
                            "    - netfilter: xt_nfacct: don't assume acct name is null-terminated",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38640",
                            "    - bpf: Disable migration in nf_hook_run_bpf().",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38644",
                            "    - wifi: mac80211: reject TDLS operations when station is not associated",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38553",
                            "    - net/sched: Restrict conditions for adding duplicating netems to qdisc",
                            "      tree",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38645",
                            "    - net/mlx5: Check device memory pointer before usage",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38601",
                            "    - wifi: ath11k: clear initialized flag for deinit-ed srng lists",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38602",
                            "    - iwlwifi: Add missing check for alloc_ordered_workqueue",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38604",
                            "    - wifi: rtl818x: Kill URBs before clearing tx status queue",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38646",
                            "    - wifi: rtw89: avoid NULL dereference when RX problematic packet on",
                            "      unsupported 6 GHz band",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38608",
                            "    - bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38609",
                            "    - PM / devfreq: Check governor before using governor->name",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38610",
                            "    - powercap: dtpm_cpu: Fix NULL pointer dereference in get_pd_power_uw()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38612",
                            "    - staging: fbtft: fix potential memory leak in fbtft_framebuffer_alloc()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38648",
                            "    - spi: stm32: Check for cfg availability in stm32_spi_probe",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38659",
                            "    - gfs2: No more self recovery",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-39734",
                            "    - Revert \"fs/ntfs3: Replace inode_trylock with inode_lock\"",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38650",
                            "    - hfsplus: remove mutex_lock check in hfsplus_free_extents",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38615",
                            "    - fs/ntfs3: cancle set bad inode after removing name fails",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-16 (LP: #2136361)",
                            "    - virtio_ring: Fix error reporting in virtqueue_resize",
                            "    - RDMA/core: Rate limit GID cache warning messages",
                            "    - interconnect: qcom: sc7280: Add missing num_links to xm_pcie3_1 node",
                            "    - iio: adc: ad7949: use spi_is_bpw_supported()",
                            "    - regmap: fix potential memory leak of regmap_bus",
                            "    - x86/hyperv: Fix usage of cpu_online_mask to get valid cpu",
                            "    - platform/x86: Fix initialization order for firmware_attributes_class",
                            "    - staging: vchiq_arm: Make vchiq_shutdown never fail",
                            "    - net/mlx5: Fix memory leak in cmd_exec()",
                            "    - net/mlx5: E-Switch, Fix peer miss rules to use peer eswitch",
                            "    - i40e: report VF tx_dropped with tx_errors instead of tx_discards",
                            "    - i40e: When removing VF MAC filters, only check PF-set MAC",
                            "    - drm/bridge: ti-sn65dsi86: Remove extra semicolon in ti_sn_bridge_probe()",
                            "    - net: hns3: fix concurrent setting vlan filter issue",
                            "    - net: hns3: disable interrupt when ptp init failed",
                            "    - net: hns3: fixed vf get max channels bug",
                            "    - net: hns3: default enable tx bounce buffer when smmu enabled",
                            "    - platform/x86: ideapad-laptop: Fix kbd backlight not remembered among",
                            "      boots",
                            "    - i2c: tegra: Fix reset error handling with ACPI",
                            "    - i2c: virtio: Avoid hang by using interruptible completion wait",
                            "    - bus: fsl-mc: Fix potential double device reference in",
                            "      fsl_mc_get_endpoint()",
                            "    - sprintf.h requires stdarg.h",
                            "    - ALSA: hda/realtek - Add mute LED support for HP Pavilion 15-eg0xxx",
                            "    - dpaa2-eth: Fix device reference count leak in MAC endpoint handling",
                            "    - dpaa2-switch: Fix device reference count leak in MAC endpoint handling",
                            "    - e1000e: disregard NVM checksum on tgp when valid checksum bit is not set",
                            "    - e1000e: ignore uninitialized checksum word on tgp",
                            "    - gve: Fix stuck TX queue for DQ queue format",
                            "    - kasan: use vmalloc_dump_obj() for vmalloc error reports",
                            "    - resource: fix false warning in __request_region()",
                            "    - selftests: mptcp: connect: also cover alt modes",
                            "    - selftests: mptcp: connect: also cover checksum",
                            "    - mm/zsmalloc: do not pass __GFP_MOVABLE if CONFIG_COMPACTION=n",
                            "    - usb: typec: tcpm: allow to use sink in accessory mode",
                            "    - usb: typec: tcpm: allow switching to mode accessory to mux properly",
                            "    - usb: typec: tcpm: apply vbus before data bringup in tcpm_src_attach",
                            "    - comedi: comedi_test: Fix possible deletion of uninitialized timers",
                            "    - ALSA: hda/tegra: Add Tegra264 support",
                            "    - ALSA: hda: Add missing NVIDIA HDA codec IDs",
                            "    - drm/i915/dp: Fix 2.7 Gbps DP_LINK_BW value on g4x",
                            "    - mm: khugepaged: fix call hpage_collapse_scan_file() for anonymous vma",
                            "    - crypto: powerpc/poly1305 - add depends on BROKEN for now",
                            "    - [Config] disable CRYPTO_POLY1305_P10",
                            "    - iio: hid-sensor-prox: Fix incorrect OFFSET calculation",
                            "    - iio: hid-sensor-prox: Restore lost scale assignments",
                            "    - mtd: rawnand: qcom: Fix last codeword read in",
                            "      qcom_param_page_type_exec()",
                            "    - ksmbd: add free_transport ops in ksmbd connection",
                            "    - arm64/cpufeatures/kvm: Add ARMv8.9 FEAT_ECBHB bits in ID_AA64MMFR1",
                            "      register",
                            "    - ARM: 9448/1: Use an absolute path to unified.h in KBUILD_AFLAGS",
                            "    - Revert \"selftests/bpf: Add a cgroup prog bpf_get_ns_current_pid_tgid()",
                            "      test\"",
                            "    - x86/traps: Initialize DR7 by writing its architectural reset value",
                            "    - virtio_net: Enforce minimum TX ring size for reliability",
                            "    - platform/x86: asus-nb-wmi: add DMI quirk for ASUS Zenbook Duo UX8406CA",
                            "    - platform/mellanox: mlxbf-pmc: Remove newline char from event name input",
                            "    - platform/mellanox: mlxbf-pmc: Validate event/enable input",
                            "    - platform/mellanox: mlxbf-pmc: Use kstrtobool() to check 0/1 input",
                            "    - xfrm: state: use a consistent pcpu_id in xfrm_state_find",
                            "    - xfrm: Set transport header to fix UDP GRO handling",
                            "    - ALSA: hda/realtek: Fix mute LED mask on HP OMEN 16 laptop",
                            "    - drm/sched: Remove optimization that causes hang when killing dependent",
                            "      jobs",
                            "    - mm/ksm: fix -Wsometimes-uninitialized from clang-21 in",
                            "      advisor_mode_show()",
                            "    - ALSA: hda/realtek - Add mute LED support for HP Victus 15-fa0xxx",
                            "    - rust: give Clippy the minimum supported Rust version",
                            "    - selftests/bpf: Add tests with stack ptr register in conditional jmp",
                            "    - spi: cadence-quadspi: fix cleanup of rx_chan on failure paths",
                            "    - ext4: don't explicit update times in ext4_fallocate()",
                            "    - ext4: refactor ext4_punch_hole()",
                            "    - ext4: refactor ext4_zero_range()",
                            "    - ext4: refactor ext4_collapse_range()",
                            "    - ext4: refactor ext4_insert_range()",
                            "    - ext4: factor out ext4_do_fallocate()",
                            "    - ext4: move out inode_lock into ext4_fallocate()",
                            "    - fs: sort out the fallocate mode vs flag mess",
                            "    - ext4: move out common parts into ext4_fallocate()",
                            "    - ext4: fix incorrect punch max_end",
                            "    - ext4: correct the error handle in ext4_fallocate()",
                            "    - ext4: fix out of bounds punch offset",
                            "    - KVM: x86: drop x86.h include from cpuid.h",
                            "    - KVM: x86: Route non-canonical checks in emulator through emulate_ops",
                            "    - KVM: x86: Add X86EMUL_F_MSR and X86EMUL_F_DT_LOAD to aid canonical",
                            "      checks",
                            "    - KVM: x86: model canonical checks more precisely",
                            "    - x86/hyperv: Fix APIC ID and VP index confusion in hv_snp_boot_ap()",
                            "    - arm64: dts: qcom: x1-crd: Fix vreg_l2j_1p2 voltage",
                            "    - Drivers: hv: Make the sysfs node size for the ring buffer dynamic",
                            "    - Upstream stable to v6.6.101, v6.12.41",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-16 (LP: #2136361) //",
                            "    CVE-2025-38351",
                            "    - KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-16 (LP: #2136361) //",
                            "    CVE-2025-38675",
                            "    - xfrm: state: initialize state_ptrs earlier in xfrm_state_find",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-16 (LP: #2136361) //",
                            "    CVE-2025-38322",
                            "    - perf/x86/intel: Fix crash in icl_update_topdown_event()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-16 (LP: #2136361) //",
                            "    CVE-2025-37777",
                            "    - ksmbd: fix use-after-free in __smb2_lease_break_noti()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-16 (LP: #2136361) //",
                            "    CVE-2025-37925",
                            "    - jfs: reject on-disk inodes of an unsupported type",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-16 (LP: #2136361) //",
                            "    CVE-2025-38663",
                            "    - nilfs2: reject invalid file types when reading inodes",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-16 (LP: #2136361) //",
                            "    CVE-2025-38664",
                            "    - ice: Fix a null pointer dereference in ice_copy_and_init_pkg()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-16 (LP: #2136361) //",
                            "    CVE-2025-38670",
                            "    - arm64/entry: Mask DAIF in cpu_switch_to(), call_on_irq_stack()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-16 (LP: #2136361) //",
                            "    CVE-2025-38671",
                            "    - i2c: qup: jump out of the loop in case of timeout",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-16 (LP: #2136361) //",
                            "    CVE-2025-39726",
                            "    - s390/ism: fix concurrency management in ism_cmd()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-16 (LP: #2136361) //",
                            "    CVE-2025-38665",
                            "    - can: netlink: can_changelink(): fix NULL pointer deref of struct",
                            "      can_priv::do_set_mode",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-16 (LP: #2136361) //",
                            "    CVE-2025-38668",
                            "    - regulator: core: fix NULL dereference on unbind due to stale coupling",
                            "      data",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-16 (LP: #2136361) //",
                            "    CVE-2025-38335",
                            "    - Input: gpio-keys - fix a sleep while atomic with PREEMPT_RT",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221)",
                            "    - phy: tegra: xusb: Decouple CYA_TRK_CODE_UPDATE_ON_IDLE from trk_hw_mode",
                            "    - phy: tegra: xusb: Disable periodic tracking on Tegra234",
                            "    - USB: serial: option: add Telit Cinterion FE910C04 (ECM) composition",
                            "    - USB: serial: option: add Foxconn T99W640",
                            "    - USB: serial: ftdi_sio: add support for NDI EMGUIDE GEMINI",
                            "    - usb: musb: fix gadget state on disconnect",
                            "    - i2c: stm32: fix the device used for the DMA map",
                            "    - thunderbolt: Fix wake on connect at runtime",
                            "    - thunderbolt: Fix bit masking in tb_dp_port_set_hops()",
                            "    - nvmem: imx-ocotp: fix MAC address byte length",
                            "    - Input: xpad - set correct controller type for Acer NGR200",
                            "    - pch_uart: Fix dma_sync_sg_for_device() nents value",
                            "    - spi: Add check for 8-bit transfer with 8 IO mode support",
                            "    - HID: core: ensure __hid_request reserves the report ID as the first byte",
                            "    - tracing/probes: Avoid using params uninitialized in parse_btf_arg()",
                            "    - drm/amdgpu/gfx8: reset compute ring wptr on the GPU on resume",
                            "    - ALSA: hda/realtek: Add quirk for ASUS ROG Strix G712LWS",
                            "    - io_uring/poll: fix POLLERR handling",
                            "    - phonet/pep: Move call to pn_skb_get_dst_sockaddr() earlier in",
                            "      pep_sock_accept()",
                            "    - net/mlx5: Update the list of the PCI supported devices",
                            "    - arm64: dts: imx8mp-venice-gw74xx: fix TPM SPI frequency",
                            "    - arm64: dts: freescale: imx8mm-verdin: Keep LDO5 always on",
                            "    - arm64: dts: rockchip: use cs-gpios for spi1 on ringneck",
                            "    - af_packet: fix the SO_SNDTIMEO constraint not effective on tpacked_snd()",
                            "    - af_packet: fix soft lockup issue caused by tpacket_snd()",
                            "    - isofs: Verify inode mode when loading from disk",
                            "    - memstick: core: Zero initialize id_reg in h_memstick_read_dev_id()",
                            "    - mmc: bcm2835: Fix dma_unmap_sg() nents value",
                            "    - mmc: sdhci-pci: Quirk for broken command queuing on Intel GLK-based",
                            "      Positivo models",
                            "    - mmc: sdhci_am654: Workaround for Errata i2312",
                            "    - pmdomain: governor: Consider CPU latency tolerance from",
                            "      pm_domain_cpu_gov",
                            "    - soc: aspeed: lpc-snoop: Cleanup resources in stack-order",
                            "    - iio: adc: max1363: Fix MAX1363_4X_CHANS/MAX1363_8X_CHANS[]",
                            "    - iio: adc: max1363: Reorder mode_list[] entries",
                            "    - iio: adc: stm32-adc: Fix race in installing chained IRQ handler",
                            "    - comedi: Fix some signed shift left operations",
                            "    - soundwire: amd: fix for handling slave alerts after link is down",
                            "    - soundwire: amd: fix for clearing command status register",
                            "    - cachefiles: Fix the incorrect return value in __cachefiles_write()",
                            "    - net: emaclite: Fix missing pointer increment in aligned_read()",
                            "    - block: fix kobject leak in blk_unregister_queue",
                            "    - nvme: fix inconsistent RCU list manipulation in",
                            "      nvme_ns_add_to_ctrl_list()",
                            "    - nvme: fix misaccounting of nvme-mpath inflight I/O",
                            "    - wifi: cfg80211: remove scan request n_channels counted_by",
                            "    - selftests: net: increase inter-packet timeout in udpgro.sh",
                            "    - Bluetooth: hci_sync: fix connectable extended advertising when using",
                            "      static random address",
                            "    - Bluetooth: SMP: If an unallowed command is received consider it a",
                            "      failure",
                            "    - Bluetooth: SMP: Fix using HCI_ERROR_REMOTE_USER_TERM on timeout",
                            "    - Bluetooth: btusb: QCA: Fix downloading wrong NVM for WCN6855 GF variant",
                            "      without board ID",
                            "    - net/mlx5: Correctly set gso_size when LRO is used",
                            "    - Bluetooth: L2CAP: Fix attempting to adjust outgoing MTU",
                            "    - hv_netvsc: Set VF priv_flags to IFF_NO_ADDRCONF before open to prevent",
                            "      IPv6 addrconf",
                            "    - net: bridge: Do not offload IGMP/MLD messages",
                            "    - rxrpc: Fix transmission of an abort in response to an abort",
                            "    - Revert \"cgroup_freezer: cgroup_freezing: Check if not frozen\"",
                            "    - sched: Change nr_uninterruptible type to unsigned long",
                            "    - ipv6: make addrconf_wq single threaded",
                            "    - usb: hub: fix detection of high tier USB3 devices behind suspended hubs",
                            "    - usb: hub: Fix flushing and scheduling of delayed work that tunes runtime",
                            "      pm",
                            "    - usb: hub: Fix flushing of delayed work used for post resume purposes",
                            "    - usb: hub: Don't try to recover devices lost during warm reset.",
                            "    - usb: dwc3: qcom: Don't leave BCR asserted",
                            "    - i2c: omap: Add support for setting mux",
                            "    - [Config] make mux support built-in on arm",
                            "    - i2c: omap: Fix an error handling path in omap_i2c_probe()",
                            "    - i2c: omap: Handle omap_i2c_init() errors in omap_i2c_probe()",
                            "    - Revert \"selftests/bpf: adjust dummy_st_ops_success to detect additional",
                            "      error\"",
                            "    - Revert \"selftests/bpf: dummy_st_ops should reject 0 for non-nullable",
                            "      params\"",
                            "    - i2c: omap: fix deprecated of_property_read_bool() use",
                            "    - nvmem: layouts: u-boot-env: remove crc32 endianness conversion",
                            "    - i2c: stm32f7: unmap DMA mapped buffer",
                            "    - drm/amdgpu: Increase reset counter only on success",
                            "    - ALSA: hda/realtek - Fix mute LED for HP Victus 16-r0xxx",
                            "    - mptcp: reset fallback status gracefully at disconnect() time",
                            "    - arm64: dts: imx8mp-venice-gw72xx: fix TPM SPI frequency",
                            "    - arm64: dts: imx8mp-venice-gw73xx: fix TPM SPI frequency",
                            "    - arm64: dts: rockchip: Add cd-gpios for sdcard detect on Cool Pi CM5",
                            "    - arm64: dts: rockchip: Add cd-gpios for sdcard detect on Cool Pi 4B",
                            "    - nvme: fix endianness of command word prints in nvme_log_err_passthru()",
                            "    - nvmet-tcp: fix callback lock for TLS handshake",
                            "    - can: tcan4x5x: add option for selecting nWKRQ voltage",
                            "    - can: tcan4x5x: fix reset gpio usage during probe",
                            "    - ice: check correct pointer in fwlog debugfs",
                            "    - riscv: Enable interrupt during exception handling",
                            "    - riscv: traps_misaligned: properly sign extend value in misaligned load",
                            "      handler",
                            "    - Bluetooth: hci_core: add missing braces when using macro parameters",
                            "    - drm/mediatek: Add wait_event_timeout when disabling plane",
                            "    - drm/mediatek: only announce AFBC if really supported",
                            "    - net: libwx: fix multicast packets received count",
                            "    - sched,freezer: Remove unnecessary warning in __thaw_task",
                            "    - drm/xe/mocs: Initialize MOCS index early",
                            "    - drm/xe: Move page fault init after topology init",
                            "    - smb: client: let smbd_post_send_iter() respect the peers max_send_size",
                            "      and transmit all data",
                            "    - Upstream stable to v6.6.100, v6.12.40",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-22115",
                            "    - btrfs: fix block group refcount race in",
                            "      btrfs_create_pending_block_groups()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38549",
                            "    - efivarfs: Fix memory leak of efivarfs_fs_info in fs_context error paths",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38551",
                            "    - virtio-net: fix recursived rtnl_lock() during probe()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38531",
                            "    - iio: common: st_sensors: Fix use of uninitialize device structs",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38552",
                            "    - mptcp: plug races between subflow fail and subflow creation",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38491",
                            "    - mptcp: make fallback action and fallback decision atomic",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38469",
                            "    - KVM: x86/xen: Fix cleanup logic in emulation of Xen schedop poll",
                            "      hypercalls",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38499",
                            "    - clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the",
                            "      right userns",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38524",
                            "    - rxrpc: Fix recv-recv race of completed call",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38468",
                            "    - net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38470",
                            "    - net: vlan: fix VLAN 0 refcount imbalance of toggling filtering during",
                            "      runtime",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38471",
                            "    - tls: always refresh the queue when reading sock",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38472",
                            "    - netfilter: nf_conntrack: fix crash due to removal of uninitialised entry",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38550",
                            "    - ipv6: mcast: Delay put pmc->idev in mld_del_delrec()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38473",
                            "    - Bluetooth: Fix null-ptr-deref in l2cap_sock_resume_cb()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38474",
                            "    - usb: net: sierra: check for no status endpoint",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38526",
                            "    - ice: add NULL check in eswitch lag check",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38548",
                            "    - hwmon: (corsair-cpro) Validate the size of the received input buffer",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38537",
                            "    - net: phy: Don't register LEDs for genphy",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38527",
                            "    - smb: client: fix use-after-free in cifs_oplock_break",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38476",
                            "    - rpl: Fix use-after-free in rpl_do_srh_inline().",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38528",
                            "    - bpf: Reject %p% format string in bprintf-like helpers",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38478",
                            "    - comedi: Fix initialization of data for instructions that write to",
                            "      subdevice",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38480",
                            "    - comedi: Fix use of uninitialized data in insn_rw_emulate_bits()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38481",
                            "    - comedi: Fail COMEDI_INSNLIST ioctl if n_insns is too large",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38482",
                            "    - comedi: das6402: Fix bit shift out of bounds",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38483",
                            "    - comedi: das16m1: Fix bit shift out of bounds",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38529",
                            "    - comedi: aio_iiro_16: Fix bit shift out of bounds",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38530",
                            "    - comedi: pcl812: Fix bit shift out of bounds",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38485",
                            "    - iio: accel: fxls8962af: Fix use after free in fxls8962af_fifo_flush",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38487",
                            "    - soc: aspeed: lpc-snoop: Don't disable channels that aren't enabled",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2024-50047 fix. // CVE-2025-38488",
                            "    - smb: client: fix use-after-free in crypt_message when using async crypto",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38489",
                            "    - s390/bpf: Fix bpf_arch_text_poke() with new_addr == NULL again",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38532",
                            "    - net: libwx: properly reset Rx ring descriptor",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38533",
                            "    - net: libwx: fix the using of Rx buffer DMA",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38490",
                            "    - net: libwx: remove duplicate page_pool_put_full_page()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38538",
                            "    - dmaengine: nbpfaxi: Fix memory corruption in probe()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38493",
                            "    - tracing/osnoise: Fix crash in timerlat_dump_stack()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38539",
                            "    - tracing: Add down_write(trace_event_sem) when adding trace event",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38494",
                            "    - HID: core: do not bypass hid_hw_raw_request",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38495",
                            "    - HID: core: ensure the allocated report buffer can contain the reserved",
                            "      report ID",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38496",
                            "    - dm-bufio: fix sched in atomic context",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38497",
                            "    - usb: gadget: configfs: Fix OOB read on empty string write",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38535",
                            "    - phy: tegra: xusb: Fix unbalanced regulator disable in UTMI PHY mode",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382)",
                            "    - configfs: Do not override creating attribute file failure in",
                            "      populate_attrs()",
                            "    - crypto: marvell/cesa - Do not chain submitted requests",
                            "    - gfs2: move msleep to sleepable context",
                            "    - ASoC: qcom: sdm845: Add error handling in sdm845_slim_snd_hw_params()",
                            "    - ASoC: meson: meson-card-utils: use of_property_present() for DT parsing",
                            "    - io_uring: account drain memory to cgroup",
                            "    - io_uring/kbuf: account ring io_buffer_list memory",
                            "    - powerpc/pseries/msi: Avoid reading PCI device registers in reduced power",
                            "      states",
                            "    - regulator: max20086: Fix MAX200086 chip id",
                            "    - regulator: max20086: Change enable gpio to optional",
                            "    - net/mlx5_core: Add error handling",
                            "      inmlx5_query_nic_vport_qkey_viol_cntr()",
                            "    - net/mlx5: Add error handling in mlx5_query_nic_vport_node_guid()",
                            "    - wifi: ath11k: fix rx completion meta data corruption",
                            "    - wifi: ath11k: fix ring-buffer corruption",
                            "    - SUNRPC: Prevent hang on NFS mount with xprtsec=[m]tls",
                            "    - wifi: ath12k: fix ring-buffer corruption",
                            "    - wifi: rtw88: usb: Reduce control message timeout to 500 ms",
                            "    - wifi: rtlwifi: disable ASPM for RTL8723BE with subsystem ID 11ad:1723",
                            "    - media: ov8856: suppress probe deferral errors",
                            "    - media: ov5675: suppress probe deferral errors",
                            "    - media: nxp: imx8-isi: better handle the m2m usage_count",
                            "    - media: i2c: ds90ub913: Fix returned fmt from .set_fmt()",
                            "    - media: ccs-pll: Start VT pre-PLL multiplier search from correct value",
                            "    - media: ccs-pll: Start OP pre-PLL multiplier search from correct value",
                            "    - media: ccs-pll: Correct the upper limit of maximum op_pre_pll_clk_div",
                            "    - media: ccs-pll: Check for too high VT PLL multiplier in dual PLL case",
                            "    - media: davinci: vpif: Fix memory leak in probe error path",
                            "    - media: gspca: Add error handling for stv06xx_read_sensor()",
                            "    - media: mediatek: vcodec: Correct vsi_core framebuffer size",
                            "    - media: omap3isp: use sgtable-based scatterlist wrappers",
                            "    - media: v4l2-dev: fix error handling in __video_register_device()",
                            "    - media: venus: Fix probe error handling",
                            "    - media: videobuf2: use sgtable-based scatterlist wrappers",
                            "    - media: imx-jpeg: Drop the first error frames",
                            "    - media: imx-jpeg: Move mxc_jpeg_free_slot_data() ahead",
                            "    - media: imx-jpeg: Reset slot data pointers when freed",
                            "    - media: uvcvideo: Return the number of processed controls",
                            "    - media: uvcvideo: Send control events for partial succeeds",
                            "    - media: uvcvideo: Fix deferred probing error",
                            "    - arm64/mm: Close theoretical race where stale TLB entry remains valid",
                            "    - ARM: 9447/1: arm/memremap: fix arch_memremap_can_ram_remap()",
                            "    - ARM: omap: pmic-cpcap: do not mess around without CPCAP or OMAP4",
                            "    - bus: mhi: host: Fix conflict between power_up and SYSERR",
                            "    - can: tcan4x5x: fix power regulator retrieval during probe",
                            "    - ceph: set superblock s_magic for IMA fsmagic matching",
                            "    - cgroup,freezer: fix incomplete freezing when attaching tasks",
                            "    - bus: fsl-mc: do not add a device-link for the UAPI used DPMCP device",
                            "    - bus: fsl-mc: fix GET/SET_TAILDROP command ids",
                            "    - ext4: fix calculation of credits for extent tree modification",
                            "    - ext4: factor out ext4_get_maxbytes()",
                            "    - ext4: ensure i_size is smaller than maxbytes",
                            "    - Input: gpio-keys - fix possible concurrent access in",
                            "      gpio_keys_irq_timer()",
                            "    - net: ftgmac100: select FIXED_PHY",
                            "    - EDAC/altera: Use correct write width with the INTTEST register",
                            "    - parisc/unaligned: Fix hex output to show 8 hex chars",
                            "    - parisc: fix building with gcc-15",
                            "    - clk: meson-g12a: add missing fclk_div2 to spicc",
                            "    - watchdog: fix watchdog may detect false positive of softlockup",
                            "    - mm: fix ratelimit_pages update error in dirty_ratio_handler()",
                            "    - mtd: rawnand: sunxi: Add randomizer configuration in",
                            "      sunxi_nfc_hw_ecc_write_chunk",
                            "    - mtd: nand: sunxi: Add randomizer configuration before randomizer enable",
                            "    - KVM: SVM: Clear current_vmcb during vCPU free for all *possible* CPUs",
                            "    - KVM: VMX: Flush shadow VMCS on emergency reboot",
                            "    - dm-mirror: fix a tiny race condition",
                            "    - dm-verity: fix a memory leak if some arguments are specified multiple",
                            "      times",
                            "    - mtd: rawnand: qcom: Fix read len for onfi param page",
                            "    - phy: fsl-imx8mq-usb: fix phy_tx_vboost_level_from_property()",
                            "    - KVM: s390: rename PROT_NONE to PROT_TYPE_DUMMY",
                            "    - staging: iio: ad5933: Correct settling cycles encoding per datasheet",
                            "    - mips: Add -std= flag specified in KBUILD_CFLAGS to vdso CFLAGS",
                            "    - regulator: max14577: Add error check for max14577_read_reg()",
                            "    - cifs: reset connections for all channels when reconnect requested",
                            "    - cifs: update dstaddr whenever channel iface is updated",
                            "    - cifs: dns resolution is needed only for primary channel",
                            "    - Drivers: hv: Allocate interrupt and monitor pages aligned to system page",
                            "      boundary",
                            "    - uio_hv_generic: Use correct size for interrupt and monitor pages",
                            "    - PCI: cadence-ep: Correct PBA offset in .set_msix() callback",
                            "    - PCI: Add ACS quirk for Loongson PCIe",
                            "    - PCI: Fix lock symmetry in pci_slot_unlock()",
                            "    - PCI: dw-rockchip: Fix PHY function call sequence in",
                            "      rockchip_pcie_phy_deinit()",
                            "    - iio: accel: fxls8962af: Fix temperature scan element sign",
                            "    - iio: imu: inv_icm42600: Fix temperature calculation",
                            "    - iio: adc: ad7606_spi: fix reg write value mask",
                            "    - ASoC: amd: yc: Add quirk for Lenovo Yoga Pro 7 14ASP9",
                            "    - clocksource: Fix the CPUs' choice in the watchdog per CPU verification",
                            "    - power: supply: collie: Fix wakeup source leaks on device unbind",
                            "    - mmc: Add quirk to disable DDR50 tuning",
                            "    - ACPICA: Avoid sequence overread in call to strncmp()",
                            "    - ASoC: tas2770: Power cycle amp on ISENSE/VSENSE change",
                            "    - ACPI: bus: Bail out if acpi_kobj registration fails",
                            "    - ACPI: Add missing prototype for non CONFIG_SUSPEND/CONFIG_X86 case",
                            "    - power: supply: bq27xxx: Retrieve again when busy",
                            "    - ACPICA: utilities: Fix overflow check in vsnprintf()",
                            "    - ASoC: tegra210_ahub: Add check to of_device_get_match_data()",
                            "    - gpiolib: of: Add polarity quirk for s5m8767",
                            "    - PM: runtime: fix denying of auto suspend in pm_suspend_timer_fn()",
                            "    - net: macb: Check return value of dma_set_mask_and_coherent()",
                            "    - tipc: use kfree_sensitive() for aead cleanup",
                            "    - f2fs: use vmalloc instead of kvmalloc in .init_{,de}compress_ctx",
                            "    - i2c: designware: Invoke runtime suspend on quick slave re-registration",
                            "    - emulex/benet: correct command version selection in be_cmd_get_stats()",
                            "    - wifi: mt76: mt76x2: Add support for LiteOn WN4516R,WN4519R",
                            "    - wifi: mt76: mt7921: add 160 MHz AP for mt7922 device",
                            "    - sctp: Do not wake readers in __sctp_write_space()",
                            "    - cpufreq: scmi: Skip SCMI devices that aren't used by the CPUs",
                            "    - i2c: npcm: Add clock toggle recovery",
                            "    - net: dlink: add synchronization for stats update",
                            "    - wifi: ath12k: fix macro definition HAL_RX_MSDU_PKT_LENGTH_GET",
                            "    - wifi: ath12k: fix a possible dead lock caused by ab->base_lock",
                            "    - wifi: ath11k: Fix QMI memory reuse logic",
                            "    - wifi: rtw89: leave idle mode when setting WEP encryption for AP mode",
                            "    - tcp: always seek for minimal rtt in tcp_rcv_rtt_update()",
                            "    - tcp: fix initial tp->rcvq_space.space value for passive TS enabled flows",
                            "    - ipv4/route: Use this_cpu_inc() for stats on PREEMPT_RT",
                            "    - net: atlantic: generate software timestamp just before the doorbell",
                            "    - pinctrl: armada-37xx: propagate error from armada_37xx_pmx_set_by_name()",
                            "    - pinctrl: armada-37xx: propagate error from",
                            "      armada_37xx_gpio_get_direction()",
                            "    - pinctrl: armada-37xx: propagate error from",
                            "      armada_37xx_pmx_gpio_set_direction()",
                            "    - pinctrl: armada-37xx: propagate error from armada_37xx_gpio_get()",
                            "    - net: mlx4: add SOF_TIMESTAMPING_TX_SOFTWARE flag when getting ts info",
                            "    - net: vertexcom: mse102x: Return code for mse102x_rx_pkt_spi",
                            "    - wireless: purelifi: plfxlc: fix memory leak in plfxlc_usb_wreq_asyn()",
                            "    - wifi: mac80211: do not offer a mesh path if forwarding is disabled",
                            "    - clk: rockchip: rk3036: mark ddrphy as critical",
                            "    - libbpf: Add identical pointer detection to btf_dedup_is_equiv()",
                            "    - scsi: lpfc: Fix lpfc_check_sli_ndlp() handling for GEN_REQUEST64",
                            "      commands",
                            "    - iommu/amd: Ensure GA log notifier callbacks finish running before module",
                            "      unload",
                            "    - wifi: iwlwifi: pcie: make sure to lock rxq->read",
                            "    - wifi: mac80211_hwsim: Prevent tsf from setting if beacon is disabled",
                            "    - wifi: mac80211: VLAN traffic in multicast path",
                            "    - wifi: iwlwifi: Add missing MODULE_FIRMWARE for Qu-c0-jf-b0",
                            "    - net: bridge: mcast: update multicast contex when vlan state is changed",
                            "    - net: bridge: mcast: re-implement br_multicast_{enable, disable}_port",
                            "      functions",
                            "    - vxlan: Do not treat dst cache initialization errors as fatal",
                            "    - net: ethernet: ti: am65-cpsw: handle -EPROBE_DEFER",
                            "    - pinctrl: mcp23s08: Reset all pins to input at probe",
                            "    - wifi: ath12k: fix failed to set mhi state error during reboot with",
                            "      hardware grouping",
                            "    - sock: Correct error checking condition for (assign|release)_proto_idx()",
                            "    - ice: fix check for existing switch rule",
                            "    - usbnet: asix AX88772: leave the carrier control to phylink",
                            "    - f2fs: fix to set atomic write status more clear",
                            "    - bpf, sockmap: Fix data lost during EAGAIN retries",
                            "    - octeontx2-pf: Add error log forcn10k_map_unmap_rq_policer()",
                            "    - wifi: ath11k: determine PM policy based on machine model",
                            "    - wifi: ath12k: fix link valid field initialization in the monitor Rx",
                            "    - wifi: ath12k: fix incorrect CE addresses",
                            "    - wifi: ath12k: Pass correct values of center freq1 and center freq2 for",
                            "      160 MHz",
                            "    - watchdog: da9052_wdt: respect TWDMIN",
                            "    - bus: fsl-mc: increase MC_CMD_COMPLETION_TIMEOUT_MS value",
                            "    - ARM: OMAP2+: Fix l4ls clk domain handling in STANDBY",
                            "    - tee: Prevent size calculation wraparound on 32-bit kernels",
                            "    - Revert \"bus: ti-sysc: Probe for l4_wkup and l4_cfg interconnect devices",
                            "      first\"",
                            "    - fs/xattr.c: fix simple_xattr_list()",
                            "    - platform/x86/amd: pmc: Clear metrics table at start of cycle",
                            "    - platform/x86: dell_rbu: Stop overwriting data buffer",
                            "    - powerpc/vdso: Fix build of VDSO32 with pcrel",
                            "    - powerpc/eeh: Fix missing PE bridge reconfiguration during VFIO EEH",
                            "      recovery",
                            "    - io_uring: fix task leak issue in io_wq_create()",
                            "    - platform/loongarch: laptop: Get brightness setting from EC on probe",
                            "    - platform/loongarch: laptop: Unregister generic_sub_drivers on exit",
                            "    - LoongArch: Avoid using $r0/$r1 as \"mask\" for csrxchg",
                            "    - cifs: deal with the channel loading lag while picking channels",
                            "    - cifs: serialize other channels when query server interfaces is pending",
                            "    - cifs: do not disable interface polling on failure",
                            "    - smb: improve directory cache reuse for readdir operations",
                            "    - scsi: storvsc: Increase the timeouts to storvsc_timeout",
                            "    - scsi: s390: zfcp: Ensure synchronous unit_add",
                            "    - udmabuf: use sgtable-based scatterlist wrappers",
                            "    - selftests/x86: Add a test to detect infinite SIGTRAP handler loop",
                            "    - selinux: fix selinux_xfrm_alloc_user() to set correct ctx_len",
                            "    - platform/x86/intel-uncore-freq: Fail module load when plat_info is NULL",
                            "    - Input: sparcspkr - avoid unannotated fall-through",
                            "    - wifi: rtw89: pci: use DBI function for 8852AE/8852BE/8851BE",
                            "    - arm64: Restrict pagetable teardown to avoid false warning",
                            "    - ALSA: usb-audio: Rename ALSA kcontrol PCM and PCM1 for the KTMicro sound",
                            "      card",
                            "    - ALSA: hda/intel: Add Thinkpad E15 to PM deny list",
                            "    - ALSA: hda/realtek: enable headset mic on Latitude 5420 Rugged",
                            "    - iio: accel: fxls8962af: Fix temperature calculation",
                            "    - net: Fix checksum update for ILA adj-transport",
                            "    - bpf: Fix L4 csum update on IPv6 in CHECKSUM_COMPLETE",
                            "    - erofs: remove unused trace event erofs_destroy_inode",
                            "    - smb: fix secondary channel creation issue with kerberos by populating",
                            "      hostname when adding channels",
                            "    - drm/msm/disp: Correct porch timing for SDM845",
                            "    - drm/msm/dsi/dsi_phy_10nm: Fix missing initial VCO rate",
                            "    - ionic: Prevent driver/fw getting out of sync on devcmd(s)",
                            "    - drm/nouveau/bl: increase buffer size to avoid truncate warning",
                            "    - drm/i915/pmu: Fix build error with GCOV and AutoFDO enabled",
                            "    - hwmon: (occ) Rework attribute registration for stack usage",
                            "    - hwmon: (occ) fix unaligned accesses",
                            "    - pldmfw: Select CRC32 when PLDMFW is selected",
                            "    - net: ice: Perform accurate aRFS flow match",
                            "    - ptp: fix breakage after ptp_vclock_in_use() rework",
                            "    - ptp: allow reading of currently dialed frequency to succeed on free-",
                            "      running clocks",
                            "    - tcp: fix tcp_packet_delayed() for tcp_is_non_sack_preventing_reopen()",
                            "      behavior",
                            "    - tcp: fix passive TFO socket having invalid NAPI ID",
                            "    - net: microchip: lan743x: Reduce PTP timeout on HW failure",
                            "    - EDAC/amd64: Correct number of UMCs for family 19h models 70h-7fh",
                            "    - dt-bindings: i2c: nvidia,tegra20-i2c: Specify the required properties",
                            "    - net: make for_each_netdev_dump() a little more bug-proof",
                            "    - serial: sh-sci: Increment the runtime usage counter for the earlycon",
                            "      device",
                            "    - ARM: dts: am335x-bone-common: Increase MDIO reset deassert time",
                            "    - ARM: dts: am335x-bone-common: Increase MDIO reset deassert delay to 50ms",
                            "    - smb: client: fix first command failure during re-negotiation",
                            "    - platform/loongarch: laptop: Add backlight power control support",
                            "    - s390/pci: Fix __pcilg_mio_inuser() inline assembly",
                            "    - perf: Fix cgroup state vs ERROR",
                            "    - perf/core: Fix WARN in perf_cgroup_switch()",
                            "    - scsi: elx: efct: Fix memory leak in efct_hw_parse_filter()",
                            "    - RISC-V: KVM: Fix the size parameter check in SBI SFENCE calls",
                            "    - RISC-V: KVM: Don't treat SBI HFENCE calls as NOPs",
                            "    - perf evsel: Missed close() when probing hybrid core PMUs",
                            "    - crypto: qat - add shutdown handler to qat_c3xxx",
                            "    - crypto: qat - add shutdown handler to qat_420xx",
                            "    - crypto: qat - add shutdown handler to qat_4xxx",
                            "    - crypto: qat - add shutdown handler to qat_c62x",
                            "    - crypto: qat - add shutdown handler to qat_dh895xcc",
                            "    - wifi: mt76: mt7925: fix host interrupt register initialization",
                            "    - wifi: rtw88: usb: Upload the firmware in bigger chunks",
                            "    - NFSD: unregister filesystem in case genl_register_family() fails",
                            "    - NFSD: Implement FATTR4_CLONE_BLKSIZE attribute",
                            "    - media: ov2740: Move pm-runtime cleanup on probe-errors to proper place",
                            "    - media: i2c: imx335: Fix frame size enumeration",
                            "    - soc: qcom: pmic_glink_altmode: fix spurious DP hotplug events",
                            "    - sysfb: Fix screen_info type check for VGA",
                            "    - ovl: Fix nested backing file paths",
                            "    - Drivers: hv: vmbus: Add utility function for querying ring size",
                            "    - uio_hv_generic: Query the ringbuffer size for device",
                            "    - uio_hv_generic: Align ring size to system page",
                            "    - PCI: dwc: ep: Correct PBA offset in .set_msix() callback",
                            "    - PCI: dw-rockchip: Remove PCIE_L0S_ENTRY check from",
                            "      rockchip_pcie_link_up()",
                            "    - accel/ivpu: Improve buffer object logging",
                            "    - accel/ivpu: Fix warning in ivpu_gem_bo_free()",
                            "    - tty: vt: make init parameter of consw::con_init() a bool",
                            "    - tty: vt: sanitize arguments of consw::con_clear()",
                            "    - tty: vt: make consw::con_switch() return a bool",
                            "    - dummycon: Trigger redraw when switching consoles with deferred takeover",
                            "    - ACPICA: Apply pack(1) to union aml_resource",
                            "    - ALSA: hda: cs35l41: Fix swapped l/r audio channels for Acer Helios",
                            "      laptops",
                            "    - pmdomain: core: Reset genpd->states to avoid freeing invalid data",
                            "    - power: supply: max17040: adjust thermal channel scaling",
                            "    - Bluetooth: btusb: Add new VID/PID 13d3/3584 for MT7922",
                            "    - Bluetooth: btusb: Add new VID/PID 13d3/3630 for MT7925",
                            "    - wifi: mt76: mt7925: introduce thermal protection",
                            "    - libbpf/btf: Fix string handling to support multi-split BTF",
                            "    - clk: qcom: gcc-x1e80100: Set FORCE MEM CORE for UFS clocks",
                            "    - iommu/amd: Allow matching ACPI HID devices without matching UIDs",
                            "    - tcp: remove zero TCP TS samples for autotuning",
                            "    - tcp: add receive queue awareness in tcp_rcv_space_adjust()",
                            "    - bpf: Pass the same orig_call value to trampoline functions",
                            "    - net: stmmac: generate software timestamp just before the doorbell",
                            "    - hid-asus: check ROG Ally MCU version and warn",
                            "    - wifi: iwlwifi: mvm: fix beacon CCK flag",
                            "    - scsi: smartpqi: Add new PCI IDs",
                            "    - Revert \"mac80211: Dynamically set CoDel parameters per station\"",
                            "    - bnxt_en: Remove unused field \"ref_count\" in struct bnxt_ulp",
                            "    - wifi: ath12k: using msdu end descriptor to check for rx multicast",
                            "      packets",
                            "    - isofs: fix Y2038 and Y2156 issues in Rock Ridge TF entry",
                            "    - ixgbe: Fix unreachable retry logic in combined and byte I2C write",
                            "      functions",
                            "    - RDMA/hns: initialize db in update_srq_db()",
                            "    - platform/x86/amd: pmf: Prevent amd_pmf_tee_deinit() from running twice",
                            "    - LoongArch: vDSO: Correctly use asm parameters in syscall wrappers",
                            "    - nvme: always punt polled uring_cmd end_io work to task_work",
                            "    - mm: close theoretical race where stale TLB entries could linger",
                            "    - x86/virt/tdx: Avoid indirect calls to TDX assembly functions",
                            "    - wifi: rtw89: phy: add dummy C2H event handler for report of TAS power",
                            "    - ALSA: hda/realtek - Add mute LED support for HP Victus 16-s1xxx and HP",
                            "      Victus 15-fa1xxx",
                            "    - ALSA: hda/realtek: Fix built-in mic on ASUS VivoBook X513EA",
                            "    - drm/amdgpu: read back register after written for VCN v4.0.5",
                            "    - Kunit to check the longest symbol length",
                            "    - x86/tools: Drop duplicate unlikely() definition in insn_decoder_test.c",
                            "    - ipv6: remove leftover ip6 cookie initializer",
                            "    - ipv6: replace ipcm6_init calls with ipcm6_init_sk",
                            "    - drm/ssd130x: fix ssd132x_clear_screen() columns",
                            "    - workqueue: Initialize wq_isolated_cpumask in workqueue_init_early()",
                            "    - mlxbf_gige: return EPROBE_DEFER if PHY IRQ is not available",
                            "    - gpio: pca953x: fix wrong error probe return value",
                            "    - bpftool: Fix cgroup command to only show cgroup bpf programs",
                            "    - Upstream stable to v6.6.95, v6.12.35",
                            "    - bpftool: Query only cgroup-related attach types",
                            "    - bpftool: Fix regression of \"bpftool cgroup tree\" EINVAL on older kernels",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38507",
                            "    - HID: nintendo: avoid bluetooth suspend/resume stalls",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38511",
                            "    - drm/xe/pf: Clear all LMTT pages on alloc",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38520",
                            "    - drm/amdkfd: Don't call mmput from MMU notifier callback",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38521",
                            "    - drm/imagination: Fix kernel crash when hard resetting the GPU",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38506",
                            "    - KVM: Allow CPU to reschedule while setting per-page memory attributes",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38104",
                            "    - drm/amdgpu: Replace Mutex with Spinlock for RLCG register access to",
                            "      avoid Priority Inversion in SRIOV",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38067",
                            "    - rseq: Fix segfault on registration when rseq_cs is non-zero",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-37984",
                            "    - crypto: ecdsa - Harden against integer overflows in DIV_ROUND_UP()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38437",
                            "    - ksmbd: fix potential use-after-free in oplock/lease break ack",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38510",
                            "    - kasan: remove kasan_find_vm_area() to prevent possible deadlock",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38503",
                            "    - btrfs: fix assertion when building free space tree",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38439",
                            "    - bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38542",
                            "    - net: appletalk: Fix device refcount leak in atrtr_create()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38441",
                            "    - netfilter: flowtable: account for Ethernet header in",
                            "      nf_flow_pppoe_proto()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38443",
                            "    - nbd: fix uaf in nbd_genl_connect() error path",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38444",
                            "    - raid10: cleanup memleak at raid10_make_request",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38445",
                            "    - md/raid1: Fix stack memory use after return in raid1_reshape",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38543",
                            "    - drm/tegra: nvdec: Fix dma_alloc_coherent error check",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38513",
                            "    - wifi: zd1211rw: Fix potential NULL pointer dereference in",
                            "      zd_mac_tx_to_dev()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38448",
                            "    - usb: gadget: u_serial: Fix race condition in TTY wakeup",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38515",
                            "    - drm/sched: Increment job count before swapping tail spsc queue",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38449",
                            "    - drm/gem: Acquire references on GEM handles for framebuffers",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38512",
                            "    - wifi: prevent A-MSDU attacks in mesh networks",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38516",
                            "    - pinctrl: qcom: msm: mark certain pins as invalid for interrupts",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38455",
                            "    - KVM: SVM: Reject SEV{-ES} intra host migration if vCPU creation is in-",
                            "      flight",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38456",
                            "    - ipmi:msghandler: Fix potential memory corruption in ipmi_create_user()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38514",
                            "    - rxrpc: Fix oops due to non-existence of prealloc backlog struct",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38544",
                            "    - rxrpc: Fix bug due to prealloc collision",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38457",
                            "    - net/sched: Abort __tc_modify_qdisc if parent class does not exist",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38458",
                            "    - atm: clip: Fix NULL pointer dereference in vcc_sendmsg()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38459",
                            "    - atm: clip: Fix infinite recursive call of clip_push().",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38546",
                            "    - atm: clip: Fix memory leak of struct clip_vcc.",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38460",
                            "    - atm: clip: Fix potential null-ptr-deref in to_atmarpd().",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38461",
                            "    - vsock: Fix transport_* TOCTOU",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38462",
                            "    - vsock: Fix transport_{g2h,h2g} TOCTOU",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38463",
                            "    - tcp: Correct signedness in skb remaining space calculation",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38464",
                            "    - tipc: Fix use-after-free in tipc_conn_close().",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38465",
                            "    - netlink: Fix wraparounds of sk->sk_rmem_alloc.",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38466",
                            "    - perf: Revert to requiring CAP_SYS_ADMIN for uprobes",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38467",
                            "    - drm/exynos: exynos7_drm_decon: add vblank check in IRQ handling",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38349",
                            "    - eventpoll: don't decrement ep refcount while still holding the ep mutex",
                            "",
                            "  * [UBUNTU 24.04] KVM: s390: improve interrupt cpu for wakeup (LP: #2132317)",
                            "    - KVM: s390: improve interrupt cpu for wakeup",
                            "",
                            "  * veth.sh from ubuntu_kselftests_net failed on J-5.15 / N-6.8 (with xdp",
                            "    attached - gro flag) (LP: #2065369)",
                            "    - selftests: net: veth: test the ability to independently manipulate GRO",
                            "      and XDP",
                            "",
                            "  * ftrace:test.d--event--subsystem-enable.tc fails on some instances",
                            "    (LP: #2071861)",
                            "    - selftests/tracing: Fix false failure of subsystem event test",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640)",
                            "    - rtc: pcf2127: add missing semicolon after statement",
                            "    - rtc: pcf2127: fix SPI command byte for PCF2131",
                            "    - rtc: cmos: use spin_lock_irqsave in cmos_interrupt",
                            "    - mmc: sdhci: Add a helper function for dump register in dynamic debug",
                            "      mode",
                            "    - mmc: core: sd: Apply BROKEN_SD_DISCARD quirk earlier",
                            "    - Bluetooth: hci_sync: revert some mesh modifications",
                            "    - Bluetooth: MGMT: set_mesh: update LE scan interval and window",
                            "    - Bluetooth: MGMT: mesh_send: check instances prior disabling advertising",
                            "    - mtk-sd: Fix a pagefault in dma_unmap_sg() for not prepared data",
                            "    - mtk-sd: reset host->mrq on prepare_data() error",
                            "    - arm64: dts: apple: t8103: Fix PCIe BCM4377 nodename",
                            "    - platform/mellanox: mlxbf-tmfifo: fix vring_desc.len assignment",
                            "    - scsi: qla2xxx: Fix DMA mapping test in qla24xx_get_port_database()",
                            "    - scsi: qla4xxx: Fix missing DMA mapping error in qla4xxx_alloc_pdu()",
                            "    - scsi: ufs: core: Fix spelling of a sysfs attribute name",
                            "    - RDMA/mlx5: Fix HW counters query for non-representor devices",
                            "    - RDMA/mlx5: Fix CC counters query for MPV",
                            "    - RDMA/mlx5: Fix vport loopback for MPV device",
                            "    - platform/mellanox: nvsw-sn2201: Fix bus number in adapter error message",
                            "    - Bluetooth: Prevent unintended pause by checking if advertising is active",
                            "    - btrfs: fix missing error handling when searching for inode refs during",
                            "      log replay",
                            "    - btrfs: rename err to ret in btrfs_rmdir()",
                            "    - btrfs: propagate last_unlink_trans earlier when doing a rmdir",
                            "    - btrfs: use btrfs_record_snapshot_destroy() during rmdir",
                            "    - ethernet: atl1: Add missing DMA mapping error checks and count errors",
                            "    - dpaa2-eth: fix xdp_rxq_info leak",
                            "    - drm/exynos: fimd: Guard display clock control with runtime PM calls",
                            "    - spi: spi-fsl-dspi: Clear completion counter before initiating transfer",
                            "    - drm/i915/selftests: Change mock_request() to return error pointers",
                            "    - platform/x86: make fw_attr_class constant",
                            "    - platform/x86: firmware_attributes_class: Move include",
                            "      linux/device/class.h",
                            "    - platform/x86: firmware_attributes_class: Simplify API",
                            "    - platform/x86: think-lmi: Directly use firmware_attributes_class",
                            "    - platform/x86: think-lmi: Fix class device unregistration",
                            "    - platform/x86: dell-sysman: Directly use firmware_attributes_class",
                            "    - platform/x86: dell-wmi-sysman: Fix class device unregistration",
                            "    - platform/mellanox: mlxreg-lc: Fix logic error in power state check",
                            "    - smb: client: fix warning when reconnecting channel",
                            "    - drm/i915/gsc: mei interrupt top half should be in irq disabled context",
                            "    - igc: disable L1.2 PCI-E link substate to avoid performance issue",
                            "    - lib: test_objagg: Set error message in check_expect_hints_stats()",
                            "    - amd-xgbe: align CL37 AN sequence as per databook",
                            "    - enic: fix incorrect MTU comparison in enic_change_mtu()",
                            "    - nui: Fix dma_mapping_error() check",
                            "    - amd-xgbe: do not double read link status",
                            "    - smb: client: fix race condition in negotiate timeout by using more",
                            "      precise timing",
                            "    - wifi: mac80211: chan: chandef is non-NULL for reserved",
                            "    - f2fs: prevent writing without fallocate() for pinned files",
                            "    - f2fs: convert f2fs_vm_page_mkwrite() to use folio",
                            "    - f2fs: fix to zero post-eof page",
                            "    - drm/simpledrm: Do not upcast in release helpers",
                            "    - ALSA: sb: Don't allow changing the DMA mode during operations",
                            "    - ALSA: sb: Force to disable DMAs once when DMA mode is changed",
                            "    - ata: libata-acpi: Do not assume 40 wire cable if no devices are enabled",
                            "    - ata: pata_cs5536: fix build on 32-bit UML",
                            "    - ASoC: amd: yc: Add quirk for MSI Bravo 17 D7VF internal mic",
                            "    - platform/x86/amd/pmc: Add PCSpecialist Lafite Pro V 14M to 8042 quirks",
                            "      list",
                            "    - powerpc: Fix struct termio related ioctl macros",
                            "    - ASoC: amd: yc: update quirk data for HP Victus",
                            "    - regulator: fan53555: add enable_time support and soft-start times",
                            "    - aoe: defer rexmit timer downdev work to workqueue",
                            "    - wifi: mac80211: drop invalid source address OCB frames",
                            "    - rcu: Return early if callback is not specified",
                            "    - platform/x86: hp-bioscfg: Directly use firmware_attributes_class",
                            "    - platform/x86: hp-bioscfg: Fix class device unregistration",
                            "    - module: Provide EXPORT_SYMBOL_GPL_FOR_MODULES() helper",
                            "    - NFSv4/flexfiles: Fix handling of NFS level errors in I/O",
                            "    - usb: xhci: quirk for data loss in ISOC transfers",
                            "    - xhci: dbctty: disable ECHO flag by default",
                            "    - xhci: dbc: Flush queued requests before stopping dbc",
                            "    - xhci: Disable stream for xHC controller with XHCI_BROKEN_STREAMS",
                            "    - Input: xpad - support Acer NGR 200 Controller",
                            "    - Input: iqs7222 - explicitly define number of external channels",
                            "    - usb: cdnsp: do not disable slot for disabled slot",
                            "    - dma-buf: fix timeout handling in dma_resv_wait_timeout v2",
                            "    - i2c/designware: Fix an initialization issue",
                            "    - Logitech C-270 even more broken",
                            "    - iommu/rockchip: prevent iommus dead loop when two masters share one",
                            "      IOMMU",
                            "    - powercap: intel_rapl: Do not change CLAMPING bit if ENABLE bit cannot be",
                            "      changed",
                            "    - platform/x86: think-lmi: Create ksets consecutively",
                            "    - platform/x86: think-lmi: Fix kobject cleanup",
                            "    - platform/x86: think-lmi: Fix sysfs group cleanup",
                            "    - usb: typec: displayport: Fix potential deadlock",
                            "    - powerpc/kernel: Fix ppc_save_regs inclusion in build",
                            "    - [Config] enable Transient Scheduler Attacks mitigation",
                            "    - x86/CPU/AMD: Properly check the TSA microcode",
                            "    - x86/bugs: Fix use of possibly uninit value in amd_check_tsa_microcode()",
                            "    - net: txgbe: request MISC IRQ in ndo_open",
                            "    - Bluetooth: HCI: Set extended advertising data synchronously",
                            "    - iommufd/selftest: Fix iommufd_dirty_tracking with large hugepage sizes",
                            "    - firmware: arm_ffa: Move memory allocation outside the mutex locking",
                            "    - platform/mellanox: mlxbf-pmc: Fix duplicate event ID for CACHE_DATA1",
                            "    - btrfs: return a btrfs_inode from btrfs_iget_logging()",
                            "    - btrfs: return a btrfs_inode from read_one_inode()",
                            "    - btrfs: fix invalid inode pointer dereferences during log replay",
                            "    - btrfs: fix inode lookup error handling during log replay",
                            "    - nvme: Fix incorrect cdw15 value in passthru error logging",
                            "    - drm/bridge: aux-hpd-bridge: fix assignment of the of_node",
                            "    - netfs: Fix i_size updating",
                            "    - arm64: dts: rockchip: fix internal USB hub instability on RK3399 Puma",
                            "    - crypto: iaa - Remove dst_null support",
                            "    - crypto: iaa - Do not clobber req->base.data",
                            "    - spinlock: extend guard with spinlock_bh variants",
                            "    - crypto: zynqmp-sha - Add locking",
                            "    - kunit: qemu_configs: sparc: use Zilog console",
                            "    - kunit: qemu_configs: sparc: Explicitly enable CONFIG_SPARC32=y",
                            "    - kunit: qemu_configs: Disable faulting tests on 32-bit SPARC",
                            "    - gfs2: Initialize gl_no_formal_ino earlier",
                            "    - gfs2: Rename GIF_{DEFERRED -> DEFER}_DELETE",
                            "    - gfs2: Rename dinode_demise to evict_behavior",
                            "    - gfs2: Prevent inode creation race",
                            "    - gfs2: Rename GLF_FREEING to GLF_UNLOCKED",
                            "    - gfs2: Decode missing glock flags in tracepoints",
                            "    - gfs2: Add GLF_PENDING_REPLY flag",
                            "    - gfs2: Replace GIF_DEFER_DELETE with GLF_DEFER_DELETE",
                            "    - gfs2: Move gfs2_dinode_dealloc",
                            "    - gfs2: Move GIF_ALLOC_FAILED check out of gfs2_ea_dealloc",
                            "    - gfs2: deallocate inodes in gfs2_create_inode",
                            "    - btrfs: fix wrong start offset for delalloc space release during mmap",
                            "      write",
                            "    - ASoC: tas2764: Extend driver to SN012776",
                            "    - ASoC: tas2764: Reinit cache on part reset",
                            "    - ACPI: thermal: Fix stale comment regarding trip points",
                            "    - ACPI: thermal: Execute _SCP before reading trip points",
                            "    - bonding: Mark active offloaded xfrm_states",
                            "    - wifi: ath12k: Handle error cases during extended skb allocation",
                            "    - wifi: ath12k: fix wrong handling of CCMP256 and GCMP ciphers",
                            "    - RDMA/rxe: Fix \"trying to register non-static key in rxe_qp_do_cleanup\"",
                            "      bug",
                            "    - iommu: ipmmu-vmsa: avoid Wformat-security warning",
                            "    - f2fs: decrease spare area for pinned files for zoned devices",
                            "    - f2fs: zone: introduce first_zoned_segno in f2fs_sb_info",
                            "    - f2fs: introduce SEGS_TO_BLKS/BLKS_TO_SEGS for cleanup",
                            "    - f2fs: zone: fix to calculate first_zoned_segno correctly",
                            "    - scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure",
                            "    - scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask",
                            "    - hisi_acc_vfio_pci: bugfix cache write-back issue",
                            "    - hisi_acc_vfio_pci: bugfix the problem of uninstalling driver",
                            "    - bpf: use common instruction history across all states",
                            "    - arm64: dts: qcom: sm8650: change labels to lower-case",
                            "    - arm64: dts: qcom: sm8650: Fix domain-idle-state for CPU2",
                            "    - arm64: dts: qcom: sm8650: add the missing l2 cache node",
                            "    - remoteproc: k3: Call of_node_put(rmem_np) only once in three functions",
                            "    - remoteproc: k3-r5: Add devm action to release reserved memory",
                            "    - remoteproc: k3-r5: Use devm_kcalloc() helper",
                            "    - remoteproc: k3-r5: Use devm_ioremap_wc() helper",
                            "    - remoteproc: k3-r5: Use devm_rproc_alloc() helper",
                            "    - remoteproc: k3-r5: Use devm_rproc_add() helper",
                            "    - remoteproc: k3-r5: Refactor sequential core power up/down operations",
                            "    - mfd: exynos-lpass: Fix another error handling path in",
                            "      exynos_lpass_probe()",
                            "    - selinux: change security_compute_sid to return the ssid or tsid on match",
                            "    - drm/amdgpu: VCN v5_0_1 to prevent FW checking RB during DPG pause",
                            "    - drm/xe/bmg: Add BMG platform definition",
                            "    - drm/i915/bmg: Define IS_BATTLEMAGE macro",
                            "    - drm/i915/dp_mst: Work around Thunderbolt sink disconnect after",
                            "      SINK_COUNT_ESI read",
                            "    - arm64: dts: qcom: x1e80100-crd: mark l12b and l15b always-on",
                            "    - scsi: lpfc: Restore clearing of NLP_UNREG_INP in ndlp->nlp_flag",
                            "    - RDMA/mlx5: Fix cache entry update on dereg error",
                            "    - drm/xe: Allow dropping kunit dependency as built-in",
                            "    - usb: xhci: Skip xhci_reset in xhci_resume if xhci is being removed",
                            "    - Revert \"usb: xhci: Implement xhci_handshake_check_state() helper\"",
                            "    - usb: cdnsp: Fix issue with CV Bad Descriptor test",
                            "    - usb: dwc3: Abort suspend on soft disconnect failure",
                            "    - Upstream stable to v6.6.97, v6.12.37",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38407",
                            "    - riscv: cpu_ops_sbi: Use static array for boot_data",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38374",
                            "    - optee: ffa: fix sleep in atomic context",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38373",
                            "    - IB/mlx5: Fix potential deadlock in MR deregistration",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38408",
                            "    - genirq/irq_sim: Initialize work context pointers properly",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38279",
                            "    - bpf: Do not include stack ptr register in precision backtracking",
                            "      bookkeeping",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38289",
                            "    - scsi: lpfc: Avoid potential ndlp use-after-free in dev_loss_tmo_callbk",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38392",
                            "    - idpf: convert control queue mutex to a spinlock",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38402",
                            "    - idpf: return 0 size for RSS key if not supported",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38405",
                            "    - nvmet: fix memory leak of bio integrity",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38388",
                            "    - firmware: arm_ffa: Replace mutex with rwlock to avoid sleep in atomic",
                            "      context",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38390",
                            "    - firmware: arm_ffa: Fix memory leak by freeing notifier callback node",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2024-36350 // CVE-2024-36357",
                            "    - x86/bugs: Rename MDS machinery to something more generic",
                            "    - x86/bugs: Add a Transient Scheduler Attacks mitigation",
                            "    - KVM: SVM: Advertise TSA CPUID bits to guests",
                            "    - x86/microcode/AMD: Add TSA microcode SHAs",
                            "    - x86/process: Move the buffer clearing before MONITOR",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38376",
                            "    - usb: chipidea: udc: disconnect/reconnect from host when do",
                            "      suspend/resume",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38396",
                            "    - fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38371",
                            "    - drm/v3d: Disable interrupts before resetting the GPU",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38384",
                            "    - mtd: spinand: fix memory leak of ECC engine conf",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38386",
                            "    - ACPICA: Refuse to evaluate a method if arguments are missing",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38406",
                            "    - wifi: ath6kl: remove WARN on bad firmware input",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38399",
                            "    - scsi: target: Fix NULL pointer dereference in",
                            "      core_scsi3_decode_spec_i_port()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38409",
                            "    - drm/msm: Fix another leak in the submit error path",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38410",
                            "    - drm/msm: Fix a fence leak in submit error path",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38377",
                            "    - rose: fix dangling neighbour pointers in rose_rt_device_down()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38389",
                            "    - drm/i915/gt: Fix timeline left held on VMA alloc error",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38385",
                            "    - net: usb: lan78xx: fix WARN in __netif_napi_del_locked on disconnect",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38412",
                            "    - platform/x86: dell-wmi-sysman: Fix WMI data block retrieval in sysfs",
                            "      callbacks",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38382",
                            "    - btrfs: fix iteration of extrefs during log replay",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38393",
                            "    - NFSv4/pNFS: Fix a race to wake on NFS_LAYOUT_DRAIN",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38400",
                            "    - nfs: Clean up /proc/net/rpc/nfs when nfs_fs_proc_net_init() fails.",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38387",
                            "    - RDMA/mlx5: Initialize obj_event->obj_sub_list before xa_insert",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38401",
                            "    - mtk-sd: Prevent memory corruption from DMA map failure",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38391",
                            "    - usb: typec: altmodes/displayport: do not index invalid pin_assignments",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38395",
                            "    - regulator: gpio: Fix the out-of-bounds access to drvdata::gpiods",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38403",
                            "    - vsock/vmci: Clear the vmci transport packet properly when initializing",
                            "      it",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38375",
                            "    - virtio-net: ensure the received length does not exceed allocated size",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499)",
                            "    - cifs: Correctly set SMB1 SessionKey field in Session Setup Request",
                            "    - cifs: Fix cifs_query_path_info() for Windows NT servers",
                            "    - cifs: Fix encoding of SMB1 Session Setup NTLMSSP Request in non-UNICODE",
                            "      mode",
                            "    - NFSv4: Always set NLINK even if the server doesn't support it",
                            "    - NFSv4.2: fix listxattr to return selinux security label",
                            "    - mailbox: Not protect module_put with spin_lock_irqsave",
                            "    - mfd: max14577: Fix wakeup source leaks on device unbind",
                            "    - sunrpc: don't immediately retransmit on seqno miss",
                            "    - leds: multicolor: Fix intensity setting while SW blinking",
                            "    - fuse: fix race between concurrent setattrs from multiple nodes",
                            "    - cxl/region: Add a dev_err() on missing target list entries",
                            "    - NFSv4: xattr handlers should check for absent nfs filehandles",
                            "    - hwmon: (pmbus/max34440) Fix support for max34451",
                            "    - ksmbd: allow a filename to contain special characters on SMB3.1.1 posix",
                            "      extension",
                            "    - ksmbd: provide zero as a unique ID to the Mac client",
                            "    - rust: module: place cleanup_module() in .exit.text section",
                            "    - dmaengine: xilinx_dma: Set dma_device directions",
                            "    - PCI: dwc: Make link training more robust by setting",
                            "      PORT_LOGIC_LINK_WIDTH to one lane",
                            "    - PCI: apple: Fix missing OF node reference in apple_pcie_setup_port",
                            "    - md/md-bitmap: fix dm-raid max_write_behind setting",
                            "    - amd/amdkfd: fix a kfd_process ref leak",
                            "    - iio: pressure: zpa2326: Use aligned_s64 for the timestamp",
                            "    - um: Add cmpxchg8b_emu and checksum functions to asm-prototypes.h",
                            "    - um: use proper care when taking mmap lock during segfault",
                            "    - coresight: Only check bottom two claim bits",
                            "    - usb: dwc2: also exit clock_gating when stopping udc while suspended",
                            "    - iio: adc: ad_sigma_delta: Fix use of uninitialized status_pos",
                            "    - usb: potential integer overflow in usbg_make_tpg()",
                            "    - usb: common: usb-conn-gpio: use a unique name for usb connector device",
                            "    - usb: Add checks for snprintf() calls in usb_alloc_dev()",
                            "    - usb: cdc-wdm: avoid setting WDM_READ for ZLP-s",
                            "    - usb: typec: displayport: Receive DP Status Update NAK request exit dp",
                            "      altmode",
                            "    - usb: typec: mux: do not return on EOPNOTSUPP in {mux, switch}_set",
                            "    - ALSA: hda: Ignore unsol events for cards being shut down",
                            "    - ALSA: hda: Add new pci id for AMD GPU display HD audio controller",
                            "    - ALSA: usb-audio: Add a quirk for Lenovo Thinkpad Thunderbolt 3 dock",
                            "    - ceph: fix possible integer overflow in ceph_zero_objects()",
                            "    - scsi: ufs: core: Don't perform UFS clkscaling during host async scan",
                            "    - ovl: Check for NULL d_inode() in ovl_dentry_upper()",
                            "    - fs/jfs: consolidate sanity checking in dbMount",
                            "    - ASoC: codecs: wcd9335: Handle nicer probe deferral and simplify with",
                            "      dev_err_probe()",
                            "    - ASoC: codec: wcd9335: Convert to GPIO descriptors",
                            "    - f2fs: don't over-report free space or inodes in statvfs",
                            "    - PCI: apple: Use helper function for_each_child_of_node_scoped()",
                            "    - PCI: apple: Set only available ports up",
                            "    - platform/x86: ideapad-laptop: move ACPI helpers from header to source",
                            "      file",
                            "    - platform/x86: ideapad-laptop: use usleep_range() for EC polling",
                            "    - i2c: tiny-usb: disable zero-length read messages",
                            "    - i2c: robotfuzz-osif: disable zero-length read messages",
                            "    - ASoC: amd: yc: Add DMI quirk for Lenovo IdeaPad Slim 5 15",
                            "    - attach_recursive_mnt(): do not lock the covering tree when sliding",
                            "      something under it",
                            "    - libbpf: Fix null pointer dereference in btf_dump__free on allocation",
                            "      failure",
                            "    - wifi: mac80211: fix beacon interval calculation overflow",
                            "    - af_unix: Don't set -ECONNRESET for consumed OOB skb.",
                            "    - vsock/uapi: fix linux/vm_sockets.h userspace compilation errors",
                            "    - um: ubd: Add missing error check in start_io_thread()",
                            "    - libbpf: Fix possible use-after-free for externs",
                            "    - net: enetc: Correct endianness handling in _enetc_rd_reg64",
                            "    - ALSA: hda/realtek: Fix built-in mic on ASUS VivoBook X507UAR",
                            "    - net: selftests: fix TCP packet checksum",
                            "    - drm/i915: fix build error some more",
                            "    - drm/bridge: ti-sn65dsi86: make use of debugfs_init callback",
                            "    - drm/bridge: ti-sn65dsi86: Add HPD for DisplayPort connector type",
                            "    - EDAC/amd64: Fix size calculation for Non-Power-of-Two DIMMs",
                            "    - staging: rtl8723bs: Avoid memset() in aes_cipher() and aes_decipher()",
                            "    - dt-bindings: serial: 8250: Make clocks and clock-frequency exclusive",
                            "    - serial: imx: Restore original RXTL for console to fix data loss",
                            "    - Bluetooth: L2CAP: Fix L2CAP MTU negotiation",
                            "    - dm-raid: fix variable in journal device check",
                            "    - btrfs: update superblock's device bytes_used when dropping chunk",
                            "    - net: libwx: fix the creation of page_pool",
                            "    - HID: lenovo: Restrict F7/9/11 mode to compact keyboards only",
                            "    - HID: wacom: fix memory leak on kobject creation failure",
                            "    - HID: wacom: fix memory leak on sysfs attribute creation failure",
                            "    - HID: wacom: fix kobject reference count leak",
                            "    - drm/ast: Fix comment on modeset lock",
                            "    - drm/cirrus-qemu: Fix pitch programming",
                            "    - drm/etnaviv: Protect the scheduler's pending list with its lock",
                            "    - drm/tegra: Assign plane type before registration",
                            "    - drm/udl: Unregister device before cleaning up on disconnect",
                            "    - drm/amdkfd: Fix race in GWS queue scheduling",
                            "    - drm/bridge: cdns-dsi: Fix the clock variable for mode_valid()",
                            "    - drm/bridge: cdns-dsi: Fix phy de-init and flag it so",
                            "    - drm/bridge: cdns-dsi: Fix connecting to next bridge",
                            "    - drm/bridge: cdns-dsi: Check return value when getting default PHY config",
                            "    - drm/bridge: cdns-dsi: Wait for Clk and Data Lanes to be ready",
                            "    - drm/amdgpu: amdgpu_vram_mgr_new(): Clamp lpfn to total vram",
                            "    - drm/amdgpu: Add kicker device detection",
                            "    - drm/amdgpu: switch job hw_fence to amdgpu_fence",
                            "    - ksmbd: Use unsafe_memcpy() for ntlm_negotiate",
                            "    - ksmbd: remove unsafe_memcpy use in session setup",
                            "    - media: uvcvideo: Rollback non processed entities on error",
                            "    - firmware: arm_scmi: Add a common helper to check if a message is",
                            "      supported",
                            "    - firmware: arm_scmi: Ensure that the message-id supports fastchannel",
                            "    - ARM: 9354/1: ptrace: Use bitfield helpers",
                            "    - nvme-tcp: fix I/O stalls on congested sockets",
                            "    - drm/amdgpu: seq64 memory unmap uses uninterruptible lock",
                            "    - 8250: microchip: pci1xxxx: Add PCIe Hot reset disable support for Rev C0",
                            "      and later devices",
                            "    - usb: gadget: f_hid: wake up readers on disable/unbind",
                            "    - drm/i915/gem: Allow EXEC_CAPTURE on recoverable contexts on DG1",
                            "    - Revert \"drm/i915/gem: Allow EXEC_CAPTURE on recoverable contexts on DG1\"",
                            "    - btrfs: fix qgroup reservation leak on failure to allocate ordered extent",
                            "    - smb: client: remove \\t from TP_printk statements",
                            "    - fs/proc/task_mmu: fix PAGE_IS_PFNZERO detection for the huge zero folio",
                            "    - drm/xe/display: Add check for alloc_ordered_workqueue()",
                            "    - ethernet: ionic: Fix DMA mapping tests",
                            "    - wifi: mac80211: Add link iteration macro for link data",
                            "    - wifi: mac80211: Create separate links for VLAN interfaces",
                            "    - wifi: mac80211: finish link init before RCU publish",
                            "    - netlink: specs: tc: replace underscores with dashes in names",
                            "    - drm/amdgpu/discovery: optionally use fw based ip discovery",
                            "    - drm/amd: Adjust output for discovery error handling",
                            "    - x86/traps: Initialize DR6 by writing its architectural reset value",
                            "    - serial: core: restore of_node information in sysfs",
                            "    - spi: spi-cadence-quadspi: Fix pm runtime unbalance",
                            "    - mm/gup: revert \"mm: gup: fix infinite loop within __get_longterm_locked\"",
                            "    - scsi: ufs: core: Fix clk scaling to be conditional in reset and restore",
                            "    - drm/amd/display: Correct non-OLED pre_T11_delay.",
                            "    - drm/xe/vm: move rebind_work init earlier",
                            "    - drm/xe/sched: stop re-submitting signalled jobs",
                            "    - drm/xe: Fix memset on iomem",
                            "    - drm/i915/dsi: Fix off by one in BXT_MIPI_TRANS_VTOTAL",
                            "    - drm/amdgpu: Fix SDMA UTC_L1 handling during start/stop sequences",
                            "    - drm/amd/display: Fix mpv playback corruption on weston",
                            "    - x86/fpu: Refactor xfeature bitmask update code for sigframe XSAVE",
                            "    - io_uring: fix potential page leak in io_sqe_buffer_register()",
                            "    - iio: dac: ad3552r: changes to use FIELD_PREP",
                            "    - drm/xe: Carve out wopcm portion from the stolen memory",
                            "    - usb: typec: tcpm: PSSourceOffTimer timeout in PR_Swap enters",
                            "      ERROR_RECOVERY",
                            "    - drm/msm/dp: account for widebus and yuv420 during mode validation",
                            "    - arm64: dts: rockchip: Add avdd HDMI supplies to RockPro64 board dtsi",
                            "    - ALSA: hda/realtek: Bass speaker fixup for ASUS UM5606KA",
                            "    - spi: fsl-qspi: Fix double cleanup in probe error path",
                            "    - Upstream stable to v6.6.96, v6.12.36",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-37842",
                            "    - spi: fsl-qspi: use devm function instead of driver remove",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-23155",
                            "    - net: stmmac: Fix accessing freed irq affinity_hint",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-22101",
                            "    - net: libwx: fix Tx L4 checksum",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38361",
                            "    - drm/amd/display: Check dce_hwseq before dereferencing it",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38364",
                            "    - maple_tree: fix MA_STATE_PREALLOC flag in mas_preallocate()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38246",
                            "    - bnxt: properly flush XDP redirect lists",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38250",
                            "    - Bluetooth: hci_core: Fix use-after-free in vhci_flush()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38253",
                            "    - HID: wacom: fix crash in wacom_aes_battery_handler()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38264",
                            "    - nvme-tcp: sanitize request list handling",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38362",
                            "    - drm/amd/display: Add null pointer check for get_first_active_display()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38354",
                            "    - drm/msm/gpu: Fix crash when throttling GPU immediately during boot",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38363",
                            "    - drm/tegra: Fix a possible null pointer dereference",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38239",
                            "    - scsi: megaraid_sas: Fix invalid node index",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38365",
                            "    - btrfs: fix a race between renames and directory logging",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38244",
                            "    - smb: client: fix potential deadlock when reconnecting channels",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38245",
                            "    - atm: Release atm_dev_mutex after removing procfs in",
                            "      atm_dev_deregister().",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38249",
                            "    - ALSA: usb-audio: Fix out-of-bounds read in",
                            "      snd_usb_get_audioformat_uac3()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38251",
                            "    - atm: clip: prevent NULL deref in clip_push()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38255",
                            "    - lib/group_cpus: fix NULL pointer dereference from group_cpus_evenly()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38257",
                            "    - s390/pkey: Prevent overflow in size calculation for memdup_user()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38258",
                            "    - mm/damon/sysfs-schemes: free old damon_sysfs_scheme_filter->memcg_path",
                            "      on write",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38259",
                            "    - ASoC: codecs: wcd9335: Fix missing free of regulator supplies",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38230",
                            "    - jfs: validate AG parameters in dbMount() to prevent crashes",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38260",
                            "    - btrfs: handle csum tree error with rescue=ibadroots correctly",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38262",
                            "    - tty: serial: uartlite: register uart driver in init",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38368",
                            "    - misc: tps6594-pfsm: Add NULL pointer check in tps6594_pfsm_probe()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38436",
                            "    - drm/scheduler: signal scheduled fence when kill job",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38263",
                            "    - bcache: fix NULL pointer in cache_set_flush()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38369",
                            "    - dmaengine: idxd: Check availability of workqueue allocated by idxd wq",
                            "      driver before using",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-22128",
                            "    - wifi: ath12k: Clear affinity hint before calling ath12k_pci_free_irq()",
                            "      in error path",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38333",
                            "    - f2fs: fix to bail out in get_new_segment()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38210",
                            "    - configfs-tsm-report: Fix NULL dereference of tsm_ops",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38232",
                            "    - NFSD: fix race between nfsd registration and exports_proc",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38320",
                            "    - arm64/ptrace: Fix stack-out-of-bounds read in",
                            "      regs_get_kernel_stack_nth()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38424",
                            "    - perf: Fix sample vs do_exit()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38321",
                            "    - smb: Log an error when close_all_cached_dirs fails",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38180",
                            "    - net: atm: fix /proc/net/atm/lec handling",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38323",
                            "    - net: atm: add lec_mutex",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38181",
                            "    - calipso: Fix null-ptr-deref in calipso_req_{set,del}attr().",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38182",
                            "    - ublk: santizize the arguments from userspace when adding a device",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38183",
                            "    - net: lan743x: fix potential out-of-bounds write in",
                            "      lan743x_ptp_io_event_clock_get()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38184",
                            "    - tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38185",
                            "    - atm: atmtcp: Free invalid length skb in atmtcp_c_send().",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38324",
                            "    - mpls: Use rcu_dereference_rtnl() in mpls_route_input_rcu().",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38420",
                            "    - wifi: carl9170: do not ping device which has failed to load firmware",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38326",
                            "    - aoe: clean device rq_list in aoedev_downdev()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38089",
                            "    - sunrpc: handle SVC_GARBAGE during svc auth processing as auth error",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38084",
                            "    - mm/hugetlb: unshare page tables during VMA split, not before",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38190",
                            "    - atm: Revert atm_account_tx() if copy_from_iter_full() fails.",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38191",
                            "    - ksmbd: fix null pointer dereference in destroy_previous_session",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38192",
                            "    - net: clear the dst when changing skb protocol",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38193",
                            "    - net_sched: sch_sfq: reject invalid perturb period",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38328",
                            "    - jffs2: check jffs2_prealloc_raw_node_refs() result in few other places",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38194",
                            "    - jffs2: check that raw node were preallocated before writing summary",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38090",
                            "    - drivers/rapidio/rio_cm.c: prevent possible heap overwrite",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38197",
                            "    - platform/x86: dell_rbu: Fix list usage",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38198",
                            "    - fbcon: Make sure modelist not set on unregistered console",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38331",
                            "    - net: ethernet: cortina: Use TOE/TSO on all TCP",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38200",
                            "    - i40e: fix MMIO write access to an invalid page in i40e_clear_hw",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38332",
                            "    - scsi: lpfc: Use memcpy() for BIOS version",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38342",
                            "    - software node: Correct a OOB check in software_node_get_reference_args()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38334",
                            "    - x86/sgx: Prevent attempts to reclaim poisoned pages",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38425",
                            "    - i2c: tegra: check msg length in SMBUS block read",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38343",
                            "    - wifi: mt76: mt7996: drop fragments with multicast or broadcast RA",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38202",
                            "    - bpf: Check rcu_read_lock_trace_held() in bpf_map_lookup_percpu_elem()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38422",
                            "    - net: lan743x: Modify the EEPROM and OTP size for PCI1xxxx devices",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38344",
                            "    - ACPICA: fix acpi parse and parseext cache leaks",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38345",
                            "    - ACPICA: fix acpi operand cache leak in dswstate.c",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38085",
                            "    - mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38208",
                            "    - smb: client: add NULL check in automount_fullpath",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38418",
                            "    - remoteproc: core: Release rproc->clean_table after rproc_attach() fails",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38419",
                            "    - remoteproc: core: Cleanup acquired resources when",
                            "      rproc_handle_resources() fails in rproc_attach()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38427",
                            "    - video: screen_info: Relocate framebuffers behind PCI bridges",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38086",
                            "    - net: ch9200: fix uninitialised access during mii_nway_restart",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38346",
                            "    - ftrace: Fix UAF when lookup kallsym after ftrace disabled",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38211",
                            "    - RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38212",
                            "    - ipc: fix to protect IPCS lookups using RCU",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38214",
                            "    - fbdev: Fix fb_set_var to prevent null-ptr-deref in fb_videomode_to_var",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38215",
                            "    - fbdev: Fix do_register_framebuffer to prevent null-ptr-deref in",
                            "      fb_videomode_to_var",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38087",
                            "    - net/sched: fix use-after-free in taprio_dev_notifier",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38416",
                            "    - NFC: nci: uart: Set tty->disc_data only in success path",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38217",
                            "    - hwmon: (ftsteutates) Fix TOCTOU race in fts_read()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38218",
                            "    - f2fs: fix to do sanity check on sit_bitmap_size",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38219",
                            "    - f2fs: prevent kernel warning due to negative i_nlink from corrupted",
                            "      image",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38347",
                            "    - f2fs: fix to do sanity check on ino and xnid",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38428",
                            "    - Input: ims-pcu - check record size in ims_pcu_flash_firmware()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38220",
                            "    - ext4: only dirty folios when data journaling regular files",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38222",
                            "    - ext4: inline: fix len overflow in ext4_prepare_inline_data",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38336",
                            "    - ata: pata_via: Force PIO for ATAPI devices on VT6415/VT6330",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38429",
                            "    - bus: mhi: ep: Update read pointer only after buffer is written",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38225",
                            "    - media: imx-jpeg: Cleanup after an allocation error",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38226",
                            "    - media: vivid: Change the siize of the composing",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38229",
                            "    - media: cxusb: no longer judge rbuf when the write fails",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38337",
                            "    - jbd2: fix data-race and null-ptr-deref in jbd2_journal_dirty_metadata()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38338",
                            "    - fs/nfs/read: fix double-unlock bug in nfs_return_empty_folio()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38231",
                            "    - nfsd: Initialize ssc before laundromat_work to prevent NULL dereference",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38430",
                            "    - nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38348",
                            "    - wifi: p54: prevent buffer-overflow in p54_rx_eeprom_readback()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786)",
                            "    - tracing: Fix compilation warning on arm32",
                            "    - pinctrl: armada-37xx: use correct OUTPUT_VAL register for GPIOs > 31",
                            "    - pinctrl: armada-37xx: set GPIO output value before setting direction",
                            "    - acpi-cpufreq: Fix nominal_freq units to KHz in get_max_boost_ratio()",
                            "    - rtc: Make rtc_time64_to_tm() support dates before 1970",
                            "    - rtc: Fix offset calculation for .start_secs < 0",
                            "    - usb: quirks: Add NO_LPM quirk for SanDisk Extreme 55AE",
                            "    - usb: storage: Ignore UAS driver for SanDisk 3.2 Gen2 storage device",
                            "    - USB: serial: pl2303: add new chip PL2303GC-Q20 and PL2303GT-2AB",
                            "    - usb: typec: ucsi: fix Clang -Wsign-conversion warning",
                            "    - Bluetooth: hci_qca: move the SoC type check to the right place",
                            "    - usb: usbtmc: Fix timeout value in get_stb",
                            "    - dt-bindings: usb: cypress,hx3: Add support for all variants",
                            "    - dt-bindings: phy: imx8mq-usb: fix fsl,phy-tx-vboost-level-microvolt",
                            "      property",
                            "    - tools/x86/kcpuid: Fix error handling",
                            "    - x86/idle: Remove MFENCEs for X86_BUG_CLFLUSH_MONITOR in",
                            "      mwait_idle_with_hints() and prefer_mwait_c1_over_halt()",
                            "    - crypto: sun8i-ce-hash - fix error handling in sun8i_ce_hash_run()",
                            "    - gfs2: gfs2_create_inode error handling fix",
                            "    - perf/core: Fix broken throttling when max_samples_per_tick=1",
                            "    - crypto: sun8i-ss - do not use sg_dma_len before calling DMA functions",
                            "    - powerpc: do not build ppc_save_regs.o always",
                            "    - powerpc/crash: Fix non-smp kexec preparation",
                            "    - x86/microcode/AMD: Do not return error when microcode update is not",
                            "      necessary",
                            "    - x86/cpu: Sanitize CPUID(0x80000000) output",
                            "    - crypto: marvell/cesa - Avoid empty transfer descriptor",
                            "    - btrfs: scrub: update device stats when an error is detected",
                            "    - btrfs: scrub: fix a wrong error type when metadata bytenr mismatches",
                            "    - rcu/cpu_stall_cputime: fix the hardirq count for x86 architecture",
                            "    - crypto: lrw - Only add ecb if it is not already there",
                            "    - crypto: xts - Only add ecb if it is not already there",
                            "    - crypto: sun8i-ce - move fallback ahash_request to the end of the struct",
                            "    - kunit: Fix wrong parameter to kunit_deactivate_static_stub()",
                            "    - ACPICA: exserial: don't forget to handle FFixedHW opregions for reading",
                            "    - ASoC: tas2764: Enable main IRQs",
                            "    - EDAC/{skx_common,i10nm}: Fix the loss of saved RRL for HBM pseudo",
                            "      channel 0",
                            "    - spi: tegra210-quad: Fix X1_X2_X4 encoding and support x4 transfers",
                            "    - spi: tegra210-quad: remove redundant error handling code",
                            "    - spi: tegra210-quad: modify chip select (CS) deactivation",
                            "    - power: reset: at91-reset: Optimize at91_reset()",
                            "    - ASoC: SOF: ipc4-pcm: Adjust pipeline_list->pipelines allocation type",
                            "    - PM: wakeup: Delete space in the end of string shown by",
                            "      pm_show_wakelocks()",
                            "    - x86/mtrr: Check if fixed-range MTRRs exist in mtrr_save_fixed_ranges()",
                            "    - PM: sleep: Print PM debug messages during hibernation",
                            "    - ACPI: OSI: Stop advertising support for \"3.0 _SCP Extensions\"",
                            "    - spi: sh-msiof: Fix maximum DMA transfer size",
                            "    - ASoC: apple: mca: Constrain channels according to TDM mask",
                            "    - drm/vmwgfx: Add seqno waiter for sync_files",
                            "    - drm/vc4: tests: Use return instead of assert",
                            "    - media: rkvdec: Fix frame size enumeration",
                            "    - arm64/fpsimd: Avoid RES0 bits in the SME trap handler",
                            "    - arm64/fpsimd: Fix merging of FPSIMD state during signal return",
                            "    - drm/bridge: lt9611uxc: Fix an error handling path in lt9611uxc_probe()",
                            "    - watchdog: exar: Shorten identity name to fit correctly",
                            "    - m68k: mac: Fix macintosh_config for Mac II",
                            "    - firmware: psci: Fix refcount leak in psci_dt_init",
                            "    - arm64: Support ARM64_VA_BITS=52 when setting ARCH_MMAP_RND_BITS_MAX",
                            "    - selftests/seccomp: fix syscall_restart test for arm compat",
                            "    - drm: rcar-du: Fix memory leak in rcar_du_vsps_init()",
                            "    - drm/vkms: Adjust vkms_state->active_planes allocation type",
                            "    - drm/tegra: rgb: Fix the unbound reference count",
                            "    - firmware: SDEI: Allow sdei initialization without ACPI_APEI_GHES",
                            "    - arm64/fpsimd: Do not discard modified SVE state",
                            "    - scsi: qedf: Use designated initializer for struct qed_fcoe_cb_ops",
                            "    - drm/mediatek: mtk_drm_drv: Fix kobject put for mtk_mutex device ptr",
                            "    - drm/mediatek: Fix kobject put for component sub-drivers",
                            "    - drm/mediatek: mtk_drm_drv: Unbind secondary mmsys components on err",
                            "    - xen/x86: fix initial memory balloon target",
                            "    - IB/cm: use rwlock for MAD agent lock",
                            "    - selftests/bpf: Fix bpf_nf selftest failure",
                            "    - bpf, sockmap: fix duplicated data transmission",
                            "    - wifi: ath12k: Fix WMI tag for EHT rate in peer assoc",
                            "    - net: ncsi: Fix GCPS 64-bit member variables",
                            "    - libbpf: Fix buffer overflow in bpf_object__init_prog",
                            "    - xfrm: Use xdo.dev instead of xdo.real_dev",
                            "    - wifi: rtw88: sdio: map mgmt frames to queue TX_DESC_QSEL_MGMT",
                            "    - wifi: rtw88: sdio: call rtw_sdio_indicate_tx_status unconditionally",
                            "    - wifi: rtw88: do not ignore hardware read error during DPK",
                            "    - wifi: ath12k: Add MSDU length validation for TKIP MIC error",
                            "    - RDMA/hns: Include hnae3.h in hns_roce_hw_v2.h",
                            "    - scsi: hisi_sas: Call I_T_nexus after soft reset for SATA disk",
                            "    - libbpf: Remove sample_period init in perf_buffer",
                            "    - Use thread-safe function pointer in libbpf_print",
                            "    - iommu: Protect against overflow in iommu_pgsize()",
                            "    - bonding: assign random address if device address is same as bond",
                            "    - f2fs: clean up w/ fscrypt_is_bounce_page()",
                            "    - f2fs: fix to detect gcing page in f2fs_is_cp_guaranteed()",
                            "    - libbpf: Use proper errno value in linker",
                            "    - bpf: Allow XDP dev-bound programs to perform XDP_REDIRECT into maps",
                            "    - netfilter: bridge: Move specific fragmented packet to slow_path instead",
                            "      of dropping it",
                            "    - netfilter: nft_quota: match correctly when the quota just depleted",
                            "    - bpf: Fix uninitialized values in BPF_{CORE,PROBE}_READ",
                            "    - tracing: Move histogram trigger variables from stack to per CPU",
                            "      structure",
                            "    - clk: qcom: camcc-sm6350: Add *_wait_val values for GDSCs",
                            "    - clk: qcom: dispcc-sm6350: Add *_wait_val values for GDSCs",
                            "    - clk: qcom: gcc-sm6350: Add *_wait_val values for GDSCs",
                            "    - clk: qcom: gpucc-sm6350: Add *_wait_val values for GDSCs",
                            "    - efi/libstub: Describe missing 'out' parameter in efi_load_initrd",
                            "    - tracing: Rename event_trigger_alloc() to trigger_data_alloc()",
                            "    - tracing: Fix error handling in event_trigger_parse()",
                            "    - ktls, sockmap: Fix missing uncharge operation",
                            "    - libbpf: Use proper errno value in nlattr",
                            "    - clk: qcom: gcc-msm8939: Fix mclk0 & mclk1 for 24 MHz",
                            "    - s390/bpf: Store backchain even for leaf progs",
                            "    - iommu: remove duplicate selection of DMAR_TABLE",
                            "    - hisi_acc_vfio_pci: add eq and aeq interruption restore",
                            "    - scsi: ufs: mcq: Delete ufshcd_release_scsi_cmd() in ufshcd_mcq_abort()",
                            "    - wifi: mt76: mt7996: set EHT max ampdu length capability",
                            "    - wifi: mt76: mt7996: fix RX buffer size of MCU event",
                            "    - netfilter: nf_tables: nft_fib_ipv6: fix VRF ipv4/ipv6 result discrepancy",
                            "    - vfio/type1: Fix error unwind in migration dirty bitmap allocation",
                            "    - Bluetooth: MGMT: iterate over mesh commands in mgmt_mesh_foreach()",
                            "    - netfilter: nft_tunnel: fix geneve_opt dump",
                            "    - RISC-V: KVM: lock the correct mp_state during reset",
                            "    - RDMA/cma: Fix hang when cma_netevent_callback fails to queue_work",
                            "    - net: lan966x: Fix 1-step timestamping over ipv4 or ipv6",
                            "    - net: phy: fix up const issues in to_mdio_device() and to_phy_device()",
                            "    - net: lan743x: rename lan743x_reset_phy to lan743x_hw_reset_phy",
                            "    - net: phy: mscc: Stop clearing the the UDPv4 checksum for L2 frames",
                            "    - f2fs: use d_inode(dentry) cleanup dentry->d_inode",
                            "    - f2fs: fix to correct check conditions in f2fs_cross_rename",
                            "    - arm64: dts: qcom: sdm845-starqltechn: remove wifi",
                            "    - arm64: dts: qcom: sdm845-starqltechn: fix usb regulator mistake",
                            "    - arm64: dts: qcom: sdm845-starqltechn: refactor node order",
                            "    - arm64: dts: qcom: sdm845-starqltechn: remove excess reserved gpios",
                            "    - arm64: dts: qcom: sm8350: Reenable crypto & cryptobam",
                            "    - arm64: dts: qcom: sm8250: Fix CPU7 opp table",
                            "    - arm64: dts: qcom: sc8280xp-x13s: Drop duplicate DMIC supplies",
                            "    - ARM: dts: at91: usb_a9263: fix GPIO for Dataflash chip select",
                            "    - ARM: dts: at91: at91sam9263: fix NAND chip selects",
                            "    - arm64: dts: mediatek: mt8195: Reparent vdec1/2 and venc1 power domains",
                            "    - arm64: dts: qcom: sdm660-xiaomi-lavender: Add missing SD card detect",
                            "      GPIO",
                            "    - arm64: dts: imx8mm-beacon: Fix RTC capacitive load",
                            "    - arm64: dts: imx8mn-beacon: Fix RTC capacitive load",
                            "    - arm64: dts: imx8mp-beacon: Fix RTC capacitive load",
                            "    - arm64: dts: imx8mm-beacon: Set SAI5 MCLK direction to output for HDMI",
                            "      audio",
                            "    - arm64: dts: imx8mn-beacon: Set SAI5 MCLK direction to output for HDMI",
                            "      audio",
                            "    - arm64: dts: mediatek: mt6357: Drop regulator-fixed compatibles",
                            "    - arm64: dts: mt6359: Add missing 'compatible' property to regulators node",
                            "    - arm64: dts: qcom: sdm660-lavender: Add missing USB phy supply",
                            "    - arm64: dts: qcom: sda660-ifc6560: Fix dt-validate warning",
                            "    - arm64: dts: rockchip: Update eMMC for NanoPi R5 series",
                            "    - arm64: tegra: Drop remaining serial clock-names and reset-names",
                            "    - arm64: dts: ti: k3-j721e-common-proc-board: Enable OSPI1 on J721E",
                            "    - ocfs2: fix possible memory leak in ocfs2_finish_quota_recovery",
                            "    - nilfs2: add pointer check for nilfs_direct_propagate()",
                            "    - nilfs2: do not propagate ENOENT error from nilfs_btree_propagate()",
                            "    - dt-bindings: vendor-prefixes: Add Liontron name",
                            "    - ARM: dts: qcom: apq8064: add missing clocks to the timer node",
                            "    - ARM: dts: qcom: apq8064 merge hw splinlock into corresponding syscon",
                            "      device",
                            "    - arm64: defconfig: mediatek: enable PHY drivers",
                            "    - arm64: dts: rockchip: disable unrouted USB controllers and PHY on RK3399",
                            "      Puma with Haikou",
                            "    - arm64: dts: renesas: white-hawk-ard-audio: Fix TPU0 groups",
                            "    - arm64: dts: mt6359: Rename RTC node to match binding expectations",
                            "    - ARM: aspeed: Don't select SRAM",
                            "    - soc: aspeed: lpc: Fix impossible judgment condition",
                            "    - randstruct: gcc-plugin: Remove bogus void member",
                            "    - randstruct: gcc-plugin: Fix attribute addition",
                            "    - perf build: Warn when libdebuginfod devel files are not available",
                            "    - perf ui browser hists: Set actions->thread before calling",
                            "      do_zoom_thread()",
                            "    - dm: don't change md if dm_table_set_restrictions() fails",
                            "    - dm: free table mempools if not used in __bind",
                            "    - dm-flakey: error all IOs when num_features is absent",
                            "    - dm-flakey: make corrupting read bios work",
                            "    - perf trace: Fix leaks of 'struct thread' in set_filter_loop_pids()",
                            "    - perf intel-pt: Fix PEBS-via-PT data_src",
                            "    - perf scripts python: exported-sql-viewer.py: Fix pattern matching with",
                            "      Python 3",
                            "    - remoteproc: qcom_wcnss_iris: Add missing put_device() on error in probe",
                            "    - remoteproc: k3-r5: Drop check performed in",
                            "      k3_r5_rproc_{mbox_callback/kick}",
                            "    - rpmsg: qcom_smd: Fix uninitialized return variable in __qcom_smd_send()",
                            "    - mfd: exynos-lpass: Avoid calling exynos_lpass_disable() twice in",
                            "      exynos_lpass_remove()",
                            "    - mfd: stmpe-spi: Correct the name used in MODULE_DEVICE_TABLE",
                            "    - perf tests switch-tracking: Fix timestamp comparison",
                            "    - perf record: Fix incorrect --user-regs comments",
                            "    - perf trace: Always print return value for syscalls returning a pid",
                            "    - nfs: clear SB_RDONLY before getting superblock",
                            "    - nfs: ignore SB_RDONLY when remounting nfs",
                            "    - cifs: Fix validation of SMB1 query reparse point response",
                            "    - rtc: sh: assign correct interrupts with DT",
                            "    - PCI: Print the actual delay time in pci_bridge_wait_for_secondary_bus()",
                            "    - PCI: cadence: Fix runtime atomic count underflow",
                            "    - PCI: apple: Use gpiod_set_value_cansleep in probe flow",
                            "    - PCI/DPC: Initialize aer_err_info before using it",
                            "    - rtc: loongson: Add missing alarm notifications for ACPI RTC events",
                            "    - thunderbolt: Fix a logic error in wake on connect",
                            "    - iio: filter: admv8818: fix band 4, state 15",
                            "    - iio: filter: admv8818: fix integer overflow",
                            "    - iio: filter: admv8818: fix range calculation",
                            "    - iio: filter: admv8818: Support frequencies >= 2^32",
                            "    - iio: adc: ad7124: Fix 3dB filter frequency reading",
                            "    - MIPS: Loongson64: Add missing '#interrupt-cells' for loongson64c_ls7a",
                            "    - counter: interrupt-cnt: Protect enable/disable OPs with mutex",
                            "    - vt: remove VT_RESIZE and VT_RESIZEX from vt_compat_ioctl()",
                            "    - net: stmmac: platform: guarantee uniqueness of bus_id",
                            "    - gve: Fix RX_BUFFERS_POSTED stat to report per-queue fill_cnt",
                            "    - net: tipc: fix refcount warning in tipc_aead_encrypt",
                            "    - driver: net: ethernet: mtk_star_emac: fix suspend/resume issue",
                            "    - net/mlx4_en: Prevent potential integer overflow calculating Hz",
                            "    - net: lan966x: Make sure to insert the vlan tags also in host mode",
                            "    - spi: bcm63xx-spi: fix shared reset",
                            "    - spi: bcm63xx-hsspi: fix shared reset",
                            "    - Bluetooth: L2CAP: Fix not responding with L2CAP_CR_LE_ENCRYPTION",
                            "    - ice: create new Tx scheduler nodes for new queues only",
                            "    - ice: fix rebuilding the Tx scheduler tree for large queue counts",
                            "    - net: dsa: tag_brcm: legacy: fix pskb_may_pull length",
                            "    - vmxnet3: correctly report gso type for UDP tunnels",
                            "    - PM: sleep: Fix power.is_suspended cleanup for direct-complete devices",
                            "    - netfilter: nf_nat: also check reverse tuple to obtain clashing entry",
                            "    - net: dsa: b53: do not enable RGMII delay on bcm63xx",
                            "    - net: dsa: b53: allow RGMII for bcm63xx RGMII ports",
                            "    - wireguard: device: enable threaded NAPI",
                            "    - scsi: ufs: qcom: Prevent calling phy_exit() before phy_init()",
                            "    - ASoC: codecs: hda: Fix RPM usage count underflow",
                            "    - ASoC: Intel: avs: Fix deadlock when the failing IPC is SET_D0IX",
                            "    - ASoC: ti: omap-hdmi: Re-add dai_link->platform to fix card init",
                            "    - path_overmount(): avoid false negatives",
                            "    - fix propagation graph breakage by MOVE_MOUNT_SET_GROUP move_mount(2)",
                            "    - Input: synaptics-rmi - fix crash with unsupported versions of F34",
                            "    - arm64: dts: ti: k3-j721e-sk: Add DT nodes for power regulators",
                            "    - serial: sh-sci: Move runtime PM enable to sci_probe_single()",
                            "    - serial: sh-sci: Clean sci_ports[0] after at earlycon exit",
                            "    - Bluetooth: hci_core: fix list_for_each_entry_rcu usage",
                            "    - Bluetooth: MGMT: Remove unused mgmt_pending_find_data",
                            "    - ath10k: snoc: fix unbalanced IRQ enable in crash recovery",
                            "    - wifi: ath11k: fix soc_dp_stats debugfs file permission",
                            "    - wifi: ath11k: convert timeouts to secs_to_jiffies()",
                            "    - wifi: ath11k: avoid burning CPU in ath11k_debugfs_fw_stats_request()",
                            "    - wifi: ath11k: don't use static variables in",
                            "      ath11k_debugfs_fw_stats_process()",
                            "    - wifi: ath11k: don't wait when there is no vdev started",
                            "    - wifi: ath11k: validate ath11k_crypto_mode on top of",
                            "      ath11k_core_qmi_firmware_ready",
                            "    - regulator: max20086: Fix refcount leak in max20086_parse_regulators_dt()",
                            "    - pinctrl: qcom: pinctrl-qcm2290: Add missing pins",
                            "    - scsi: iscsi: Fix incorrect error path labels for flashnode operations",
                            "    - powerpc/vas: Return -EINVAL if the offset is non-zero in mmap()",
                            "    - drm/meson: use unsigned long long / Hz for frequency types",
                            "    - drm/meson: fix debug log statement when setting the HDMI clocks",
                            "    - drm/meson: use vclk_freq instead of pixel_freq in debug print",
                            "    - drm/meson: fix more rounding issues with 59.94Hz modes",
                            "    - i40e: return false from i40e_reset_vf if reset is in progress",
                            "    - i40e: retry VFLR handling if there is ongoing VF reset",
                            "    - macsec: MACsec SCI assignment for ES = 0",
                            "    - Bluetooth: hci_sync: Fix broadcast/PA when using an existing instance",
                            "    - net/mlx5: Ensure fw pages are always allocated on same NUMA",
                            "    - net/mlx5: Fix return value when searching for existing flow group",
                            "    - net/mlx5e: Fix leak of Geneve TLV option object",
                            "    - net_sched: tbf: fix a race in tbf_change()",
                            "    - fs/filesystems: Fix potential unsigned integer underflow in fs_name()",
                            "    - nvmet-fcloop: access fcpreq only when holding reqlock",
                            "    - perf: Ensure bpf_perf_link path is properly serialized",
                            "    - bio: Fix bio_first_folio() for SPARSEMEM without VMEMMAP",
                            "    - block: Fix bvec_set_folio() for very large folios",
                            "    - tools/resolve_btfids: Fix build when cross compiling kernel with clang.",
                            "    - ALSA: usb-audio: Add implicit feedback quirk for RODE AI-1",
                            "    - io_uring: expand main struct io_kiocb flags to 64-bits",
                            "    - io_uring: add io_file_can_poll() helper",
                            "    - io_uring/rw: allow pollable non-blocking attempts for !FMODE_NOWAIT",
                            "    - io_uring/rw: fix wrong NOWAIT check in io_rw_init_file()",
                            "    - usb: usbtmc: Fix read_stb function and get_stb ioctl",
                            "    - usb: cdnsp: Fix issue with detecting command completion event",
                            "    - usb: cdnsp: Fix issue with detecting USB 3.2 speed",
                            "    - usb: Flush altsetting 0 endpoints before reinitializating them after",
                            "      reset.",
                            "    - usb: typec: tcpm/tcpci_maxim: Fix bounds check in process_rx()",
                            "    - xen/arm: call uaccess_ttbr0_enable for dm_op hypercall",
                            "    - calipso: unlock rcu before returning -EAFNOSUPPORT",
                            "    - regulator: dt-bindings: mt6357: Drop fixed compatible requirement",
                            "    - net: usb: aqc111: debug info before sanitation",
                            "    - drm/meson: Use 1000ULL when operating with mode->clock",
                            "    - Documentation: ACPI: Use all-string data node references",
                            "    - PCI/ASPM: Consolidate link state defines",
                            "    - PCI/ASPM: Disable L1 before disabling L1 PM Substates",
                            "    - perf/x86/amd/uncore: Remove unused 'struct amd_uncore_ctx::node' member",
                            "    - perf/x86/amd/uncore: Prevent UMC counters from saturating",
                            "    - crypto: sun8i-ce - undo runtime PM changes during driver removal",
                            "    - erofs: fix file handle encoding for 64-bit NIDs",
                            "    - btrfs: fix invalid data space release when truncating block in NOCOW",
                            "      mode",
                            "    - ACPI: resource: fix a typo for MECHREVO in",
                            "      irq1_edge_low_force_override[]",
                            "    - thermal/drivers/mediatek/lvts: Fix debugfs unregister on failure",
                            "    - drm/vmwgfx: Add error path for xa_store in vmw_bo_add_detached_resource",
                            "    - drm/vmwgfx: Fix dumb buffer leak",
                            "    - drm/xe/d3cold: Set power state to D3Cold during s2idle/s3",
                            "    - drm/panel: samsung-sofef00: Drop s6e3fc2x01 support",
                            "    - kunit/usercopy: Disable u64 test on 32-bit SPARC",
                            "    - drm/msm/dpu: enable SmartDMA on SM8150",
                            "    - drm/msm/dpu: enable SmartDMA on SC8180X",
                            "    - overflow: Fix direct struct member initialization in _DEFINE_FLEX()",
                            "    - drm/msm/a6xx: Disable rgb565_predicator on Adreno 7c3",
                            "    - media: verisilicon: Free post processor buffers on error",
                            "    - wifi: ath12k: Fix memory leak during vdev_id mismatch",
                            "    - wifi: ath12k: Fix invalid memory access while forming 802.11 header",
                            "    - bpf: Check link_create.flags parameter for multi_kprobe",
                            "    - wifi: ath12k: fix cleanup path after mhi init",
                            "    - f2fs: clean up unnecessary indentation",
                            "    - f2fs: prevent the current section from being selected as a victim during",
                            "      GC",
                            "    - net/mlx5: Avoid using xso.real_dev unnecessarily",
                            "    - wifi: ath12k: Fix the QoS control field offset to build QoS header",
                            "    - libbpf: Fix event name too long error",
                            "    - wifi: iwlfiwi: mvm: Fix the rate reporting",
                            "    - selftests/bpf: Fix caps for __xlated/jited_unpriv",
                            "    - wifi: rtw89: pci: enlarge retry times of RX tag to 1000",
                            "    - wifi: mt76: mt7925: prevent multiple scan commands",
                            "    - wifi: mt76: mt7925: refine the sniffer commnad",
                            "    - wifi: mt76: mt7925: ensure all MCU commands wait for response",
                            "    - netfilter: nf_tables: nft_fib: consistent l3mdev handling",
                            "    - vsock/virtio: fix `rx_bytes` accounting for stream sockets",
                            "    - net: xilinx: axienet: Fix Tx skb circular buffer occupancy check in",
                            "      dmaengine xmit",
                            "    - net: lan743x: Fix PHY reset handling during initialization and WOL",
                            "    - octeontx2-af: Sync NIX and NPA contexts from NDC to LLC/DRAM",
                            "    - octeontx2-pf: QOS: Perform cache sync on send queue teardown",
                            "    - arm64: dts: qcom: sm8650: add missing cpu-cfg interconnect path in the",
                            "      mdss node",
                            "    - arm64: dts: qcom: ipq9574: Fix USB vdd info",
                            "    - arm64: dts: rockchip: Move SHMEM memory to reserved memory on rk3588",
                            "    - arm64: dts: mediatek: mt8183-kukui-jacuzzi: Simplify DSI endpoint",
                            "      replacement",
                            "    - arm64: dts: mt8183: Add port node to mt8183.dtsi",
                            "    - soc: qcom: smp2p: Fix fallback to qcom,ipc parse",
                            "    - ARM: dts: qcom: apq8064: move replicator out of soc node",
                            "    - arm64: dts: qcom: qcm2290: fix (some) of QUP interconnects",
                            "    - perf symbol-minimal: Fix double free in filename__read_build_id",
                            "    - mfd: exynos-lpass: Fix an error handling path in exynos_lpass_probe()",
                            "    - mailbox: imx: Fix TXDB_V2 sending",
                            "    - mailbox: mtk-cmdq: Refine GCE_GCTL_VALUE setting",
                            "    - perf symbol: Fix use-after-free in filename__read_build_id",
                            "    - PCI/DPC: Log Error Source ID only when valid",
                            "    - coresight: catu: Introduce refcount and spinlock for enabling/disabling",
                            "    - mei: vsc: Cast tx_buf to (__be32 *) when passed to cpu_to_be32_array()",
                            "    - iio: adc: mcp3911: fix device dependent mappings for conversion result",
                            "      registers",
                            "    - drm/xe: Make xe_gt_freq part of the Documentation",
                            "    - Fix sock_exceed_buf_limit not being triggered in",
                            "      __sk_mem_raise_allocated",
                            "    - idpf: fix netdev Tx queue stop/wake",
                            "    - idpf: fix a race in txq wakeup",
                            "    - nvme: fix command limits status code",
                            "    - drm/panel-simple: fix the warnings for the Evervision VGG644804",
                            "    - net: ti: icssg-prueth: Fix swapped TX stats for MII interfaces.",
                            "    - net: dsa: b53: Introduce b53_adjust_531x5_rgmii()",
                            "    - net: dsa: b53: do not touch DLL_IQQD on bcm53115",
                            "    - ALSA: hda/realtek: fix micmute LEDs on HP Laptops with ALC3315",
                            "    - ALSA: hda/realtek: fix micmute LEDs on HP Laptops with ALC3247",
                            "    - ALSA: hda/realtek: Add support for various HP Laptops using CS35L41 HDA",
                            "    - ALSA: hda/realtek - Support mute led function for HP platform",
                            "    - ALSA: hda/realtek - Add new HP ZBook laptop with micmute led fixup",
                            "    - ALSA: hda/realtek: Add support for HP Agusta using CS35L41 HDA",
                            "    - dt-bindings: pinctrl: samsung: google,gs101-pinctrl needs a clock",
                            "    - pinctrl: samsung: support a bus clock",
                            "    - pinctrl: samsung: refactor drvdata suspend & resume callbacks",
                            "    - pinctrl: samsung: add dedicated SoC eint suspend/resume callbacks",
                            "    - pinctrl: samsung: add gs101 specific eint suspend/resume callbacks",
                            "    - net: dsa: b53: fix untagged traffic sent via cpu tagged with VID 0",
                            "    - wifi: ath11k: move some firmware stats related functions outside of",
                            "      debugfs",
                            "    - wifi: ath12k: refactor ath12k_hw_regs structure",
                            "    - gfs2: pass through holder from the VFS for freeze/thaw",
                            "    - btrfs: exit after state split error at set_extent_bit()",
                            "    - block: use q->elevator with ->elevator_lock held in elv_iosched_show()",
                            "    - 9p: Add a migrate_folio method",
                            "    - overflow: Introduce __DEFINE_FLEX for having no initializer",
                            "    - thermal/drivers/mediatek/lvts: Remove unused lvts_debugfs_exit",
                            "    - Upstream stable to v6.6.94, v6.12.33, v6.12.34",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38101",
                            "    - ring-buffer: Fix buffer locking in ring_buffer_subbuf_order_set()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38269",
                            "    - btrfs: exit after state insertion failure at btrfs_convert_extent_bit()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38303",
                            "    - Bluetooth: eir: Fix possible crashes on eir_create_adv_data",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38414",
                            "    - wifi: ath12k: fix GCC_GCC_PCIE_HOT_RST definition for WCN7850",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38125",
                            "    - net: stmmac: make sure that ptp_rate is not 0 before configuring EST",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38129",
                            "    - page_pool: Fix use-after-free in page_pool_recycle_in_ring",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38156",
                            "    - wifi: mt76: mt7996: Fix null-ptr-deref in mt7996_mmio_wed_init()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38162",
                            "    - netfilter: nft_set_pipapo: prevent overflow in lookup table allocation",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38292",
                            "    - wifi: ath12k: fix invalid access to memory",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38164",
                            "    - f2fs: zone: fix to avoid inconsistence in between SIT and SSA",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38169",
                            "    - arm64/fpsimd: Avoid clobbering kernel FPSIMD state with SMSTOP",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38299",
                            "    - ASoC: mediatek: mt8195: Set ETDM1/2 IN/OUT to COMP_DUMMY()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38100",
                            "    - x86/iopl: Cure TIF_IO_BITMAP inconsistencies",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38102",
                            "    - VMCI: fix race between vmci_host_setup_notify and vmci_ctx_unset_notify",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38103",
                            "    - HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38107",
                            "    - net_sched: ets: fix a race in ets_qdisc_change()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38108",
                            "    - net_sched: red: fix a race in __red_change()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38109",
                            "    - net/mlx5: Fix ECVF vports unload on shutdown flow",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38304",
                            "    - Bluetooth: Fix NULL pointer deference on eir_get_service_data",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38110",
                            "    - net/mdiobus: Fix potential out-of-bounds clause 45 read/write access",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38111",
                            "    - net/mdiobus: Fix potential out-of-bounds read/write access",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38112",
                            "    - net: Fix TOCTOU issue in sk_is_readable()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38113",
                            "    - ACPI: CPPC: Fix NULL pointer dereference when nosmp is used",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38088",
                            "    - powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38115",
                            "    - net_sched: sch_sfq: fix a potential crash on gso_skb handling",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38305",
                            "    - ptp: remove ptp->n_vclocks check logic in ptp_vclock_in_use()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38117",
                            "    - Bluetooth: MGMT: Protect mgmt_pending list with its own lock",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38119",
                            "    - scsi: core: ufs: Fix a hang in the error handler",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38307",
                            "    - ASoC: Intel: avs: Verify content returned by parse_int_array()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38310",
                            "    - seg6: Fix validation of nexthop addresses",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38120",
                            "    - netfilter: nf_set_pipapo_avx2: fix initial map fill",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38122",
                            "    - gve: add missing NULL check for gve_alloc_pending_packet() in TX DQO",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38123",
                            "    - net: wwan: t7xx: Fix napi rx poll issue",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38124",
                            "    - net: fix udp gso skb_segment after pull from frag_list",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38126",
                            "    - net: stmmac: make sure that ptp_rate is not 0 before configuring",
                            "      timestamping",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38127",
                            "    - ice: fix Tx scheduler error handling in XDP callback",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38131",
                            "    - coresight: prevent deactivate active config while enabling the config",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38274",
                            "    - fpga: fix potential null pointer deref in fpga_mgr_test_img_load_sgt()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38135",
                            "    - serial: Fix potential null-ptr-deref in mlb_usio_probe()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38136",
                            "    - usb: renesas_usbhs: Reorder clock handling and power management in probe",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38138",
                            "    - dmaengine: ti: Add NULL check in udma_probe()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38275",
                            "    - phy: qcom-qmp-usb: Fix an NULL vs IS_ERR() bug",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38142",
                            "    - hwmon: (asus-ec-sensors) check sensor index in read_string()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38277",
                            "    - mtd: nand: ecc-mxic: Fix use of uninitialized variable ret",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38143",
                            "    - backlight: pm8941: Add NULL check in wled_configure()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38312",
                            "    - fbdev: core: fbcvt: avoid division by 0 in fb_cvt_hperiod()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38145",
                            "    - soc: aspeed: Add NULL check in aspeed_lpc_enable_snoop()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38313",
                            "    - bus: fsl-mc: fix double-free on mc_dev",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38415",
                            "    - Squashfs: check return result of sb_min_blocksize",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38146",
                            "    - net: openvswitch: Fix the dead loop of MPLS parse",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38147",
                            "    - calipso: Don't call calipso functions for AF_INET sk.",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38278",
                            "    - octeontx2-pf: QOS: Refactor TC_HTB_LEAF_DEL_LAST callback",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38148",
                            "    - net: phy: mscc: Fix memory leak when using one step timestamping",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38149",
                            "    - net: phy: clear phydev->devlink when the link is deleted",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38280",
                            "    - bpf: Avoid __bpf_prog_ret0_warn when jit fails",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38153",
                            "    - net: usb: aqc111: fix error handling of usbnet read calls",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38154",
                            "    - bpf, sockmap: Avoid using sk_socket after free when sending",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38155",
                            "    - wifi: mt76: mt7915: Fix null-ptr-deref in mt7915_mmio_wed_init()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38282",
                            "    - kernfs: Relax constraint in draining guard",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38157",
                            "    - wifi: ath9k_htc: Abort software beacon handling if disabled",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38283",
                            "    - hisi_acc_vfio_pci: bugfix live migration function without VF device",
                            "      driver",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38158",
                            "    - hisi_acc_vfio_pci: fix XQE dma address error",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-39890",
                            "    - wifi: ath12k: fix memory leak in ath12k_service_ready_ext_event",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38159",
                            "    - wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38285",
                            "    - bpf: Fix WARN() in get_bpf_raw_tp_regs",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38286",
                            "    - pinctrl: at91: Fix possible out-of-boundary access",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38160",
                            "    - clk: bcm: rpi: Add NULL check in raspberrypi_clk_register()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38161",
                            "    - RDMA/mlx5: Fix error flow upon firmware failure for RQ destruction",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38290",
                            "    - wifi: ath12k: fix node corruption in ar->arvifs list",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38163",
                            "    - f2fs: fix to do sanity check on sbi->total_valid_block_count",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38165",
                            "    - bpf, sockmap: Fix panic when calling skb_linearize",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38166",
                            "    - bpf: fix ktls panic with sockmap",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38293",
                            "    - wifi: ath11k: fix node corruption in ar->arvifs list",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38295",
                            "    - perf/amlogic: Replace smp_processor_id() with raw_smp_processor_id() in",
                            "      meson_ddr_pmu_create()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38167",
                            "    - fs/ntfs3: handle hdr_first_de() return value",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38170",
                            "    - arm64/fpsimd: Discard stale CPU state when handling SME traps",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38319",
                            "    - drm/amd/pp: Fix potential NULL pointer dereference in",
                            "      atomctrl_initialize_mc_reg_table",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38298",
                            "    - EDAC/skx_common: Fix general protection fault",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38173",
                            "    - crypto: marvell/cesa - Handle zero-length skcipher requests",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38300",
                            "    - crypto: sun8i-ce-cipher - fix error handling in",
                            "      sun8i_ce_cipher_prepare()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38174",
                            "    - thunderbolt: Do not double dequeue a configuration request",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38265",
                            "    - serial: jsm: fix NPE during jsm_uart_port_init",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301)",
                            "    - i2c: designware: Uniform initialization flow for polling mode",
                            "    - i2c: designware: Remove ->disable() callback",
                            "    - i2c: designware: Use temporary variable for struct device",
                            "    - i2c: designware: Fix an error handling path in i2c_dw_pci_probe()",
                            "    - phy: renesas: rcar-gen3-usb2: Add support to initialize the bus",
                            "    - phy: renesas: rcar-gen3-usb2: Move IRQ request in probe",
                            "    - phy: renesas: rcar-gen3-usb2: Lock around hardware registers and driver",
                            "      data",
                            "    - phy: renesas: rcar-gen3-usb2: Assert PLL reset on PHY power off",
                            "    - cpufreq: Add SM8650 to cpufreq-dt-platdev blocklist",
                            "    - nvmem: rockchip-otp: Move read-offset into variant-data",
                            "    - nvmem: rockchip-otp: add rk3576 variant data",
                            "    - nvmem: core: verify cell's raw_len",
                            "    - nvmem: core: update raw_len if the bit reading is required",
                            "    - nvmem: qfprom: switch to 4-byte aligned reads",
                            "    - scsi: ufs: Introduce quirk to extend PA_HIBERN8TIME for UFS devices",
                            "    - intel_th: avoid using deprecated page->mapping, index fields",
                            "    - dma-mapping: avoid potential unused data compilation warning",
                            "    - cgroup: Fix compilation issue due to cgroup_mutex not being exported",
                            "    - scsi: mpi3mr: Add level check to control event logging",
                            "    - net: enetc: refactor bulk flipping of RX buffers to separate function",
                            "    - ima: process_measurement() needlessly takes inode_lock() on MAY_READ",
                            "    - drm/amdgpu: Allow P2P access through XGMI",
                            "    - selftests/bpf: Mitigate sockmap_ktls disconnect_after_delete failure",
                            "    - bpf: fix possible endless loop in BPF map iteration",
                            "    - samples/bpf: Fix compilation failure for samples/bpf on LoongArch Fedora",
                            "    - kconfig: merge_config: use an empty file as initfile",
                            "    - s390/vfio-ap: Fix no AP queue sharing allowed message written to kernel",
                            "      log",
                            "    - cifs: Add fallback for SMB2 CREATE without FILE_READ_ATTRIBUTES",
                            "    - cifs: Fix querying and creating MF symlinks over SMB1",
                            "    - cifs: Fix negotiate retry functionality",
                            "    - smb: client: Store original IO parameters and prevent zero IO sizes",
                            "    - fuse: Return EPERM rather than ENOSYS from link()",
                            "    - NFSv4: Check for delegation validity in",
                            "      nfs_start_delegation_return_locked()",
                            "    - NFS: Don't allow waiting for exiting tasks",
                            "    - arm64: Add support for HIP09 Spectre-BHB mitigation",
                            "    - tracing: Mark binary printing functions with __printf() attribute",
                            "    - ACPI: PNP: Add Intel OC Watchdog IDs to non-PNP device list",
                            "    - mailbox: pcc: Use acpi_os_ioremap() instead of ioremap()",
                            "    - mailbox: use error ret code of of_parse_phandle_with_args()",
                            "    - riscv: Allow NOMMU kernels to access all of RAM",
                            "    - fbdev: fsl-diu-fb: add missing device_remove_file()",
                            "    - fbcon: Use correct erase colour for clearing in fbcon",
                            "    - fbdev: core: tileblit: Implement missing margin clearing for tileblit",
                            "    - cifs: add validation check for the fields in smb_aces",
                            "    - cifs: Fix establishing NetBIOS session for SMB2+ connection",
                            "    - NFSv4: Treat ENETUNREACH errors as fatal for state recovery",
                            "    - SUNRPC: rpc_clnt_set_transport() must not change the autobind setting",
                            "    - SUNRPC: rpcbind should never reset the port to the value '0'",
                            "    - thermal/drivers/qoriq: Power down TMU on system suspend",
                            "    - dql: Fix dql->limit value when reset.",
                            "    - lockdep: Fix wait context check on softirq for PREEMPT_RT",
                            "    - objtool: Properly disable uaccess validation",
                            "    - PCI: dwc: ep: Ensure proper iteration over outbound map windows",
                            "    - tools/build: Don't pass test log files to linker",
                            "    - pNFS/flexfiles: Report ENETDOWN as a connection error",
                            "    - PCI: vmd: Disable MSI remapping bypass under Xen",
                            "    - ext4: on a remount, only log the ro or r/w state when it has changed",
                            "    - mmc: host: Wait for Vdd to settle on card power off",
                            "    - wifi: mt76: only mark tx-status-failed frames as ACKed on mt76x0/2",
                            "    - wifi: mt76: mt7996: revise TXS size",
                            "    - x86/stackprotector/64: Only export __ref_stack_chk_guard on CONFIG_SMP",
                            "    - i2c: qup: Vote for interconnect bandwidth to DRAM",
                            "    - i2c: pxa: fix call balance of i2c->clk handling routines",
                            "    - btrfs: make btrfs_discard_workfn() block_group ref explicit",
                            "    - btrfs: avoid linker error in btrfs_find_create_tree_block()",
                            "    - btrfs: run btrfs_error_commit_super() early",
                            "    - btrfs: fix non-empty delayed iputs list on unmount due to async workers",
                            "    - btrfs: get zone unusable bytes while holding lock at",
                            "      btrfs_reclaim_bgs_work()",
                            "    - btrfs: send: return -ENAMETOOLONG when attempting a path that is too",
                            "      long",
                            "    - drm/amd/display: Guard against setting dispclk low for dcn31x",
                            "    - i3c: master: svc: Fix missing STOP for master request",
                            "    - dlm: make tcp still work in multi-link env",
                            "    - um: Store full CSGSFS and SS register from mcontext",
                            "    - um: Update min_low_pfn to match changes in uml_reserved",
                            "    - ext4: reorder capability check last",
                            "    - hypfs_create_cpu_files(): add missing check for hypfs_mkdir() failure",
                            "    - scsi: st: Tighten the page format heuristics with MODE SELECT",
                            "    - scsi: st: ERASE does not change tape location",
                            "    - vfio/pci: Handle INTx IRQ_NOTCONNECTED",
                            "    - bpf: Return prog btf_id without capable check",
                            "    - jbd2: do not try to recover wiped journal",
                            "    - tcp: reorganize tcp_in_ack_event() and tcp_count_delivered()",
                            "    - rtc: rv3032: fix EERD location",
                            "    - thunderbolt: Do not add non-active NVM if NVM upgrade is disabled for",
                            "      retimer",
                            "    - ASoC: mediatek: mt6359: Add stub for mt6359_accdet_enable_jack_detect",
                            "    - bpf: Allow pre-ordering for bpf cgroup progs",
                            "    - kbuild: fix argument parsing in scripts/config",
                            "    - crypto: octeontx2 - suppress auth failure screaming due to negative",
                            "      tests",
                            "    - dm: restrict dm device size to 2^63-512 bytes",
                            "    - net/smc: use the correct ndev to find pnetid by pnetid table",
                            "    - xen: Add support for XenServer 6.1 platform device",
                            "    - pinctrl-tegra: Restore SFSEL bit when freeing pins",
                            "    - mfd: tps65219: Remove TPS65219_REG_TI_DEV_ID check",
                            "    - drm/amdgpu: Update SRIOV video codec caps",
                            "    - ASoC: sun4i-codec: support hp-det-gpios property",
                            "    - ext4: reject the 'data_err=abort' option in nojournal mode",
                            "    - ext4: do not convert the unwritten extents if data writeback fails",
                            "    - RDMA/uverbs: Propagate errors from rdma_lookup_get_uobject()",
                            "    - posix-timers: Add cond_resched() to posix_timer_add() search loop",
                            "    - timer_list: Don't use %pK through printk()",
                            "    - netfilter: conntrack: Bound nf_conntrack sysctl writes",
                            "    - arm64/mm: Check PUD_TYPE_TABLE in pud_bad()",
                            "    - mmc: dw_mmc: add exynos7870 DW MMC support",
                            "    - usb: xhci: Don't change the status of stalled TDs on failed Stop EP",
                            "    - hwmon: (dell-smm) Increment the number of fans",
                            "    - printk: Check CON_SUSPEND when unblanking a console",
                            "    - drm/amd/display: remove minimum Dispclk and apply oem panel timing.",
                            "    - drm/amd/display: calculate the remain segments for all pipes",
                            "    - drm/amd/display: Fix incorrect DPCD configs while Replay/PSR switch",
                            "    - gfs2: Check for empty queue in run_queue",
                            "    - auxdisplay: charlcd: Partially revert \"Move hwidth and bwidth to struct",
                            "      hd44780_common\"",
                            "    - ASoC: qcom: sm8250: explicitly set format in sm8250_be_hw_params_fixup()",
                            "    - iommu/amd/pgtbl_v2: Improve error handling",
                            "    - watchdog: aspeed: Update bootstatus handling",
                            "    - drm/amdkfd: Set per-process flags only once cik/vi",
                            "    - arm64: tegra: p2597: Fix gpio for vdd-1v8-dis regulator",
                            "    - arm64: tegra: Resize aperture for the IGX PCIe C5 slot",
                            "    - powerpc/prom_init: Fixup missing #size-cells on PowerBook6,7",
                            "    - ALSA: seq: Improve data consistency at polling",
                            "    - tcp: bring back NUMA dispersion in inet_ehash_locks_alloc()",
                            "    - rtc: ds1307: stop disabling alarms on probe",
                            "    - ieee802154: ca8210: Use proper setters and getters for bitwise types",
                            "    - ARM: tegra: Switch DSI-B clock parent to PLLD on Tegra114",
                            "    - media: c8sectpfe: Call of_node_put(i2c_bus) only once in",
                            "      c8sectpfe_probe()",
                            "    - drm/gem: Test for imported GEM buffers with helper",
                            "    - net: phylink: use pl->link_interface in phylink_expects_phy()",
                            "    - remoteproc: qcom_wcnss: Handle platforms with only single power domain",
                            "    - drm/amdgpu: Do not program AGP BAR regs under SRIOV in gfxhub_v1_0.c",
                            "    - drm/amd/display: Skip checking FRL_MODE bit for PCON BW determination",
                            "    - pinctrl: bcm281xx: Use \"unsigned int\" instead of bare \"unsigned\"",
                            "    - net: ethernet: ti: cpsw_new: populate netdev of_node",
                            "    - net: pktgen: fix mpls maximum labels list parsing",
                            "    - perf/hw_breakpoint: Return EOPNOTSUPP for unsupported breakpoint type",
                            "    - ALSA: hda/realtek: Enable PC beep passthrough for HP EliteBook 855 G7",
                            "    - ipv4: fib: Move fib_valid_key_len() to rtm_to_fib_config().",
                            "    - drm/rockchip: vop2: Add uv swap for cluster window",
                            "    - media: uvcvideo: Add sanity check to uvc_ioctl_xu_ctrl_map",
                            "    - media: uvcvideo: Handle uvc menu translation inside uvc_get_le_value",
                            "    - clk: imx8mp: inform CCF of maximum frequency of clocks",
                            "    - hwmon: (gpio-fan) Add missing mutex locks",
                            "    - ARM: at91: pm: fix at91_suspend_finish for ZQ calibration",
                            "    - drm/mediatek: mtk_dpi: Add checks for reg_h_fre_con existence",
                            "    - fpga: altera-cvp: Increase credit timeout",
                            "    - perf: arm_pmuv3: Call kvm_vcpu_pmu_resync_el0() before enabling counters",
                            "    - soc: apple: rtkit: Use high prio work queue",
                            "    - soc: apple: rtkit: Implement OSLog buffers properly",
                            "    - wifi: ath12k: Report proper tx completion status to mac80211",
                            "    - PCI: brcmstb: Expand inbound window size up to 64GB",
                            "    - PCI: brcmstb: Add a softdep to MIP MSI-X driver",
                            "    - net/mlx5: Avoid report two health errors on same syndrome",
                            "    - selftests/net: have `gro.sh -t` return a correct exit code",
                            "    - drm/amdkfd: KFD release_work possible circular locking",
                            "    - leds: pwm-multicolor: Add check for fwnode_property_read_u32",
                            "    - net: ethernet: mtk_ppe_offload: Allow QinQ, double ETH_P_8021Q only",
                            "    - net: xgene-v2: remove incorrect ACPI_PTR annotation",
                            "    - bonding: report duplicate MAC address in all situations",
                            "    - wifi: ath12k: Improve BSS discovery with hidden SSID in 6 GHz band",
                            "    - soc: ti: k3-socinfo: Do not use syscon helper to build regmap",
                            "    - Octeontx2-af: RPM: Register driver with PCI subsys IDs",
                            "    - x86/build: Fix broken copy command in genimage.sh when making isoimage",
                            "    - drm/amd/display: handle max_downscale_src_width fail check",
                            "    - ASoC: mediatek: mt8188: Treat DMIC_GAINx_CUR as non-volatile",
                            "    - ASoC: mediatek: mt8188: Add reference for dmic clocks",
                            "    - x86/nmi: Add an emergency handler in nmi_desc & use it in",
                            "      nmi_shootdown_cpus()",
                            "    - vhost-scsi: Return queue full for page alloc failures during copy",
                            "    - vdpa/mlx5: Fix mlx5_vdpa_get_config() endianness on big-endian machines",
                            "    - media: adv7180: Disable test-pattern control on adv7180",
                            "    - media: tc358746: improve calculation of the D-PHY timing registers",
                            "    - libbpf: Fix out-of-bound read",
                            "    - net/mlx5: Change POOL_NEXT_SIZE define value and make it global",
                            "    - crypto: ahash - Set default reqsize from ahash_alg",
                            "    - crypto: skcipher - Zap type in crypto_alloc_sync_skcipher",
                            "    - MIPS: Use arch specific syscall name match function",
                            "    - MIPS: pm-cps: Use per-CPU variables as per-CPU, not per-core",
                            "    - clocksource: mips-gic-timer: Enable counter when CPUs start",
                            "    - scsi: mpt3sas: Send a diag reset if target reset fails",
                            "    - wifi: rtw88: Fix rtw_init_vht_cap() for RTL8814AU",
                            "    - wifi: rtw88: Fix rtw_init_ht_cap() for RTL8814AU",
                            "    - wifi: rtw88: Fix rtw_desc_to_mcsrate() to handle MCS16-31",
                            "    - wifi: rtw89: fw: propagate error code from rtw89_h2c_tx()",
                            "    - EDAC/ie31200: work around false positive build warning",
                            "    - i3c: master: svc: Flush FIFO before sending Dynamic Address",
                            "      Assignment(DAA)",
                            "    - drm/amd/display: Add support for disconnected eDP streams",
                            "    - RDMA/core: Fix best page size finding when it can cross SG entries",
                            "    - pmdomain: imx: gpcv2: use proper helper for property detection",
                            "    - can: c_can: Use of_property_present() to test existence of DT property",
                            "    - bpf: don't do clean_live_states when state->loop_entry->branches > 0",
                            "    - eth: mlx4: don't try to complete XDP frames in netpoll",
                            "    - PCI: Fix old_size lower bound in calculate_iosize() too",
                            "    - ACPI: HED: Always initialize before evged",
                            "    - vxlan: Join / leave MC group after remote changes",
                            "    - media: test-drivers: vivid: don't call schedule in loop",
                            "    - net/mlx5: Modify LSB bitmask in temperature event to include only the",
                            "      first bit",
                            "    - net/mlx5: Apply rate-limiting to high temperature warning",
                            "    - firmware: arm_ffa: Reject higher major version as incompatible",
                            "    - ASoC: ops: Enforce platform maximum on initial value",
                            "    - ASoC: tas2764: Add reg defaults for TAS2764_INT_CLK_CFG",
                            "    - ASoC: tas2764: Mark SW_RESET as volatile",
                            "    - ASoC: tas2764: Power up/down amp on mute ops",
                            "    - ASoC: soc-dai: check return value at snd_soc_dai_set_tdm_slot()",
                            "    - pinctrl: devicetree: do not goto err when probing hogs in",
                            "      pinctrl_dt_to_map",
                            "    - smack: recognize ipv4 CIPSO w/o categories",
                            "    - smack: Revert \"smackfs: Added check catlen\"",
                            "    - kunit: tool: Use qboot on QEMU x86_64",
                            "    - media: i2c: imx219: Correct the minimum vblanking value",
                            "    - media: v4l: Memset argument to 0 before calling get_mbus_config pad op",
                            "    - net/mlx4_core: Avoid impossible mlx4_db_alloc() order value",
                            "    - clk: qcom: ipq5018: allow it to be bulid on arm32",
                            "    - [Config] clk: qcom: ipq5018: enable module on armhf",
                            "    - clk: qcom: clk-alpha-pll: Do not use random stack value for recalc rate",
                            "    - x86/traps: Cleanup and robustify decode_bug()",
                            "    - sched: Reduce the default slice to avoid tasks getting an extra tick",
                            "    - serial: sh-sci: Update the suspend/resume support",
                            "    - phy: core: don't require set_mode() callback for phy_get_mode() to work",
                            "    - soundwire: amd: change the soundwire wake enable/disable sequence",
                            "    - drm/amdgpu: Set snoop bit for SDMA for MI series",
                            "    - drm/amd/display: Don't try AUX transactions on disconnected link",
                            "    - drm/amdgpu: reset psp->cmd to NULL after releasing the buffer",
                            "    - drm/amd/display: Update CR AUX RD interval interpretation",
                            "    - drm/amd/display: Initial psr_version with correct setting",
                            "    - drm/amdgpu: enlarge the VBIOS binary size limit",
                            "    - drm/amd/display/dm: drop hw_support check in amdgpu_dm_i2c_xfer()",
                            "    - scsi: target: spc: Fix loop traversal in spc_rsoc_get_descr()",
                            "    - net/mlx5: Extend Ethtool loopback selftest to support non-linear SKB",
                            "    - net/mlx5e: set the tx_queue_len for pfifo_fast",
                            "    - net/mlx5e: reduce rep rxq depth to 256 for ECPF",
                            "    - net/mlx5e: reduce the max log mpwrq sz for ECPF and reps",
                            "    - drm/v3d: Add clock handling",
                            "    - wifi: mac80211: don't unconditionally call drv_mgd_complete_tx()",
                            "    - wifi: mac80211: remove misplaced drv_mgd_complete_tx() call",
                            "    - net: fec: Refactor MAC reset to function",
                            "    - powerpc/pseries/iommu: memory notifier incorrectly adds TCEs for pmemory",
                            "    - arch/powerpc/perf: Check the instruction type before creating sample",
                            "      with perf_mem_data_src",
                            "    - ip: fib_rules: Fetch net from fib_rule in fib[46]_rule_configure().",
                            "    - r8152: add vendor/device ID pair for Dell Alienware AW1022z",
                            "    - pstore: Change kmsg_bytes storage size to u32",
                            "    - ext4: don't write back data before punch hole in nojournal mode",
                            "    - ext4: remove writable userspace mappings before truncating page cache",
                            "    - wifi: rtw88: Fix download_firmware_validate() for RTL8814AU",
                            "    - wifi: rtw88: Fix __rtw_download_firmware() for RTL8814AU",
                            "    - clk: qcom: camcc-sm8250: Use clk_rcg2_shared_ops for some RCGs",
                            "    - hwmon: (xgene-hwmon) use appropriate type for the latency value",
                            "    - f2fs: introduce f2fs_base_attr for global sysfs entries",
                            "    - media: qcom: camss: csid: Only add TPG v4l2 ctrl if TPG hardware is",
                            "      available",
                            "    - ipv4: ip_gre: Fix set but not used warning in ipgre_err() if IPv4-only",
                            "    - r8169: don't scan PHY addresses > 0",
                            "    - bridge: mdb: Allow replace of a host-joined group",
                            "    - ice: treat dyn_allowed only as suggestion",
                            "    - rcu: handle quiescent states for PREEMPT_RCU=n, PREEMPT_COUNT=y",
                            "    - rcu: handle unstable rdp in rcu_read_unlock_strict()",
                            "    - rcu: fix header guard for rcu_all_qs()",
                            "    - perf: Avoid the read if the count is already updated",
                            "    - ice: count combined queues using Rx/Tx count",
                            "    - net/mana: fix warning in the writer of client oob",
                            "    - scsi: lpfc: Handle duplicate D_IDs in ndlp search-by D_ID routine",
                            "    - scsi: lpfc: Free phba irq in lpfc_sli4_enable_msi() when",
                            "      pci_irq_vector() fails",
                            "    - scsi: st: Restore some drive settings after reset",
                            "    - wifi: ath12k: Avoid napi_sync() before napi_enable()",
                            "    - HID: usbkbd: Fix the bit shift number for LED_KANA",
                            "    - arm64: zynqmp: add clock-output-names property in clock nodes",
                            "    - ASoC: codecs: pcm3168a: Allow for 24-bit in provider mode",
                            "    - ASoC: rt722-sdca: Add some missing readable registers",
                            "    - drm/ast: Find VBIOS mode from regular display size",
                            "    - bpftool: Fix readlink usage in get_fd_type",
                            "    - firmware: arm_scmi: Relax duplicate name constraint across protocol ids",
                            "    - perf/amd/ibs: Fix perf_ibs_op.cnt_mask for CurCnt",
                            "    - perf/amd/ibs: Fix ->config to sample period calculation for OP PMU",
                            "    - wifi: rtl8xxxu: retry firmware download on error",
                            "    - wifi: rtw88: Don't use static local variable in",
                            "      rtw8822b_set_tx_power_index_by_rate",
                            "    - wifi: rtw89: add wiphy_lock() to work that isn't held wiphy_lock() yet",
                            "    - spi: zynqmp-gqspi: Always acknowledge interrupts",
                            "    - regulator: ad5398: Add device tree support",
                            "    - wifi: ath12k: fix ath12k_hal_tx_cmd_ext_desc_setup() info1 override",
                            "    - accel/qaic: Mask out SR-IOV PCI resources",
                            "    - wifi: ath9k: return by of_get_mac_address",
                            "    - wifi: ath12k: Fix end offset bit definition in monitor ring descriptor",
                            "    - drm: bridge: adv7511: fill stream capabilities",
                            "    - drm/atomic: clarify the rules around drm_atomic_state->allow_modeset",
                            "    - drm/panel-edp: Add Starry 116KHD024006",
                            "    - drm: Add valid clones check",
                            "    - ASoC: imx-card: Adjust over allocation of memory in imx_card_parse_of()",
                            "    - book3s64/radix: Fix compile errors when",
                            "      CONFIG_ARCH_WANT_OPTIMIZE_DAX_VMEMMAP=n",
                            "    - pinctrl: meson: define the pull up/down resistor value as 60 kOhm",
                            "    - ASoC: cs42l43: Disable headphone clamps during type detection",
                            "    - ASoC: Intel: bytcr_rt5640: Add DMI quirk for Acer Aspire SW3-013",
                            "    - ALSA: hda/realtek: Add quirk for HP Spectre x360 15-df1xxx",
                            "    - nvme-pci: add quirks for device 126f:1001",
                            "    - nvme-pci: add quirks for WDC Blue SN550 15b7:5009",
                            "    - io_uring/fdinfo: annotate racy sq/cq head/tail reads",
                            "    - cifs: Fix and improve cifs_query_path_info() and cifs_query_file_info()",
                            "    - cifs: Fix changing times and read-only attr over SMB1",
                            "      smb_set_file_info() function",
                            "    - tools: ynl-gen: validate 0 len strings from kernel",
                            "    - wifi: iwlwifi: add support for Killer on MTL",
                            "    - xenbus: Allow PVH dom0 a non-local xenstore",
                            "    - soundwire: bus: Fix race on the creation of the IRQ domain",
                            "    - dmaengine: idxd: Fix allowing write() from different address spaces",
                            "    - kernel/fork: only call untrack_pfn_clear() on VMAs duplicated for fork()",
                            "    - remoteproc: qcom_wcnss: Fix on platforms without fallback regulators",
                            "    - clk: sunxi-ng: d1: Add missing divider for MMC mod clocks",
                            "    - xfrm: Sanitize marks before insert",
                            "    - dmaengine: idxd: Fix ->poll() return value",
                            "    - dmaengine: fsl-edma: Fix return code for unhandled interrupts",
                            "    - Bluetooth: L2CAP: Fix not checking l2cap_chan security level",
                            "    - Bluetooth: btusb: use skb_pull to avoid unsafe access in QCA dump",
                            "      handling",
                            "    - bridge: netfilter: Fix forwarding of fragmented packets",
                            "    - ice: fix vf->num_mac count with port representors",
                            "    - ice: Fix LACP bonds without SRIOV environment",
                            "    - pinctrl: qcom: switch to devm_register_sys_off_handler()",
                            "    - net: dwmac-sun8i: Use parsed internal PHY address instead of 1",
                            "    - net: lan743x: Restore SGMII CTRL register on resume",
                            "    - io_uring: fix overflow resched cqe reordering",
                            "    - octeontx2-pf: Add AF_XDP non-zero copy support",
                            "    - octeontx2-af: Set LMT_ENA bit for APR table entries",
                            "    - octeontx2-af: Fix APR entry mapping based on APR_LMT_CFG",
                            "    - clk: s2mps11: initialise clk_hw_onecell_data::num before accessing",
                            "      ::hws[] in probe()",
                            "    - can: slcan: allow reception of short error messages",
                            "    - ASoC: SOF: ipc4-control: Use SOF_CTRL_CMD_BINARY as numid for bytes_ext",
                            "    - ASoc: SOF: topology: connect DAI to a single DAI link",
                            "    - ASoC: SOF: ipc4-pcm: Delay reporting is only supported for playback",
                            "      direction",
                            "    - ALSA: hda/realtek: Add quirk for Lenovo Yoga Pro 7 14ASP10",
                            "    - llc: fix data loss when reading from a socket in llc_ui_recvmsg()",
                            "    - can: kvaser_pciefd: Continue parsing DMA buf after dropped RX",
                            "    - thermal: intel: x86_pkg_temp_thermal: Fix bogus trip temperature",
                            "    - drm/edid: fixed the bug that hdr metadata was not reset",
                            "    - arm64: dts: marvell: uDPU: define pinctrl state for alarm LEDs",
                            "    - smb: client: Reset all search buffer pointers when releasing buffer",
                            "    - Input: xpad - add more controllers",
                            "    - memcg: always call cond_resched() after fn()",
                            "    - mm/page_alloc.c: avoid infinite retries caused by cpuset race",
                            "    - Revert \"arm64: dts: allwinner: h6: Use RSB for AXP805 PMIC connection\"",
                            "    - ksmbd: fix stream write failure",
                            "    - spi: spi-fsl-dspi: restrict register range for regmap access",
                            "    - spi: spi-fsl-dspi: Halt the module after a new message transfer",
                            "    - spi: spi-fsl-dspi: Reset SR flags before sending a new message",
                            "    - serial: sh-sci: Save and restore more registers",
                            "    - watchdog: aspeed: fix 64-bit division",
                            "    - pinctrl: tegra: Fix off by one in tegra_pinctrl_get_group()",
                            "    - i3c: master: svc: Fix implicit fallthrough in svc_i3c_master_ibi_work()",
                            "    - drm/gem: Internally test import_attach for imported objects",
                            "    - can: kvaser_pciefd: Force IRQ edge in case of nested IRQ",
                            "    - af_unix: Return struct unix_sock from unix_get_socket().",
                            "    - af_unix: Run GC on only one CPU.",
                            "    - af_unix: Try to run GC async.",
                            "    - af_unix: Replace BUG_ON() with WARN_ON_ONCE().",
                            "    - af_unix: Remove io_uring code for GC.",
                            "    - af_unix: Remove CONFIG_UNIX_SCM.",
                            "    - [Config] af_unix: remove UNIX_SCM config option",
                            "    - af_unix: Allocate struct unix_vertex for each inflight AF_UNIX fd.",
                            "    - af_unix: Allocate struct unix_edge for each inflight AF_UNIX fd.",
                            "    - af_unix: Link struct unix_edge when queuing skb.",
                            "    - af_unix: Bulk update unix_tot_inflight/unix_inflight when queuing skb.",
                            "    - af_unix: Iterate all vertices by DFS.",
                            "    - af_unix: Detect Strongly Connected Components.",
                            "    - af_unix: Save listener for embryo socket.",
                            "    - af_unix: Fix up unix_edge.successor for embryo socket.",
                            "    - af_unix: Save O(n) setup of Tarjan's algo.",
                            "    - af_unix: Skip GC if no cycle exists.",
                            "    - af_unix: Avoid Tarjan's algorithm if unnecessary.",
                            "    - af_unix: Assign a unique index to SCC.",
                            "    - af_unix: Detect dead SCC.",
                            "    - Revert \"UBUNTU: SAUCE: af_unix: Fix GC compatibility with upstream OOB",
                            "      refcount changes\"",
                            "    - af_unix: Replace garbage collection algorithm.",
                            "    - af_unix: Remove lock dance in unix_peek_fds().",
                            "    - af_unix: Try not to hold unix_gc_lock during accept().",
                            "    - af_unix: Don't access successor in unix_del_edges() during GC.",
                            "    - af_unix: Add dead flag to struct scm_fp_list.",
                            "    - af_unix: Fix garbage collection of embryos carrying OOB with SCM_RIGHTS",
                            "    - af_unix: Fix uninit-value in __unix_walk_scc()",
                            "    - SAUCE: Revert \"af_unix: Don't return OOB skb in manage_oob().\"",
                            "    - SAUCE: Revert \"af_unix: Move spin_lock() in manage_oob().\"",
                            "    - SAUCE: Revert \"af_unix: Rename unlinked_skb in manage_oob().\"",
                            "    - SAUCE: Revert \"af_unix: Remove single nest in manage_oob().\"",
                            "    - SAUCE: Revert \"af_unix: Don't call skb_get() for OOB skb.\"",
                            "    - af_unix: Define locking order for unix_table_double_lock().",
                            "    - af_unix: Define locking order for U_LOCK_SECOND in",
                            "      unix_state_double_lock().",
                            "    - af_unix: Define locking order for U_RECVQ_LOCK_EMBRYO in",
                            "      unix_collect_skb().",
                            "    - af_unix: Don't call skb_get() for OOB skb.",
                            "    - af_unix: Don't leave consecutive consumed OOB skbs.",
                            "    - af_unix: Remove single nest in manage_oob().",
                            "    - af_unix: Rename unlinked_skb in manage_oob().",
                            "    - af_unix: Move spin_lock() in manage_oob().",
                            "    - af_unix: Don't return OOB skb in manage_oob().",
                            "    - arm64: dts: qcom: ipq9574: Add missing properties for cryptobam",
                            "    - arm64: dts: qcom: sm8350: Fix typo in pil_camera_mem node",
                            "    - arm64: dts: qcom: sm8450: Add missing properties for cryptobam",
                            "    - arm64: dts: qcom: sm8550: Add missing properties for cryptobam",
                            "    - arm64: dts: ti: k3-am68-sk: Fix regulator hierarchy",
                            "    - perf/arm-cmn: Fix REQ2/SNP2 mixup",
                            "    - perf/arm-cmn: Initialise cmn->cpu earlier",
                            "    - coredump: fix error handling for replace_fd()",
                            "    - dmaengine: idxd: cdev: Fix uninitialized use of sva in idxd_cdev_open",
                            "    - HID: quirks: Add ADATA XPG alpha wireless mouse support",
                            "    - nfs: don't share pNFS DS connections between net namespaces",
                            "    - platform/x86: thinkpad_acpi: Support also NEC Lavie X1475JAS",
                            "    - um: let 'make clean' properly clean underlying SUBARCH as well",
                            "    - drm/amd/display: fix link_set_dpms_off multi-display MST corner case",
                            "    - phy: starfive: jh7110-usb: Fix USB 2.0 host occasional detection failure",
                            "    - spi: spi-sun4i: fix early activation",
                            "    - nvme-pci: add NVME_QUIRK_NO_DEEPEST_PS quirk for SOLIDIGM P44 Pro",
                            "    - NFS: Avoid flushing data while holding directory locks in nfs_rename()",
                            "    - platform/x86: fujitsu-laptop: Support Lifebook S2110 hotkeys",
                            "    - platform/x86: thinkpad_acpi: Ignore battery threshold change event",
                            "      notification",
                            "    - net: ethernet: ti: am65-cpsw: Lower random mac address error print to",
                            "      info",
                            "    - dma/mapping.c: dev_dbg support for dma_addressing_limited",
                            "    - mei: vsc: Use struct vsc_tp_packet as vsc-tp tx_buf and rx_buf type",
                            "    - vhost_task: fix vhost_task_create() documentation",
                            "    - dma-mapping: Fix warning reported for missing prototype",
                            "    - fs/buffer: split locking for pagecache lookups",
                            "    - fs/buffer: introduce sleeping flavors for pagecache lookups",
                            "    - fs/buffer: use sleeping version of __find_get_block()",
                            "    - fs/ocfs2: use sleeping version of __find_get_block()",
                            "    - fs/jbd2: use sleeping version of __find_get_block()",
                            "    - fs/ext4: use sleeping version of sb_find_get_block()",
                            "    - drm/amd/display: Enable urgent latency adjustment on DCN35",
                            "    - iommufd: Extend IOMMU_GET_HW_INFO to report PASID capability",
                            "    - cifs: Set default Netbios RFC1001 server name to hostname in UNC",
                            "    - ASoC: codecs: wsa884x: Correct VI sense channel mask",
                            "    - ASoC: codecs: wsa883x: Correct VI sense channel mask",
                            "    - thermal/drivers/mediatek/lvts: Start sensor interrupts disabled",
                            "    - Bluetooth: btmtksdio: Prevent enabling interrupts after IRQ handler",
                            "      removal",
                            "    - drm/amdgpu/discovery: check ip_discovery fw file available",
                            "    - drm/amdkfd: set precise mem ops caps to disabled for gfx 11 and 12",
                            "    - xen/pci: Do not register devices with segments >= 0x10000",
                            "    - drm/amdgpu: Skip pcie_replay_count sysfs creation for VF",
                            "    - cgroup/rstat: avoid disabling irqs for O(num_cpu)",
                            "    - wifi: mt76: mt7996: fix SER reset trigger on WED reset",
                            "    - wifi: mt76: mt7925: load the appropriate CLC data based on hardware type",
                            "    - wifi: mt76: mt7925: fix fails to enter low power mode in suspend state",
                            "    - x86/headers: Replace __ASSEMBLY__ with __ASSEMBLER__ in UAPI headers",
                            "    - x86/cpu/intel: Replace PAT erratum model/family magic numbers with",
                            "      symbolic IFM references",
                            "    - x86/smpboot: Fix INIT delay assignment for extended Intel Families",
                            "    - x86/microcode/intel: Switch to new Intel CPU model defines",
                            "    - x86/microcode: Update the Intel processor flag scan check",
                            "    - blk-cgroup: improve policy registration error handling",
                            "    - drm/amdgpu: release xcp_mgr on exit",
                            "    - drm/amdgpu: adjust drm_firmware_drivers_only() handling",
                            "    - s390/tlb: Use mm_has_pgste() instead of mm_alloc_pgste()",
                            "    - clocksource/drivers/timer-riscv: Stop stimecmp when cpu hotplug",
                            "    - erofs: initialize decompression early",
                            "    - clk: qcom: lpassaudiocc-sc7280: Add support for LPASS resets for QCM6490",
                            "    - posix-timers: Ensure that timer initialization is fully visible",
                            "    - net: stmmac: dwmac-rk: Validate GRF and peripheral GRF during probe",
                            "    - net: hsr: Fix PRP duplicate detection",
                            "    - PNP: Expand length of fixup id string",
                            "    - arm64/mm: Check pmd_table() in pmd_trans_huge()",
                            "    - wifi: iwlwifi: mark Br device not integrated",
                            "    - wifi: mac80211: fix warning on disconnect during failed ML reconf",
                            "    - wifi: mac80211_hwsim: Fix MLD address translation",
                            "    - badblocks: Fix a nonsense WARN_ON() which checks whether a u64 variable",
                            "      < 0",
                            "    - coresight-etb10: change etb_drvdata spinlock's type to raw_spinlock_t",
                            "    - misc: pci_endpoint_test: Give disabled BARs a distinct error code",
                            "    - drm/amdkfd: Set per-process flags only once for gfx9/10/11/12",
                            "    - drm/xe: Retry BO allocation",
                            "    - soc: samsung: include linux/array_size.h where needed",
                            "    - usb: xhci: set page size to the xHCI-supported size",
                            "    - soc: mediatek: mtk-mutex: Add DPI1 SOF/EOF to MT8188 mutex tables",
                            "    - drm/amd/display: Ensure DMCUB idle before reset on DCN31/DCN35",
                            "    - drm/amd/display: Fix p-state type when p-state is unsupported",
                            "    - perf/core: Clean up perf_try_init_event()",
                            "    - net: phy: nxp-c45-tja11xx: add match_phy_device to TJA1103/TJA1104",
                            "    - dpll: Add an assertion to check freq_supported_num",
                            "    - ublk: enforce ublks_max only for unprivileged devices",
                            "    - scsi: logging: Fix scsi_logging_level bounds",
                            "    - ublk: complete command synchronously on error",
                            "    - drm/xe: xe_gen_wa_oob: replace program_invocation_short_name",
                            "    - bpf: Search and add kfuncs in struct_ops prologue and epilogue",
                            "    - drm/amd/display: fix dcn4x init failed",
                            "    - net/mlx5e: Add correct match to check IPSec syndromes for switchdev mode",
                            "    - scsi: mpi3mr: Update timestamp only for supervisor IOCs",
                            "    - scsi: scsi_debug: First fixes for tapes",
                            "    - net: ipv6: Init tunnel link-netns before registering dev",
                            "    - drm/amdgpu: remove all KFD fences from the BO on release",
                            "    - eeprom: ee1004: Check chip before probing",
                            "    - drm/amd/pm: Fetch current power limit from PMFW",
                            "    - drm/amd/display: DCN35 set min dispclk to 50Mhz",
                            "    - drm/amd/display: Fix DCN35 set min dispclk logic",
                            "    - drm/amd/display: Guard against setting dispclk low when active",
                            "    - drm/amd/display: Fix BT2020 YCbCr limited/full range input",
                            "    - drm/amd/display: Read LTTPR ALPM caps during link cap retrieval",
                            "    - hrtimers: Replace hrtimer_clock_to_base_table with switch-case",
                            "    - firmware: arm_ffa: Handle the presence of host partition in the",
                            "      partition info",
                            "    - firmware: xilinx: Dont send linux address to get fpga config get status",
                            "    - drm/xe: Stop ignoring errors from xe_ttm_stolen_mgr_init()",
                            "    - x86/ibt: Handle FineIBT in handle_cfi_failure()",
                            "    - soundwire: cadence_master: set frame shape and divider based on actual",
                            "      clk freq",
                            "    - net: stmmac: dwmac-loongson: Set correct {tx,rx}_fifo_size",
                            "    - drm/amdkfd: fix missing L2 cache info in topology",
                            "    - drm/amd/display: pass calculated dram_speed_mts to dml2",
                            "    - drm/amd/pm: Skip P2S load for SMU v13.0.12",
                            "    - drm/amd/display: Support multiple options during psr entry.",
                            "    - drm/amdgpu: Use active umc info from discovery",
                            "    - net/mlx5: XDP, Enable TX side XDP multi-buffer support",
                            "    - wifi: ath12k: fix the ampdu id fetch in the HAL_RX_MPDU_START TLV",
                            "    - wifi: iwlwifi: use correct IMR dump variable",
                            "    - wifi: mac80211: set ieee80211_prep_tx_info::link_id upon Auth Rx",
                            "    - powerpc/pseries/iommu: create DDW for devices with DMA mask less than",
                            "      64-bits",
                            "    - wifi: rtw89: coex: Assign value over than 0 to avoid firmware timer hang",
                            "    - wifi: rtw89: fw: validate multi-firmware header before getting its size",
                            "    - wifi: rtw89: fw: validate multi-firmware header before accessing",
                            "    - wifi: rtw89: call power_on ahead before selecting firmware",
                            "    - net: page_pool: avoid false positive warning if NAPI was never added",
                            "    - media: qcom: camss: Add default case in vfe_src_pad_code",
                            "    - drm/rockchip: vop2: Improve display modes handling on RK3588 HDMI0",
                            "    - tools: ynl-gen: don't output external constants",
                            "    - ice: init flow director before RDMA",
                            "    - wifi: ath12k: Fetch regdb.bin file from board-2.bin",
                            "    - drm/nouveau: fix the broken marco GSP_MSG_MAX_SIZE",
                            "    - wifi: ath11k: Use dma_alloc_noncoherent for rx_tid buffer allocation",
                            "    - wifi: rtw89: coex: Separated Wi-Fi connecting event from Wi-Fi scan",
                            "      event",
                            "    - drm/xe/sa: Always call drm_suballoc_manager_fini()",
                            "    - drm/xe: Reject BO eviction if BO is bound to current VM",
                            "    - smb: server: smb2pdu: check return value of xa_store()",
                            "    - ACPI: platform-profile: add platform_profile_cycle()",
                            "    - platform/x86: ideapad-laptop: add support for some new buttons",
                            "    - ALSA: usb-audio: Fix duplicated name in MIDI substream names",
                            "    - btrfs: handle empty eb->folios in num_extent_folios()",
                            "    - xfrm: Fix UDP GRO handling for some corner cases",
                            "    - idpf: fix idpf_vport_splitq_napi_poll()",
                            "    - net: dsa: microchip: update tag_ksz masks for KSZ9477 family",
                            "    - net: dsa: microchip: linearize skb for tail-tagging switches",
                            "    - vmxnet3: update MTU after device quiesce",
                            "    - pmdomain: core: Fix error checking in genpd_dev_pm_attach_by_id()",
                            "    - highmem: add folio_test_partial_kmap()",
                            "    - mm: mmap: map MAP_STACK to VM_NOHUGEPAGE only if THP is enabled",
                            "    - nilfs2: fix deadlock warnings caused by lock dependency in init_nilfs()",
                            "    - Bluetooth: btmtksdio: Check function enabled before doing close",
                            "    - Bluetooth: btmtksdio: Do close if SDIO card removed without close",
                            "    - platform/x86: think-lmi: Fix attribute name usage for non-compliant",
                            "      items",
                            "    - err.h: move IOMEM_ERR_PTR() to err.h",
                            "    - gcc-15: make 'unterminated string initialization' just a warning",
                            "    - gcc-15: disable '-Wunterminated-string-initialization' entirely for now",
                            "    - Fix mis-uses of 'cc-option' for warning disablement",
                            "    - bpf: abort verification if env->cur_state->loop_entry != NULL",
                            "    - drm/amdkfd: Correct F8_MODE for gfx950",
                            "    - arm64: dts: qcom: sm8650: Add missing properties for cryptobam",
                            "    - arm64: dts: qcom: x1e80100-qcp: Fix vreg_l2j_1p2 voltage",
                            "    - arm64: dts: qcom: x1e80100-qcp: mark l12b and l15b always-on",
                            "    - arm64: dts: ti: k3-am62-main: Set eMMC clock parent to default",
                            "    - arm64: dts: ti: k3-am62p-j722s-common-main: Set eMMC clock parent to",
                            "      default",
                            "    - arm64: dts: ti: k3-am62x: Remove clock-names property from IMX219",
                            "      overlay",
                            "    - arm64: dts: ti: k3-am62x: Rename I2C switch to I2C mux in IMX219 overlay",
                            "    - arm64: dts: ti: k3-am62x: Rename I2C switch to I2C mux in OV5640 overlay",
                            "    - arm64: dts: ti: k3-am65-main: Fix sdhci node properties",
                            "    - arm64: dts: ti: k3-am65-main: Add missing taps to sdhci0",
                            "    - arm64: dts: ti: k3-j721e-sk: Model CSI2RX connector mux",
                            "    - arm64: dts: ti: k3-j721e-sk: Add support for multiple CAN instances",
                            "    - arm64: dts: ti: k3-j721e-sk: Add DT nodes for power regulators",
                            "    - drm/xe: Save the gt pointer in lrc and drop the tile",
                            "    - Upstream stable to v6.6.93, v6.12.31, v6.12.32",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38053",
                            "    - idpf: fix null-ptr-deref in idpf_features_check",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38055",
                            "    - perf/x86/intel: Fix segfault with PEBS-via-PT with sample_freq",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38057",
                            "    - espintcp: fix skb leaks",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38060",
                            "    - bpf: copy_verifier_state() should copy 'loop_entry' field",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38098",
                            "    - drm/amd/display: Don't treat wb connector as physical in",
                            "      create_validate_stream_for_sink",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38099",
                            "    - Bluetooth: Disable SCO support if READ_VOICE_SETTING is",
                            "      unsupported/broken",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38073",
                            "    - block: fix race between set_blocksize and read paths",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38051",
                            "    - smb: client: Fix use-after-free in cifs_fill_dirent",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38077",
                            "    - platform/x86: dell-wmi-sysman: Avoid buffer overflow in",
                            "      current_password_store()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38078",
                            "    - ALSA: pcm: Fix race of buffer access at PCM OSS layer",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38003",
                            "    - can: bcm: add missing rcu read protection for procfs content",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38004",
                            "    - can: bcm: add locking for bcm_op runtime updates",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38031",
                            "    - padata: do not leak refcount in reorder_work",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38079",
                            "    - crypto: algif_hash - fix double free in hash_accept",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38052",
                            "    - net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38097",
                            "    - espintcp: remove encap socket caching to avoid reference leak",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38058",
                            "    - __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38059",
                            "    - btrfs: avoid NULL pointer dereference if no valid csum tree",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38034",
                            "    - btrfs: correct the order of prelim_ref arguments in btrfs__prelim_ref",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38035",
                            "    - nvmet-tcp: don't restore null sk_state_change",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38037",
                            "    - vxlan: Annotate FDB data races",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38039",
                            "    - net/mlx5e: Avoid WARN_ON when configuring MQPRIO with HTB offload",
                            "      enabled",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38080",
                            "    - drm/amd/display: Increase block_sequence array size",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38040",
                            "    - serial: mctrl_gpio: split disable_ms into sync and no_sync APIs",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38061",
                            "    - net: pktgen: fix access outside of user given buffer in",
                            "      pktgen_thread_write()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38062",
                            "    - genirq/msi: Store the IOMMU IOVA directly in msi_desc instead of",
                            "      iommu_cookie",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38063",
                            "    - dm: fix unconditional IO throttle caused by REQ_PREFLUSH",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38043",
                            "    - firmware: arm_ffa: Set dma_mask for ffa devices",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38044",
                            "    - media: cx231xx: set device_caps for 417",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38065",
                            "    - orangefs: Do not truncate file size",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38066",
                            "    - dm cache: prevent BUG_ON by blocking retries on failed device resumes",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38068",
                            "    - crypto: lzo - Fix compression buffer overrun",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38045",
                            "    - wifi: iwlwifi: fix debug actions order",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38071",
                            "    - x86/mm: Check return value from memblock_phys_alloc_range()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38072",
                            "    - libnvdimm/labels: Fix divide error in nd_label_data_init()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38081",
                            "    - spi-rockchip: Fix register out of bounds access",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38074",
                            "    - vhost-scsi: protect vq->log_used with vq->mutex",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38048",
                            "    - virtio_ring: Fix data race by tagging event_triggered as racy for KCSAN",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38075",
                            "    - scsi: target: iscsi: Fix timeout on deleted connection",
                            "",
                            "  * CAP_PERFMON insufficient to get perf data (LP: #2131046)",
                            "    - SAUCE: perf/core: Allow CAP_PERFMON for paranoid level 4",
                            "",
                            "  * Dell AIO backlight is not working, dell_uart_backlight module is missing",
                            "    (LP: #2083800)",
                            "    - SAUCE: Removed sauce dell-uart-backlight driver",
                            "    - Revert \"UBUNTU: SAUCE: ACPI: video: Dell AIO UART backlight detection\"",
                            "    - platform/x86: Add new Dell UART backlight driver",
                            "    - ACPI: video: Add Dell UART backlight controller detection",
                            "    - SAUCE: dell_uart_backlight: size_t -> ssize_t",
                            "    - ACPI: video: Add backlight=native quirk for Dell OptiPlex 7760 AIO",
                            "    - ACPI: video: Add backlight=native quirk for Dell OptiPlex 5480 AIO",
                            "    - [Config] enable CONFIG_DELL_UART_BACKLIGHT",
                            "",
                            "  * Ubuntu x86_64 6.8 kernels won't build if CONFIG_FB_HYPERV config option is",
                            "    enabled  (LP: #2127971)",
                            "    - fbdev: Introduce devm_register_framebuffer()",
                            "",
                            "  * Run iio_info will be stucked forever (HID-",
                            "    SENSOR-200011.5.auto/iio:device1) (LP: #2102077)",
                            "    - HID: quirks: Add quirk for 2 Chicony Electronics HP 5MP Cameras",
                            "",
                            "  * kernel: sysfs: cannot create duplicate filename",
                            "    '/bus/platform/devices/iTCO_wdt' (LP: #2121997)",
                            "    - i2c: i801: Hide Intel Birch Stream SoC TCO WDT",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344)",
                            "    - fs/xattr.c: fix simple_xattr_list to always include security.* xattrs",
                            "    - selftests/exec: load_address: conform test to TAP format output",
                            "    - binfmt_elf: Leave a gap between .bss and brk",
                            "    - selftests/exec: Build both static and non-static load_address tests",
                            "    - binfmt_elf: Calculate total_size earlier",
                            "    - binfmt_elf: Honor PT_LOAD alignment for static PIE",
                            "    - binfmt_elf: Move brk for static PIE even if ASLR disabled",
                            "    - platform/x86/amd/pmc: Declare quirk_spurious_8042 for MECHREVO Wujie",
                            "      14XA (GX4HRXL)",
                            "    - platform/x86: asus-wmi: Fix wlan_ctrl_by_user detection",
                            "    - cgroup/cpuset: Extend kthread_is_per_cpu() check to all",
                            "      PF_NO_SETAFFINITY tasks",
                            "    - tracing: probes: Fix a possible race in trace_probe_log APIs",
                            "    - tpm: tis: Double the timeout B to 4s",
                            "    - firmware: arm_scmi: Add helper to trace bad messages",
                            "    - firmware: arm_scmi: Add message dump traces for bad and unexpected",
                            "      replies",
                            "    - firmware: arm_scmi: Add support for debug metrics at the interface",
                            "    - [Config] do not enable new support for SCMI debug metrics",
                            "    - firmware: arm_scmi: Track basic SCMI communication debug metrics",
                            "    - iio: adc: ad7266: Fix potential timestamp alignment issue.",
                            "    - iio: adc: ad7768-1: Fix insufficient alignment of timestamp.",
                            "    - iio: chemical: sps30: use aligned_s64 for timestamp",
                            "    - HID: thrustmaster: fix memory leak in thrustmaster_interrupts()",
                            "    - spi: loopback-test: Do not split 1024-byte hexdumps",
                            "    - Bluetooth: MGMT: Fix MGMT_OP_ADD_DEVICE invalid device flags",
                            "    - tools: ynl: ethtool.py: Output timestamping statistics from tsinfo-get",
                            "      operation",
                            "    - tools/net/ynl: ethtool: fix crash when Hardware Clock info is missing",
                            "    - mctp: no longer rely on net->dev_index_head[]",
                            "    - net: mctp: Ensure keys maintain only one ref to corresponding dev",
                            "    - ALSA: seq: Fix delivery of UMP events to group ports",
                            "    - ALSA: ump: Fix a typo of snd_ump_stream_msg_device_info",
                            "    - net: dsa: sja1105: discard incoming frames in BR_STATE_LISTENING",
                            "    - nvme-pci: make nvme_pci_npages_prp() __always_inline",
                            "    - nvme-pci: acquire cq_poll_lock in nvme_poll_irqdisable",
                            "    - ALSA: sh: SND_AICA should depend on SH_DMA_API",
                            "    - qlcnic: fix memory leak in qlcnic_sriov_channel_cfg_cmd()",
                            "    - octeontx2-pf: macsec: Fix incorrect max transmit size in TX secy",
                            "    - net: ethernet: mtk_eth_soc: fix typo for declaration MT7988 ESW",
                            "      capability",
                            "    - octeontx2-af: Fix CGX Receive counters",
                            "    - tsnep: fix timestamping with a stacked DSA driver",
                            "    - NFSv4/pnfs: Reset the layout state after a layoutreturn",
                            "    - udf: Make sure i_lenExtents is uptodate on inode eviction",
                            "    - LoongArch: Prevent cond_resched() occurring within kernel-fpu",
                            "    - LoongArch: Save and restore CSR.CNTC for hibernation",
                            "    - LoongArch: Fix MAX_REG_OFFSET calculation",
                            "    - LoongArch: uprobes: Remove user_{en,dis}able_single_step()",
                            "    - LoongArch: uprobes: Remove redundant code about resume_era",
                            "    - drm/amd/display: Correct the reply value when AUX write incomplete",
                            "    - drm/amd/display: Avoid flooding unnecessary info messages",
                            "    - ACPI: PPTT: Fix processor subtable walk",
                            "    - ALSA: es1968: Add error handling for snd_pcm_hw_constraint_pow2()",
                            "    - ALSA: usb-audio: Add sample rate quirk for Audioengine D1",
                            "    - ALSA: usb-audio: Add sample rate quirk for Microdia JP001 USB Camera",
                            "    - hv_netvsc: Use vmbus_sendpacket_mpb_desc() to send VMBus messages",
                            "    - hv_netvsc: Preserve contiguous PFN grouping in the page buffer array",
                            "    - hv_netvsc: Remove rmsg_pgcnt",
                            "    - Drivers: hv: Allow vmbus_sendpacket_mpb_desc() to create multiple ranges",
                            "    - Drivers: hv: vmbus: Remove vmbus_sendpacket_pagebuffer()",
                            "    - ftrace: Fix preemption accounting for stacktrace trigger command",
                            "    - ftrace: Fix preemption accounting for stacktrace filter command",
                            "    - tracing: samples: Initialize trace_array_printk() with the correct",
                            "      function",
                            "    - phy: Fix error handling in tegra_xusb_port_init",
                            "    - phy: renesas: rcar-gen3-usb2: Fix role detection on unbind/bind",
                            "    - phy: renesas: rcar-gen3-usb2: Set timing registers only once",
                            "    - scsi: sd_zbc: block: Respect bio vector limits for REPORT ZONES buffer",
                            "    - smb: client: fix memory leak during error handling for POSIX mkdir",
                            "    - spi: tegra114: Use value to check for invalid delays",
                            "    - net: qede: Initialize qede_ll_ops with designated initializer",
                            "    - dmaengine: ti: k3-udma: Use cap_mask directly from dma_device structure",
                            "      instead of a local copy",
                            "    - dmaengine: idxd: fix memory leak in error handling path of",
                            "      idxd_setup_wqs",
                            "    - dmaengine: idxd: fix memory leak in error handling path of",
                            "      idxd_setup_engines",
                            "    - dmaengine: idxd: fix memory leak in error handling path of",
                            "      idxd_setup_groups",
                            "    - dmaengine: idxd: Add missing cleanup for early error out in",
                            "      idxd_setup_internals",
                            "    - dmaengine: idxd: Add missing cleanups in cleanup internals",
                            "    - dmaengine: idxd: Add missing idxd cleanup to fix memory leak in remove",
                            "      call",
                            "    - dmaengine: idxd: fix memory leak in error handling path of",
                            "      idxd_pci_probe",
                            "    - LoongArch: Explicitly specify code model in Makefile",
                            "    - SAUCE: Revert \"memblock: Accept allocated memory before use in",
                            "      memblock_double_array()\"",
                            "    - phy: tegra: xusb: remove a stray unlock",
                            "    - drivers/platform/x86/amd: pmf: Check for invalid sideloaded Smart PC",
                            "      Policies",
                            "    - drivers/platform/x86/amd: pmf: Check for invalid Smart PC Policies",
                            "    - uio_hv_generic: Fix sysfs creation path for ring buffer",
                            "    - KVM: Add member to struct kvm_gfn_range to indicate private/shared",
                            "    - KVM: x86/mmu: Prevent installing hugepages when mem attributes are",
                            "      changing",
                            "    - iio: chemical: pms7003: use aligned_s64 for timestamp",
                            "    - iio: pressure: mprls0025pa: use aligned_s64 for timestamp",
                            "    - net: dsa: b53: prevent standalone from trying to forward to other ports",
                            "    - netlink: specs: tc: fix a couple of attribute names",
                            "    - LoongArch: Move __arch_cpu_idle() to .cpuidle.text section",
                            "    - btrfs: fix discard worker infinite loop after disabling discard",
                            "    - btrfs: fix folio leak in submit_one_async_extent()",
                            "    - btrfs: add back warning for mount option commit values exceeding 300",
                            "    - drm/amdgpu: fix incorrect MALL size for GFX1151",
                            "    - gpio: pca953x: fix IRQ storm on system wake up",
                            "    - kbuild: Disable -Wdefault-const-init-unsafe",
                            "    - mm: userfaultfd: correct dirty flags set for both present and swap pte",
                            "    - accel/ivpu: Rename ivpu_log_level to fw_log_level",
                            "    - accel/ivpu: Reset fw log on cold boot",
                            "    - accel/ivpu: Refactor functions in ivpu_fw_log.c",
                            "    - drm/fbdev-dma: Support struct drm_driver.fbdev_probe",
                            "    - Upstream stable to v6.6.92, v6.12.30",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-37968",
                            "    - iio: light: opt3001: fix deadlock due to concurrent flag access",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38011",
                            "    - drm/amdgpu: csa unmap use uninterruptible lock",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-21931",
                            "    - hwpoison, memory_hotplug: lock folio before unmap hwpoisoned folio",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-37960",
                            "    - memblock: Accept allocated memory before use in memblock_double_array()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-37967",
                            "    - usb: typec: ucsi: displayport: Fix deadlock",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-22102",
                            "    - Bluetooth: btnxpuart: Fix kernel panic during FW release",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38008",
                            "    - mm/page_alloc: fix race condition in unaccepted memory handling",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38014",
                            "    - dmaengine: idxd: Refactor remove call with idxd_cleanup() helper",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38015",
                            "    - dmaengine: idxd: fix memory leak in error handling path of idxd_alloc",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38005",
                            "    - dmaengine: ti: k3-udma: Add missing locking",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38009",
                            "    - wifi: mt76: disable napi on driver removal",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38010",
                            "    - phy: tegra: xusb: Use a bitmask for UTMI pad power state tracking",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38095",
                            "    - dma-buf: insert memory barrier before updating num_fences",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38018",
                            "    - net/tls: fix kernel panic when alloc_page failed",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38019",
                            "    - mlxsw: spectrum_router: Fix use-after-free when deleting GRE net devices",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38013",
                            "    - wifi: mac80211: Set n_channels after allocating struct",
                            "      cfg80211_scan_request",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38027",
                            "    - regulator: max20086: fix invalid memory access",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38020",
                            "    - net/mlx5e: Disable MACsec offload for uplink representor profile",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38094",
                            "    - net: cadence: macb: Fix a possible deadlock in macb_halt_tx.",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38006",
                            "    - net: mctp: Don't access ifa_index when missing",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-37992",
                            "    - net_sched: Flush gso_skb list too during ->change()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38023",
                            "    - nfs: handle failure of nfs_get_lock_context in unlock path",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38007",
                            "    - HID: uclogic: Add NULL check in uclogic_input_configured()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38024",
                            "    - RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277)",
                            "    - dm: add missing unlock on in dm_keyslot_evict()",
                            "    - arm64: dts: imx8mm-verdin: Link reg_usdhc2_vqmmc to usdhc2",
                            "    - can: mcan: m_can_class_unregister(): fix order of unregistration calls",
                            "    - can: mcp251xfd: mcp251xfd_remove(): fix order of unregistration calls",
                            "    - ksmbd: fix memory leak in parse_lease_state()",
                            "    - SAUCE: Revert \"sch_htb: make htb_deactivate() idempotent\"",
                            "    - sch_htb: make htb_deactivate() idempotent",
                            "    - gre: Fix again IPv6 link-local address generation.",
                            "    - netdevice: add netdev_tx_reset_subqueue() shorthand",
                            "    - net: ethernet: mtk_eth_soc: reset all TX queues on DMA free",
                            "    - can: mcp251xfd: fix TDC setting for low data bit rates",
                            "    - can: gw: fix RCU/BH usage in cgw_create_job()",
                            "    - net: dsa: b53: allow leaky reserved multicast",
                            "    - net: dsa: b53: fix clearing PVID of a port",
                            "    - net: dsa: b53: fix flushing old pvid VLAN on pvid change",
                            "    - net: dsa: b53: fix VLAN ID for untagged vlan on bridge leave",
                            "    - net: dsa: b53: always rejoin default untagged VLAN on bridge leave",
                            "    - net: dsa: b53: fix learning on VLAN unaware bridges",
                            "    - Input: cyttsp5 - ensure minimum reset pulse width",
                            "    - Input: cyttsp5 - fix power control issue on wakeup",
                            "    - Input: xpad - fix Share button on Xbox One controllers",
                            "    - Input: xpad - add support for 8BitDo Ultimate 2 Wireless Controller",
                            "    - Input: synaptics - enable InterTouch on Dynabook Portege X30-D",
                            "    - Input: synaptics - enable InterTouch on Dynabook Portege X30L-G",
                            "    - Input: synaptics - enable InterTouch on Dell Precision M3800",
                            "    - Input: synaptics - enable SMBus for HP Elitebook 850 G1",
                            "    - Input: synaptics - enable InterTouch on TUXEDO InfinityBook Pro 14 v5",
                            "    - staging: iio: adc: ad7816: Correct conditional logic for store mode",
                            "    - staging: axis-fifo: Remove hardware resets for user errors",
                            "    - staging: axis-fifo: Correct handling of tx_fifo_depth for size",
                            "      validation",
                            "    - drm/amd/display: Shift DMUB AUX reply command if necessary",
                            "    - iio: adc: ad7606: fix serial register access",
                            "    - iio: adc: rockchip: Fix clock initialization sequence",
                            "    - iio: adis16201: Correct inclinometer channel resolution",
                            "    - drm/amd/display: Fix the checking condition in dmub aux handling",
                            "    - drm/amd/display: Remove incorrect checking in dmub aux handler",
                            "    - drm/amd/display: Fix wrong handling for AUX_DEFER case",
                            "    - drm/amd/display: Copy AUX read reply data whenever length > 0",
                            "    - usb: uhci-platform: Make the clock really optional",
                            "    - xen: swiotlb: Use swiotlb bouncing if kmalloc allocation demands it",
                            "    - clocksource/i8253: Use raw_spinlock_irqsave() in",
                            "      clockevent_i8253_disable()",
                            "    - x86/microcode: Consolidate the loader enablement checking",
                            "    - ocfs2: switch osb->disable_recovery to enum",
                            "    - ocfs2: implement handshaking with ocfs2 recovery thread",
                            "    - ocfs2: stop quota recovery before disabling quotas",
                            "    - usb: cdnsp: Fix issue with resuming from L1",
                            "    - usb: cdnsp: fix L1 resume issue for RTL_REVISION_NEW_LPM version",
                            "    - usb: gadget: f_ecm: Add get_status callback",
                            "    - usb: gadget: tegra-xudc: ACK ST_RC after clearing CTRL_RUN",
                            "    - usb: gadget: Use get_status callback to set remote wakeup capability",
                            "    - usb: host: tegra: Prevent host controller crash when OTG port is used",
                            "    - usb: typec: tcpm: delay SNK_TRY_WAIT_DEBOUNCE to SRC_TRYWAIT transition",
                            "    - USB: usbtmc: use interruptible sleep in usbtmc_read",
                            "    - usb: usbtmc: Fix erroneous get_stb ioctl error returns",
                            "    - usb: usbtmc: Fix erroneous wait_srq ioctl return",
                            "    - usb: usbtmc: Fix erroneous generic_read ioctl return",
                            "    - iio: accel: adxl367: fix setting odr for activity time update",
                            "    - iio: temp: maxim-thermocouple: Fix potential lack of DMA safe buffer.",
                            "    - types: Complement the aligned types with signed 64-bit one",
                            "    - iio: accel: adxl355: Make timestamp 64-bit aligned using aligned_s64",
                            "    - iio: adc: dln2: Use aligned_s64 for timestamp",
                            "    - MIPS: Fix MAX_REG_OFFSET",
                            "    - drm/panel: simple: Update timings for AUO G101EVN010",
                            "    - do_umount(): add missing barrier before refcount checks in sync case",
                            "    - io_uring: always arm linked timeouts prior to issue",
                            "    - arm64: insn: Add support for encoding DSB",
                            "    - arm64: proton-pack: Expose whether the platform is mitigated by firmware",
                            "    - arm64: proton-pack: Expose whether the branchy loop k value",
                            "    - arm64: proton-pack: Add new CPUs 'k' values for branch mitigation",
                            "    - x86/bpf: Call branch history clearing sequence on exit",
                            "    - x86/bpf: Add IBHF call at end of classic BPF",
                            "    - x86/bhi: Do not set BHI_DIS_S in 32-bit mode",
                            "    - x86/speculation: Simplify and make CALL_NOSPEC consistent",
                            "    - x86/speculation: Add a conditional CS prefix to CALL_NOSPEC",
                            "    - x86/speculation: Remove the extra #ifdef around CALL_NOSPEC",
                            "    - Documentation: x86/bugs/its: Add ITS documentation",
                            "    - x86/its: Enumerate Indirect Target Selection (ITS) bug",
                            "    - x86/its: Add support for ITS-safe indirect thunk",
                            "    - [Config] enable Indirect Target Selection mitigation",
                            "    - x86/its: Add support for ITS-safe return thunk",
                            "    - x86/its: Enable Indirect Target Selection mitigation",
                            "    - x86/its: Add \"vmexit\" option to skip mitigation on some CPUs",
                            "    - x86/its: Add support for RSB stuffing mitigation",
                            "    - x86/its: Align RETs in BHB clear sequence to avoid thunking",
                            "    - x86/ibt: Keep IBT disabled during alternative patching",
                            "    - x86/its: Use dynamic thunks for indirect branches",
                            "    - x86/its: Fix build errors when CONFIG_MODULES=n",
                            "    - x86/its: FineIBT-paranoid vs ITS",
                            "    - x86/its: Fix build error for its_static_thunk()",
                            "    - firmware: arm_scmi: Fix timeout checks on polling path",
                            "    - s390/entry: Fix last breaking event handling in case of stack corruption",
                            "    - erofs: ensure the extra temporary copy is valid for shortened bvecs",
                            "    - net: dsa: b53: keep CPU port always tagged again",
                            "    - net: dsa: b53: do not allow to configure VLAN 0",
                            "    - net: dsa: b53: do not program vlans when vlan filtering is off",
                            "    - net: dsa: b53: fix toggling vlan_filtering",
                            "    - net: dsa: b53: do not set learning and unicast/multicast on up",
                            "    - rust: clean Rust 1.88.0's warning about `clippy::disallowed_macros`",
                            "      configuration",
                            "    - mm/userfaultfd: fix uninitialized output field for -EAGAIN race",
                            "    - selftests/mm: compaction_test: support platform with huge mount of",
                            "      memory",
                            "    - selftests/mm: fix a build failure on powerpc",
                            "    - io_uring: ensure deferred completions are flushed for multishot",
                            "    - iio: imu: inv_mpu6050: align buffer for timestamp",
                            "    - drm/xe: Add page queue multiplier",
                            "    - usb: dwc3: gadget: Make gadget_wakeup asynchronous",
                            "    - riscv: misaligned: Add handling for ZCB instructions",
                            "    - riscv: misaligned: factorize trap handling",
                            "    - riscv: misaligned: enable IRQs while handling misaligned accesses",
                            "    - selftest/x86/bugs: Add selftests for ITS",
                            "    - Upstream stable to v6.6.91, v6.12.29",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37960",
                            "    - memblock: Accept allocated memory before use in memblock_double_array()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37957",
                            "    - KVM: SVM: Forcibly leave SMM mode on SHUTDOWN interception",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37963",
                            "    - arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37948",
                            "    - arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37994",
                            "    - usb: typec: ucsi: displayport: Fix NULL pointer access",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37995",
                            "    - module: ensure that kobject_put() is safe for module type kobjects",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37949",
                            "    - xenbus: Use kref to track req lifetime",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37954",
                            "    - smb: client: Avoid race in open_cached_dir with lease breaks",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37951",
                            "    - drm/v3d: Add job to pending list if the reset was skipped",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37969",
                            "    - iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_tagged_fifo",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37970",
                            "    - iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_fifo",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37972",
                            "    - Input: mtk-pmic-keys - fix possible null pointer dereference",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37959",
                            "    - bpf: Scrub packet on bpf_redirect_peer",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37961",
                            "    - ipvs: fix uninit-value for saddr in do_output_route4",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37998",
                            "    - openvswitch: Fix unsafe attribute parsing in output_userspace()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37952",
                            "    - ksmbd: Fix UAF in __close_file_table_ids",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37947",
                            "    - ksmbd: prevent out-of-bounds stream writes by validating *pos",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37956",
                            "    - ksmbd: prevent rename with empty string",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37973",
                            "    - wifi: cfg80211: fix out-of-bounds access during multi-link element",
                            "      defragmentation",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559)",
                            "    - ALSA: usb-audio: Add retry on -EPROTO from usb_set_interface()",
                            "    - ALSA: usb-audio: Add second USB ID for Jabra Evolve 65 headset",
                            "    - btrfs: fix COW handling in run_delalloc_nocow()",
                            "    - drm/fdinfo: Protect against driver unbind",
                            "    - EDAC/altera: Test the correct error reg offset",
                            "    - EDAC/altera: Set DDR and SDMMC interrupt mask before registration",
                            "    - i2c: imx-lpi2c: Fix clock count when probe defers",
                            "    - arm64: errata: Add missing sentinels to Spectre-BHB MIDR arrays",
                            "    - amd-xgbe: Fix to ensure dependent features are toggled with RX checksum",
                            "      offload",
                            "    - mm/memblock: pass size instead of end to memblock_set_node()",
                            "    - mm/memblock: repeat setting reserved region nid if array is doubled",
                            "    - mmc: renesas_sdhi: Fix error handling in renesas_sdhi_probe",
                            "    - spi: tegra114: Don't fail set_cs_timing when delays are zero",
                            "    - tracing: Do not take trace_event_sem in print_event_fields()",
                            "    - dm-integrity: fix a warning on invalid table line",
                            "    - dm: always update the array size in realloc_argv on success",
                            "    - iommu/vt-d: Apply quirk_iommu_igfx for 8086:0044 (QM57/QS57)",
                            "    - platform/x86/amd: pmc: Require at least 2.5 seconds between HW sleep",
                            "      cycles",
                            "    - platform/x86/intel-uncore-freq: Fix missing uncore sysfs during CPU",
                            "      hotplug",
                            "    - smb: client: fix zero length for mkdir POSIX create context",
                            "    - cpufreq: Avoid using inconsistent policy->min and policy->max",
                            "    - cpufreq: Fix setting policy limits when frequency tables are used",
                            "    - PCI: imx6: Skip controller_id generation logic for i.MX7D",
                            "    - ASoC: soc-pcm: Fix hw_params() and DAPM widget sequence",
                            "    - powerpc/boot: Check for ld-option support",
                            "    - drm/i915/pxp: fix undefined reference to",
                            "      `intel_pxp_gsccs_is_ready_for_sessions'",
                            "    - powerpc/boot: Fix dash warning",
                            "    - net/mlx5: E-Switch, Initialize MAC Address for Default GID",
                            "    - net/mlx5: E-switch, Fix error handling for enabling roce",
                            "    - net: Rename mono_delivery_time to tstamp_type for scalabilty",
                            "    - Bluetooth: L2CAP: copy RX timestamp to new fragments",
                            "    - net: mscc: ocelot: treat 802.1ad tagged traffic as 802.1Q-untagged",
                            "    - net: mscc: ocelot: delete PVID VLAN when readding it as non-PVID",
                            "    - net: ethernet: mtk-star-emac: rearm interrupts in rx_poll only when",
                            "      advised",
                            "    - pds_core: delete VF dev on reset",
                            "    - pds_core: make pdsc_auxbus_dev_del() void",
                            "    - pds_core: specify auxiliary_device to be created",
                            "    - nvme-pci: fix queue unquiesce check on slot_reset",
                            "    - net: dlink: Correct endianness handling of led_mode",
                            "    - net: mdio: mux-meson-gxl: set reversed bit when using internal phy",
                            "    - igc: fix lock order in igc_ptp_reset",
                            "    - net: dsa: felix: fix broken taprio gate states after clock jump",
                            "    - net: ipv6: fix UDPv6 GSO segmentation with NAT",
                            "    - bnxt_en: Fix coredump logic to free allocated buffer",
                            "    - bnxt_en: Fix ethtool -d byte order for 32-bit values",
                            "    - nvme-tcp: fix premature queue removal and I/O failover",
                            "    - net: fec: ERR007885 Workaround for conventional TX",
                            "    - net: hns3: store rx VLAN tag offload state for VF",
                            "    - net: hns3: fix an interrupt residual problem",
                            "    - net: hns3: fixed debugfs tm_qset size",
                            "    - net: hns3: defer calling ptp_clock_register()",
                            "    - net: vertexcom: mse102x: Fix possible stuck of SPI interrupt",
                            "    - net: vertexcom: mse102x: Fix LEN_MASK",
                            "    - net: vertexcom: mse102x: Add range check for CMD_RTS",
                            "    - net: vertexcom: mse102x: Fix RX error handling",
                            "    - ASoC: Use of_property_read_bool()",
                            "    - ASoC: soc-core: Stop using of_property_read_bool() for non-boolean",
                            "      properties",
                            "    - firmware: arm_ffa: Skip Rx buffer ownership release if not acquired",
                            "    - ARM: dts: opos6ul: add ksz8081 phy properties",
                            "    - arm64: dts: st: Adjust interrupt-controller for stm32mp25 SoCs",
                            "    - arm64: dts: st: Use 128kB size for aliased GIC400 register access on",
                            "      stm32mp25 SoCs",
                            "    - Revert \"drm/meson: vclk: fix calculation of 59.94 fractional rates\"",
                            "    - xhci: Add helper to set an interrupters interrupt moderation interval",
                            "    - xhci: support setting interrupt moderation IMOD for secondary",
                            "      interrupters",
                            "    - xhci: Limit time spent with xHC interrupts disabled during bus resume",
                            "    - kernel: param: rename locate_module_kobject",
                            "    - kernel: globalize lookup_or_create_module_kobject()",
                            "    - drivers: base: handle module_kobject creation",
                            "    - iommu/arm-smmu-v3: Use the new rb tree helpers",
                            "    - iommu/arm-smmu-v3: Fix iommu_device_probe bug due to duplicated stream",
                            "      ids",
                            "    - drm/amd/display: Add scoped mutexes for amdgpu_dm_dhcp",
                            "    - dm: fix copying after src array boundaries",
                            "    - bpf: Fix BPF_INTERNAL namespace import",
                            "    - binder: fix offset calculation in debug log",
                            "    - perf/x86/intel: Only check the group flag for X86 leader",
                            "    - drm: Select DRM_KMS_HELPER from DRM_DEBUG_DP_MST_TOPOLOGY_REFS",
                            "    - iommu/arm-smmu-v3: Fix pgsize_bit for sva domains",
                            "    - pinctrl: imx: Return NULL if no group is matched and found",
                            "    - Bluetooth: hci_conn: Fix not setting timeout for BIG Create Sync",
                            "    - idpf: fix offloads support for encapsulated packets",
                            "    - drm/tests: shmem: Fix memleak",
                            "    - idpf: fix potential memory leak on kcalloc() failure",
                            "    - idpf: protect shutdown from reset",
                            "    - ALSA: hda/realtek: Fix built-mic regression on other ASUS models",
                            "    - bnxt_en: Add missing skb_mark_for_recycle() in bnxt_rx_vlan()",
                            "    - nvme-tcp: select CONFIG_TLS from CONFIG_NVME_TCP_TLS",
                            "    - nvmet-tcp: select CONFIG_TLS from CONFIG_NVME_TARGET_TCP_TLS",
                            "    - accel/ivpu: Fix a typo",
                            "    - drm/xe: Ensure fixed_slice_mode gets set after ccs_mode change",
                            "    - Upstream stable to v6.6.90, v6.12.27, v6.12.28",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37920",
                            "    - xsk: Fix race condition in AF_XDP generic RX path",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37900",
                            "    - iommu: Fix two issues in iommu_copy_struct_from_user()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37931",
                            "    - btrfs: adjust subpage bit start based on sectorsize",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37903",
                            "    - drm/amd/display: Fix slab-use-after-free in hdcp",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37905",
                            "    - firmware: arm_scmi: Balance device refcount when destroying devices",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37933",
                            "    - octeon_ep: Fix host hang issue during device reboot",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37909",
                            "    - net: lan743x: Fix memleak issue when GSO enabled",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37911",
                            "    - bnxt_en: Fix out-of-bound memcpy() during ethtool -w",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37935",
                            "    - net: ethernet: mtk_eth_soc: fix SER panic with 4GB+ RAM",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37891",
                            "    - ALSA: ump: Fix buffer overflow at UMP SysEx message conversion",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37912",
                            "    - ice: Check VF VSI Pointer Value in ice_vc_add_fdir_fltr()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37913",
                            "    - net_sched: qfq: Fix double list add in class with netem as child qdisc",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37914",
                            "    - net_sched: ets: Fix double list add in class with netem as child qdisc",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37915",
                            "    - net_sched: drr: Fix double list add in class with netem as child qdisc",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37916",
                            "    - pds_core: remove write-after-free of client_id",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37917",
                            "    - net: ethernet: mtk-star-emac: fix spinlock recursion issues on rx/tx",
                            "      poll",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37918",
                            "    - Bluetooth: btusb: avoid NULL pointer dereference in skb_dequeue()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37921",
                            "    - vxlan: vnifilter: Fix unlocked deletion of default FDB entry",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37897",
                            "    - wifi: plfxlc: Remove erroneous assert in plfxlc_mac_release",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37922",
                            "    - book3s64/radix : Align section vmemmap start address to PAGE_SIZE",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37923",
                            "    - tracing: Fix oob write in trace_seq_to_buffer()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37924",
                            "    - ksmbd: fix use-after-free in kerberos authentication",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37927",
                            "    - iommu/amd: Fix potential buffer overflow in parse_ivrs_acpihid",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37928",
                            "    - dm-bufio: don't schedule in atomic context",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37990",
                            "    - wifi: brcm80211: fmac: Add error handling for brcmf_usb_dl_writeimage()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37901",
                            "    - irqchip/qcom-mpm: Prevent crash when trying to handle non-wake GPIOs",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37936",
                            "    - perf/x86/intel: KVM: Mask PEBS_ENABLE loaded for guest with vCPU's",
                            "      value.",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37991",
                            "    - parisc: Fix double SIGFPE crash",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37930",
                            "    - drm/nouveau: Fix WARN_ON in nouveau_fence_context_kill()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307)",
                            "    - module: sign with sha512 instead of sha1 by default",
                            "    - x86/extable: Remove unused fixup type EX_TYPE_COPY",
                            "    - tracing: Add __string_len() example",
                            "    - tracing: Add __print_dynamic_array() helper",
                            "    - soc: qcom: ice: introduce devm_of_qcom_ice_get",
                            "    - mmc: sdhci-msm: fix dev reference leaked through of_qcom_ice_get",
                            "    - auxdisplay: hd44780: Convert to platform remove callback returning void",
                            "    - auxdisplay: hd44780: Fix an API misuse in hd44780.c",
                            "    - net: dsa: mv88e6xxx: fix internal PHYs for 6320 family",
                            "    - net: dsa: mv88e6xxx: fix VTU methods for 6320 family",
                            "    - ASoC: qcom: q6apm-dai: drop unused 'q6apm_dai_rtd' fields",
                            "    - ASoC: q6apm-dai: schedule all available frames to avoid dsp under-runs",
                            "    - ASoC: q6apm-dai: make use of q6apm_get_hw_pointer",
                            "    - iio: adc: ad7768-1: Move setting of val a bit later to avoid unnecessary",
                            "      return value check",
                            "    - iio: adc: ad7768-1: Fix conversion result sign",
                            "    - arm64: tegra: Remove the Orin NX/Nano suspend key",
                            "    - clk: renesas: r9a07g04[34]: Fix typo for sel_shdi variable",
                            "    - clk: renesas: r9a07g043: Fix HP clock source for RZ/Five",
                            "    - of: resolver: Simplify of_resolve_phandles() using __free()",
                            "    - of: resolver: Fix device node refcount leakage in of_resolve_phandles()",
                            "    - scsi: ufs: qcom: fix dev reference leaked through of_qcom_ice_get",
                            "    - cpufreq/sched: Explicitly synchronize limits_changed flag handling",
                            "    - ceph: Fix incorrect flush end position calculation",
                            "    - dma/contiguous: avoid warning about unused size_bytes",
                            "    - cpufreq: cppc: Fix invalid return value in .get() callback",
                            "    - btrfs: avoid page_lockend underflow in btrfs_punch_hole_lock_range()",
                            "    - scsi: core: Clear flags for scsi_cmnd that did not complete",
                            "    - net: ethernet: mtk_eth_soc: net: revise NETSYSv3 hardware configuration",
                            "    - net: dsa: mt7530: sync driver-specific behavior of MT7531 variants",
                            "    - pds_core: Remove unnecessary check in pds_client_adminq_cmd()",
                            "    - iommu/amd: Return an error if vCPU affinity is set for non-vCPU IRTE",
                            "    - splice: remove duplicate noinline from pipe_clear_nowait",
                            "    - perf/x86: Fix non-sampling (counting) events on certain x86 platforms",
                            "    - LoongArch: Select ARCH_USE_MEMTEST",
                            "    - LoongArch: Make regs_irqs_disabled() more clear",
                            "    - LoongArch: Make do_xyz() exception handlers more robust",
                            "    - virtio_console: fix missing byte order handling for cols and rows",
                            "    - crypto: atmel-sha204a - Set hwrng quality to lowest possible",
                            "    - net: selftests: initialize TCP header and skb payload with zero",
                            "    - net: phy: microchip: force IRQ polling mode for lan88xx",
                            "    - drm/amd/display: Fix gpu reset in multidisplay config",
                            "    - LoongArch: Return NULL from huge_pte_offset() for invalid PMD",
                            "    - LoongArch: Fix panic caused by NULL-PMD in huge_pte_offset()",
                            "    - LoongArch: Remove a bogus reference to ZONE_DMA",
                            "    - io_uring: fix 'sync' handling of io_fallback_tw()",
                            "    - KVM: SVM: Allocate IR data using atomic allocation",
                            "    - cxl/core/regs.c: Skip Memory Space Enable check for RCD and RCH Ports",
                            "    - ata: libata-scsi: Improve CDL control",
                            "    - ata: libata-scsi: Fix ata_mselect_control_ata_feature() return type",
                            "    - ata: libata-scsi: Fix ata_msense_control_ata_feature()",
                            "    - USB: storage: quirk for ADATA Portable HDD CH94",
                            "    - scsi: Improve CDL control",
                            "    - mei: me: add panther lake H DID",
                            "    - KVM: x86: Explicitly treat routing entry type changes as changes",
                            "    - char: misc: register chrdev region with all possible minors",
                            "    - misc: microchip: pci1xxxx: Fix incorrect IRQ status handling during ack",
                            "    - serial: msm: Configure correct working mode before starting earlycon",
                            "    - serial: sifive: lock port in startup()/shutdown() callbacks",
                            "    - USB: serial: ftdi_sio: add support for Abacus Electrics Optical Probe",
                            "    - USB: serial: option: add Sierra Wireless EM9291",
                            "    - USB: serial: simple: add OWON HDS200 series oscilloscope support",
                            "    - usb: chipidea: ci_hdrc_imx: fix call balance of regulator routines",
                            "    - usb: chipidea: ci_hdrc_imx: implement usb_phy_init() error handling",
                            "    - USB: OHCI: Add quirk for LS7A OHCI controller (rev 0x02)",
                            "    - usb: dwc3: xilinx: Prevent spike in reset signal",
                            "    - usb: quirks: add DELAY_INIT quirk for Silicon Motion Flash Drive",
                            "    - usb: quirks: Add delay init quirk for SanDisk 3.2Gen1 Flash Drive",
                            "    - USB: VLI disk crashes if LPM is used",
                            "    - USB: wdm: handle IO errors in wdm_wwan_port_start",
                            "    - USB: wdm: wdm_wwan_port_tx_complete mutex in atomic context",
                            "    - USB: wdm: add annotation",
                            "    - pinctrl: renesas: rza2: Fix potential NULL pointer dereference",
                            "    - MIPS: cm: Detect CM quirks from device tree",
                            "    - crypto: ccp - Add support for PCI device 0x1134",
                            "    - clk: check for disabled clock-provider in of_clk_get_hw_from_clkspec()",
                            "    - parisc: PDT: Fix missing prototype warning",
                            "    - s390/tty: Fix a potential memory leak bug",
                            "    - bpf: bpftool: Setting error code in do_loader()",
                            "    - bpf: Only fails the busy counter check in bpf_cgrp_storage_get if it",
                            "      creates storage",
                            "    - bpf: Reject attaching fexit/fmod_ret to __noreturn functions",
                            "    - mailbox: pcc: Fix the possible race in updation of chan_in_use flag",
                            "    - mailbox: pcc: Always clear the platform ack interrupt first",
                            "    - usb: host: max3421-hcd: Add missing spi_device_id table",
                            "    - fs/ntfs3: Fix WARNING in ntfs_extend_initialized_size",
                            "    - usb: dwc3: gadget: Refactor loop to avoid NULL endpoints",
                            "    - usb: dwc3: gadget: Avoid using reserved endpoints on Intel Merrifield",
                            "    - usb: host: xhci-plat: mvebu: use ->quirks instead of ->init_quirk() func",
                            "    - thunderbolt: Scan retimers after device router has been enumerated",
                            "    - objtool: Silence more KCOV warnings",
                            "    - objtool, panic: Disable SMAP in __stack_chk_fail()",
                            "    - objtool, ASoC: codecs: wcd934x: Remove potential undefined behavior in",
                            "      wcd934x_slim_irq_handler()",
                            "    - objtool, regulator: rk808: Remove potential undefined behavior in",
                            "      rk806_set_mode_dcdc()",
                            "    - objtool, lkdtm: Obfuscate the do_nothing() pointer",
                            "    - ntb: reduce stack usage in idt_scan_mws",
                            "    - ntb_hw_amd: Add NTB PCI ID for new gen CPU",
                            "    - rtc: pcf85063: do a SW reset if POR failed",
                            "    - io_uring: always do atomic put from iowq",
                            "    - sched/isolation: Make CONFIG_CPU_ISOLATION depend on CONFIG_SMP",
                            "    - KVM: s390: Don't use %pK through tracepoints",
                            "    - KVM: s390: Don't use %pK through debug printing",
                            "    - selftests: ublk: fix test_stripe_04",
                            "    - xen: Change xen-acpi-processor dom0 dependency",
                            "    - ACPI: EC: Set ec_no_wakeup for Lenovo Go S",
                            "    - ACPI PPTT: Fix coding mistakes in a couple of sizeof() calls",
                            "    - nvme: multipath: fix return value of nvme_available_path",
                            "    - objtool: Stop UNRET validation on UD2",
                            "    - gpiolib: of: Move Atmel HSMCI quirk up out of the regulator comment",
                            "    - selftests/mincore: Allow read-ahead pages to reach the end of the file",
                            "    - x86/bugs: Use SBPB in write_ibpb() if applicable",
                            "    - x86/bugs: Don't fill RSB on VMEXIT with eIBRS+retpoline",
                            "    - x86/bugs: Don't fill RSB on context switch with eIBRS",
                            "    - nvmet-fc: take tgtport reference only once",
                            "    - cifs: Fix encoding of SMB1 Session Setup Kerberos Request in non-UNICODE",
                            "      mode",
                            "    - timekeeping: Add a lockdep override in tick_freeze()",
                            "    - ext4: make block validity check resistent to sb bh corruption",
                            "    - scsi: hisi_sas: Fix I/O errors caused by hardware port ID changes",
                            "    - scsi: ufs: exynos: Ensure pre_link() executes before",
                            "      exynos_ufs_phy_init()",
                            "    - scsi: pm80xx: Set phy_attached to zero when device is gone",
                            "    - x86/i8253: Call clockevent_i8253_disable() with interrupts disabled",
                            "    - iomap: skip unnecessary ifs_block_is_uptodate check",
                            "    - riscv: Provide all alternative macros all the time",
                            "    - loop: aio inherit the ioprio of original request",
                            "    - spi: tegra210-quad: use WARN_ON_ONCE instead of WARN_ON for timeouts",
                            "    - spi: tegra210-quad: add rate limiting and simplify timeout error message",
                            "    - ubsan: Fix panic from test_ubsan_out_of_bounds",
                            "    - x86/cpu: Add CPU model number for Bartlett Lake CPUs with Raptor Cove",
                            "      cores",
                            "    - x86/pvh: Call C code via the kernel virtual mapping",
                            "    - Revert \"drivers: core: synchronize really_probe() and dev_uevent()\"",
                            "    - driver core: introduce device_set_driver() helper",
                            "    - comedi: jr3_pci: Fix synchronous deletion of timer",
                            "    - net: dsa: mv88e6xxx: fix atu_move_port_mask for 6341 family",
                            "    - net: dsa: mv88e6xxx: enable PVT for 6321 switch",
                            "    - net: dsa: mv88e6xxx: enable .port_set_policy() for 6320 family",
                            "    - net: dsa: mv88e6xxx: enable STU methods for 6320 family",
                            "    - MIPS: cm: Fix warning if MIPS_CM is disabled",
                            "    - objtool: Ignore end-of-section jumps for KCOV/GCOV",
                            "    - objtool: Silence more KCOV warnings, part 2",
                            "    - ALSA: hda/cirrus_scodec_test: Don't select dependencies",
                            "    - ALSA: hda: improve bass speaker support for ASUS Zenbook UM5606WA",
                            "    - ALSA: hda/realtek: Workaround for resume on Dell Venue 11 Pro 7130",
                            "    - ALSA: hda/realtek - Fixed ASUS platform headset Mic issue",
                            "    - net: ethernet: mtk_eth_soc: reapply mdc divider on reset",
                            "    - riscv: Use kvmalloc_array on relocation_hashtable",
                            "    - riscv: module: Allocate PLT entries for R_RISCV_PLT32",
                            "    - ASoC: fsl: fsl_qmc_audio: Reset audio data pointers on TRIGGER_START",
                            "      event",
                            "    - dma-buf/sw_sync: Decrement refcount on error in",
                            "      sw_sync_ioctl_get_deadline()",
                            "    - mm/compaction: fix bug in hugetlb handling pathway",
                            "    - platform/x86: amd: pmf: Fix STT limits",
                            "    - drm/amd/display: Add HP Elitebook 645 to the quirk list for eDP on DP1",
                            "    - drm/amd/display: Add HP Probook 445 and 465 to the quirk list for eDP on",
                            "      DP1",
                            "    - drm/xe/dma_buf: stop relying on placement in unmap",
                            "    - drm/amdgpu: fix warning of drm_mm_clean",
                            "    - arm64/sysreg: Update register fields for ID_AA64MMFR0_EL1",
                            "    - arm64/sysreg: Add register fields for HDFGRTR2_EL2",
                            "    - arm64/sysreg: Add register fields for HDFGWTR2_EL2",
                            "    - arm64/sysreg: Add register fields for HFGITR2_EL2",
                            "    - arm64/sysreg: Add register fields for HFGRTR2_EL2",
                            "    - arm64/sysreg: Add register fields for HFGWTR2_EL2",
                            "    - kbuild: Add '-fno-builtin-wcslen'",
                            "    - drm/amd/display: Temporarily disable hostvm on DCN31",
                            "    - block: remove rq_list_move",
                            "    - bpf: add find_containing_subprog() utility function",
                            "    - selftests/bpf: test for changing packet data from global functions",
                            "    - selftests/bpf: freplace tests for tracking of changes_packet_data",
                            "    - selftests/bpf: validate that tail call invalidates packet pointers",
                            "    - selftests/bpf: extend changes_pkt_data with cases w/o subprograms",
                            "    - media: i2c: imx214: Use subdev active state",
                            "    - media: i2c: imx214: Simplify with dev_err_probe()",
                            "    - media: i2c: imx214: Convert to CCI register access helpers",
                            "    - media: i2c: imx214: Replace register addresses with macros",
                            "    - media: i2c: imx214: Check number of lanes from device tree",
                            "    - media: i2c: imx214: Fix link frequency validation",
                            "    - scsi: ufs: exynos: Move UFS shareability value to drvdata",
                            "    - cgroup/cpuset: Expose cpuset filesystem with cpuset v1 only",
                            "    - cgroup/cpuset-v1: Add missing support for cpuset_v2_mode",
                            "    - vhost-scsi: Add better resource allocation failure handling",
                            "    - vhost-scsi: Fix vhost_scsi_send_bad_target()",
                            "    - vhost-scsi: Fix vhost_scsi_send_status()",
                            "    - scsi: ufs: mcq: Use ufshcd_mcq_req_to_hwq() to simplify updating hwq",
                            "    - riscv: Replace function-like macro by static inline function",
                            "    - bpf: Add namespace to BPF internal symbols",
                            "    - netfilter: fib: avoid lookup if socket is available",
                            "    - drm: panel: jd9365da: fix reset signal polarity in unprepare",
                            "    - drm/amd/display: Force full update in gpu reset",
                            "    - KVM: x86: Take irqfds.lock when adding/deleting IRQ bypass producer",
                            "    - firmware: stratix10-svc: Add of_platform_default_populate()",
                            "    - i3c: master: svc: Add support for Nuvoton npcm845 i3c",
                            "    - 9p/trans_fd: mark concurrent read and writes to p9_conn->err",
                            "    - x86/xen: disable CPU idle and frequency drivers for PVH dom0",
                            "    - nvmet-fc: put ref when assoc->del_work is already scheduled",
                            "    - scsi: ufs: exynos: Move phy calls to .exit() callback",
                            "    - ASoC: fsl_asrc_dma: get codec or cpu dai from backend",
                            "    - xfs: do not check NEEDSREPAIR if ro,norecovery mount.",
                            "    - xfs: Do not allow norecovery mount with quotacheck",
                            "    - xfs: rename xfs_iomap_swapfile_activate to xfs_vm_swap_activate",
                            "    - xfs: flush inodegc before swapon",
                            "    - selftests/bpf: fix bpf_map_redirect call for cpu map test",
                            "    - selftests/bpf: make xdp_cpumap_attach keep redirect prog attached",
                            "    - selftests/bpf: check program redirect in xdp_cpumap_attach",
                            "    - selftests/bpf: Adjust data size to have ETH_HLEN",
                            "    - Revert \"net: dsa: mv88e6xxx: fix internal PHYs for 6320 family\"",
                            "    - iommu: Handle race with default domain setup",
                            "    - media: i2c: imx214: Fix uninitialized variable in imx214_set_ctrl()",
                            "    - usb: typec: class: Unlocked on error in typec_register_partner()",
                            "    - Upstream stable to v6.6.89, v6.12.25, v6.12.26",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37986",
                            "    - usb: typec: class: Invalidate USB device pointers on partner",
                            "      unregistration",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37809",
                            "    - usb: typec: class: Fix NULL pointer access",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37816",
                            "    - mei: vsc: Fix fortify-panic caused by invalid counted_by() use",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37822",
                            "    - riscv: uprobes: Add missing fence.i after building the XOL buffer",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37987",
                            "    - pds_core: Prevent possible adminq overflow/stuck condition",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37826",
                            "    - scsi: ufs: core: Add NULL check in ufshcd_mcq_compl_pending_transfer()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37827",
                            "    - btrfs: zoned: return EIO on RAID1 block group write pointer mismatch",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37977",
                            "    - scsi: ufs: exynos: Disable iocc if dma-coherent property isn't set",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37944",
                            "    - wifi: ath12k: Fix invalid entry fetch in ath12k_dp_mon_srng_process",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37761",
                            "    - drm/xe: Fix an out-of-bounds shift when invalidating TLB",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37763",
                            "    - drm/imagination: take paired job reference",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37764",
                            "    - drm/imagination: fix firmware memory leaks",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37869",
                            "    - drm/xe: Use local fence in error path of xe_migrate_clear",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37978",
                            "    - block: integrity: Do not call set_page_dirty_lock()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37975",
                            "    - riscv: module: Fix out-of-bounds relocation access",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37872",
                            "    - net: txgbe: fix memory leak in txgbe_probe() error path",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37873",
                            "    - eth: bnxt: fix missing ring index trim on error path",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-22120",
                            "    - ext4: goto right label 'out_mmap_sem' in ext4_setattr()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37799",
                            "    - vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37800",
                            "    - driver core: fix potential NULL pointer dereference in dev_uevent()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37878",
                            "    - perf/core: Fix WARN_ON(!ctx) in __free_event() for partial init",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37803",
                            "    - udmabuf: fix a buf size overflow issue during udmabuf creation",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37879",
                            "    - 9p/net: fix improper handling of bogus negative read/write replies",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37983",
                            "    - qibfs: fix _another_ leak",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37881",
                            "    - usb: gadget: aspeed: Add NULL pointer check in ast_vhub_init_dev()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37805",
                            "    - sound/virtio: Fix cancel_sync warnings on uninitialized work_structs",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37883",
                            "    - s390/sclp: Add check for get_zeroed_page()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37884",
                            "    - bpf: Fix deadlock between rcu_tasks_trace and event_mutex.",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37808",
                            "    - crypto: null - Use spin lock instead of mutex",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37985",
                            "    - USB: wdm: close race between wdm_open and wdm_wwan_port_stop",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37810",
                            "    - usb: dwc3: gadget: check that event count does not exceed event buffer",
                            "      length",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37811",
                            "    - usb: chipidea: ci_hdrc_imx: fix usbmisc handling",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37812",
                            "    - usb: cdns3: Fix deadlock when using NCM gadget",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37813",
                            "    - usb: xhci: Fix invalid pointer dereference in Etron workaround",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37815",
                            "    - misc: microchip: pci1xxxx: Fix Kernel panic during IRQ handler",
                            "      registration",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37885",
                            "    - KVM: x86: Reset IRTE to host control if *new* route isn't postable",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37817",
                            "    - mcb: fix a double free bug in chameleon_parse_gdd()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37819",
                            "    - irqchip/gic-v2m: Prevent use after free of gicv2m_get_fwnode()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37820",
                            "    - xen-netfront: handle NULL returned by xdp_convert_buff_to_frame()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37886",
                            "    - pds_core: make wait_context part of q_info",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37887",
                            "    - pds_core: handle unsupported PDS_CORE_CMD_FW_CONTROL result",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37823",
                            "    - net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37988",
                            "    - fix a couple of races in MNT_TREE_BENEATH handling by do_move_mount()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37824",
                            "    - tipc: fix NULL pointer dereference in tipc_mon_reinit_self()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37989",
                            "    - net: phy: leds: fix memory leak",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37828",
                            "    - scsi: ufs: mcq: Add NULL check in ufshcd_mcq_abort()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37829",
                            "    - cpufreq: scpi: Fix null-ptr-deref in scpi_cpufreq_get_rate()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37830",
                            "    - cpufreq: scmi: Fix null-ptr-deref in scmi_cpufreq_get_rate()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37831",
                            "    - cpufreq: apple-soc: Fix null-ptr-deref in apple_soc_cpufreq_get_rate()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37938",
                            "    - tracing: Verify event formats that have \"%*p..\"",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-39989",
                            "    - x86/mce: use is_copy_from_user() to determine copy-from-user context",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-22026",
                            "    - nfsd: don't ignore the return code of svc_proc_register()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37836",
                            "    - PCI: Fix reference leak in pci_register_host_bridge()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37846",
                            "    - arm64: mops: Do not dereference src reg for a set operation",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37942",
                            "    - HID: pidff: Make sure to fetch pool before checking SIMULTANEOUS_MAX",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37856",
                            "    - btrfs: harden block_group::bg_list against list_del() races",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37861",
                            "    - scsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queue",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37744",
                            "    - wifi: ath12k: fix memory leak in ath12k_pci_remove()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37745",
                            "    - PM: hibernate: Avoid deadlock in hibernate_compressor_param_set()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37945",
                            "    - net: phy: allow MDIO bus PM ops to start/stop state machine for phylink-",
                            "      controlled PHY",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37759",
                            "    - ublk: fix handling recovery & reissue in ublk_abort_queue()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23140",
                            "    - misc: pci_endpoint_test: Avoid issue of interrupts remaining after",
                            "      request_irq error",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-22126",
                            "    - md: fix mddev uaf while iterating all_mddevs list",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37765",
                            "    - drm/nouveau: prime: fix ttm_bo_delayed_delete oops",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37766",
                            "    - drm/amd/pm/powerplay/hwmgr/vega20_thermal: Prevent division by zero",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37767",
                            "    - drm/amd/pm/swsmu/smu13/smu_v13_0: Prevent division by zero",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37768",
                            "    - drm/amd/pm/powerplay/hwmgr/smu7_thermal: Prevent division by zero",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37769",
                            "    - drm/amd/pm/smu11: Prevent division by zero",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37770",
                            "    - drm/amd/pm/powerplay: Prevent division by zero",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37768 // CVE-2025-37771",
                            "    - drm/amd/pm: Prevent division by zero",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37772",
                            "    - RDMA/cma: Fix workqueue crash in cma_netevent_work_handler",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37773",
                            "    - virtiofs: add filesystem context source name check",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37775",
                            "    - ksmbd: fix the warning from __kernel_write_iter",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37778",
                            "    - ksmbd: Fix dangling pointer in krb_authenticate",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37863",
                            "    - ovl: don't allow datadir only",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37780",
                            "    - isofs: Prevent the use of too small fid",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37781",
                            "    - i2c: cros-ec-tunnel: defer probe if parent EC is not present",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37979",
                            "    - ASoC: qcom: Fix sc7280 lpass potential buffer overflow",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37784",
                            "    - net: ti: icss-iep: Fix possible NULL pointer dereference for perout",
                            "      request",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37786",
                            "    - net: dsa: free routing table on probe failure",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37864",
                            "    - net: dsa: clean up FDB, MDB, VLAN entries on unbind",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37865",
                            "    - net: dsa: mv88e6xxx: fix -ENOENT when deleting VLANs and MST is",
                            "      unsupported",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37787",
                            "    - net: dsa: mv88e6xxx: avoid unregistering devlink regions which were",
                            "      never registered",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37788",
                            "    - cxgb4: fix memory leak in cxgb4_init_ethtool_filters() error path",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37874",
                            "    - net: ngbe: fix memory leak in ngbe_probe() error path",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37789",
                            "    - net: openvswitch: fix nested key length validation in the set() action",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37980",
                            "    - block: fix resource leak in blk_register_queue() error path",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37790",
                            "    - net: mctp: Set SOCK_RCU_FREE",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37875",
                            "    - igc: fix PTM cycle trigger logic",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37792",
                            "    - Bluetooth: btrtl: Prevent potential NULL dereference",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37867",
                            "    - RDMA/core: Silence oversized kvmalloc() warning",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37793",
                            "    - ASoC: Intel: avs: Fix null-ptr-deref in avs_component_probe()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37982",
                            "    - wifi: wl1251: fix memory leak in wl1251_tx_work",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37794",
                            "    - wifi: mac80211: Purge vif txq in ieee80211_do_stop()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37796",
                            "    - wifi: at76c50x: fix use after free access in at76_disconnect",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23141",
                            "    - KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory",
                            "      accesses",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37940",
                            "    - ftrace: Add cond_resched() to ftrace_graph_set_hash()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37844",
                            "    - cifs: avoid NULL pointer dereference in dbg call",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23142",
                            "    - sctp: detect and prevent references to a freed transport in sendmsg",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23144",
                            "    - backlight: led_bl: Hold led_access lock when calling led_sysfs_disable()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37892",
                            "    - mtd: inftlcore: Add error check for inftl_read_oob()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23145",
                            "    - mptcp: fix NULL pointer in can_accept_new_subflow",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23146",
                            "    - mfd: ene-kb3930: Fix a potential NULL pointer dereference",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37839",
                            "    - jbd2: remove wrong sb->s_sequence check",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23147",
                            "    - i3c: Add NULL pointer check in i3c_master_queue_ibi()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23148",
                            "    - soc: samsung: exynos-chipid: Add NULL pointer check in",
                            "      exynos_chipid_probe()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23149",
                            "    - tpm: do not start chip while suspended",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23150",
                            "    - ext4: fix off-by-one error in do_split",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23151",
                            "    - bus: mhi: host: Fix race between unprepare and queue_buf",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23156",
                            "    - media: venus: hfi_parser: refactor hfi packet parsing logic",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23157",
                            "    - media: venus: hfi_parser: add check to avoid out of bound access",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37840",
                            "    - mtd: rawnand: brcmnand: fix PM resume warning",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37849",
                            "    - KVM: arm64: Tear down vGIC on failed vCPU creation",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23158",
                            "    - media: venus: hfi: add check to handle incorrect queue size",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23159",
                            "    - media: venus: hfi: add a check to handle OOB in sfr region",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23160",
                            "    - media: mediatek: vcodec: Fix a resource leak related to the scp device",
                            "      in FW initialization",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37850",
                            "    - pwm: mediatek: Prevent divide-by-zero in pwm_mediatek_config()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37851",
                            "    - fbdev: omapfb: Add 'plane' value check",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23161",
                            "    - PCI: vmd: Make vmd_dev::cfg_lock a raw_spinlock_t type",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37852",
                            "    - drm/amdgpu: handle amdgpu_cgs_create_device() errors in",
                            "      amd_powerplay_create()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37853",
                            "    - drm/amdkfd: debugfs hang_hws skip GPU with MES",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37854",
                            "    - drm/amdkfd: Fix mode1 reset crash issue",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23163",
                            "    - net: vlan: don't propagate flags on open",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37857",
                            "    - scsi: st: Fix array overflow in st_setup()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37738",
                            "    - ext4: ignore xattrs past end",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37739",
                            "    - f2fs: fix to avoid out-of-bounds access in f2fs_truncate_inode_blocks()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37943",
                            "    - wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37740",
                            "    - jfs: add sanity check for agwidth in dbMount",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37741",
                            "    - jfs: Prevent copying of nlink with value 0 from disk inode",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37858",
                            "    - fs/jfs: Prevent integer overflow in AG size calculation",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37742",
                            "    - jfs: Fix uninit-value access of imap allocated in the diMount() function",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37859",
                            "    - page_pool: avoid infinite loop to schedule delayed worker",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37862",
                            "    - HID: pidff: Fix null pointer dereference in pidff_find_fields",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37841",
                            "    - pm: cpupower: bench: Prevent NULL dereference on malloc failure",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37748",
                            "    - iommu/mediatek: Fix NULL pointer deference in mtk_iommu_device_group",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37749",
                            "    - net: ppp: Add bound checking for skb data on ppp_sync_txmung",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37754",
                            "    - drm/i915/huc: Fix fence not released on early probe errors",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37755",
                            "    - net: libwx: handle page_pool_dev_alloc_pages error",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37757",
                            "    - tipc: fix memory leak in tipc_link_xmit",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37758",
                            "    - ata: pata_pxa: Fix potential NULL pointer dereference in pxa_ata_probe()",
                            "",
                            "  * CVE-2025-37801",
                            "    - spi: spi-imx: Add check for spi_imx_setupxfer()",
                            "",
                            "  * CVE-2025-39946",
                            "    - tls: make sure to abort the stream if headers are bogus",
                            "",
                            "  * CVE-2025-38584",
                            "    - padata: Fix pd UAF once and for all",
                            "    - padata: Remove comment for reorder_work",
                            "",
                            "  * CVE-2025-40019",
                            "    - crypto: essiv - Check ssize for decryption and in-place encryption",
                            "",
                            "  * CVE-2025-38561",
                            "    - ksmbd: fix Preauh_HashValue race condition",
                            "",
                            "  * CVE-2025-39698",
                            "    - io_uring/futex: ensure io_futex_wait() cleans up properly on failure",
                            ""
                        ],
                        "package": "linux",
                        "version": "6.8.0-98.98",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2137901,
                            1786013,
                            2136820,
                            2137528,
                            2130244,
                            2128722,
                            2131265,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2135716,
                            2135261,
                            1928890,
                            2112357,
                            2096976,
                            2012859,
                            2031531,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136361,
                            2136361,
                            2136361,
                            2136361,
                            2136361,
                            2136361,
                            2136361,
                            2136361,
                            2136361,
                            2136361,
                            2136361,
                            2136361,
                            2136361,
                            2136361,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2134382,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2132317,
                            2065369,
                            2071861,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2131046,
                            2083800,
                            2127971,
                            2102077,
                            2121997,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130277,
                            2130277,
                            2130277,
                            2130277,
                            2130277,
                            2130277,
                            2130277,
                            2130277,
                            2130277,
                            2130277,
                            2130277,
                            2130277,
                            2130277,
                            2130277,
                            2130277,
                            2130277,
                            2130277,
                            2130277,
                            2130277,
                            2130277,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722
                        ],
                        "author": "Stefan Bader <stefan.bader@canonical.com>",
                        "date": "Fri, 09 Jan 2026 13:27:16 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-tools-common",
                "from_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.8.0-90.91",
                    "version": "6.8.0-90.91"
                },
                "to_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.8.0-100.100",
                    "version": "6.8.0-100.100"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-39779",
                        "url": "https://ubuntu.com/security/CVE-2025-39779",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39759",
                        "url": "https://ubuntu.com/security/CVE-2025-39759",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39705",
                        "url": "https://ubuntu.com/security/CVE-2025-39705",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39707",
                        "url": "https://ubuntu.com/security/CVE-2025-39707",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39712",
                        "url": "https://ubuntu.com/security/CVE-2025-39712",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38686",
                        "url": "https://ubuntu.com/security/CVE-2025-38686",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38703",
                        "url": "https://ubuntu.com/security/CVE-2025-38703",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39746",
                        "url": "https://ubuntu.com/security/CVE-2025-39746",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39747",
                        "url": "https://ubuntu.com/security/CVE-2025-39747",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38704",
                        "url": "https://ubuntu.com/security/CVE-2025-38704",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39748",
                        "url": "https://ubuntu.com/security/CVE-2025-39748",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38705",
                        "url": "https://ubuntu.com/security/CVE-2025-38705",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38710",
                        "url": "https://ubuntu.com/security/CVE-2025-38710",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38722",
                        "url": "https://ubuntu.com/security/CVE-2025-38722",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38732",
                        "url": "https://ubuntu.com/security/CVE-2025-38732",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39766",
                        "url": "https://ubuntu.com/security/CVE-2025-39766",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38734",
                        "url": "https://ubuntu.com/security/CVE-2025-38734",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38735",
                        "url": "https://ubuntu.com/security/CVE-2025-38735",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39673",
                        "url": "https://ubuntu.com/security/CVE-2025-39673",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39770",
                        "url": "https://ubuntu.com/security/CVE-2025-39770",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39675",
                        "url": "https://ubuntu.com/security/CVE-2025-39675",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39772",
                        "url": "https://ubuntu.com/security/CVE-2025-39772",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38676",
                        "url": "https://ubuntu.com/security/CVE-2025-38676",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39676",
                        "url": "https://ubuntu.com/security/CVE-2025-39676",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39773",
                        "url": "https://ubuntu.com/security/CVE-2025-39773",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39679",
                        "url": "https://ubuntu.com/security/CVE-2025-39679",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39681",
                        "url": "https://ubuntu.com/security/CVE-2025-39681",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39687",
                        "url": "https://ubuntu.com/security/CVE-2025-39687",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39683",
                        "url": "https://ubuntu.com/security/CVE-2025-39683",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39801",
                        "url": "https://ubuntu.com/security/CVE-2025-39801",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39684",
                        "url": "https://ubuntu.com/security/CVE-2025-39684",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39685",
                        "url": "https://ubuntu.com/security/CVE-2025-39685",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39686",
                        "url": "https://ubuntu.com/security/CVE-2025-39686",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39689",
                        "url": "https://ubuntu.com/security/CVE-2025-39689",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39691",
                        "url": "https://ubuntu.com/security/CVE-2025-39691",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39692",
                        "url": "https://ubuntu.com/security/CVE-2025-39692",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39788",
                        "url": "https://ubuntu.com/security/CVE-2025-39788",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39693",
                        "url": "https://ubuntu.com/security/CVE-2025-39693",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39694",
                        "url": "https://ubuntu.com/security/CVE-2025-39694",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39776",
                        "url": "https://ubuntu.com/security/CVE-2025-39776",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38681",
                        "url": "https://ubuntu.com/security/CVE-2025-38681",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39800",
                        "url": "https://ubuntu.com/security/CVE-2025-39800",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38684",
                        "url": "https://ubuntu.com/security/CVE-2025-38684",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-21884",
                        "url": "https://ubuntu.com/security/CVE-2025-21884",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39701",
                        "url": "https://ubuntu.com/security/CVE-2025-39701",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39702",
                        "url": "https://ubuntu.com/security/CVE-2025-39702",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39703",
                        "url": "https://ubuntu.com/security/CVE-2025-39703",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39706",
                        "url": "https://ubuntu.com/security/CVE-2025-39706",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39709",
                        "url": "https://ubuntu.com/security/CVE-2025-39709",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39710",
                        "url": "https://ubuntu.com/security/CVE-2025-39710",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39711",
                        "url": "https://ubuntu.com/security/CVE-2025-39711",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39713",
                        "url": "https://ubuntu.com/security/CVE-2025-39713",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39714",
                        "url": "https://ubuntu.com/security/CVE-2025-39714",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39715",
                        "url": "https://ubuntu.com/security/CVE-2025-39715",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39716",
                        "url": "https://ubuntu.com/security/CVE-2025-39716",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39781",
                        "url": "https://ubuntu.com/security/CVE-2025-39781",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39782",
                        "url": "https://ubuntu.com/security/CVE-2025-39782",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38677",
                        "url": "https://ubuntu.com/security/CVE-2025-38677",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39718",
                        "url": "https://ubuntu.com/security/CVE-2025-39718",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39783",
                        "url": "https://ubuntu.com/security/CVE-2025-39783",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39719",
                        "url": "https://ubuntu.com/security/CVE-2025-39719",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39787",
                        "url": "https://ubuntu.com/security/CVE-2025-39787",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39720",
                        "url": "https://ubuntu.com/security/CVE-2025-39720",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39721",
                        "url": "https://ubuntu.com/security/CVE-2025-39721",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39790",
                        "url": "https://ubuntu.com/security/CVE-2025-39790",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39724",
                        "url": "https://ubuntu.com/security/CVE-2025-39724",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39758",
                        "url": "https://ubuntu.com/security/CVE-2025-39758",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38679",
                        "url": "https://ubuntu.com/security/CVE-2025-38679",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38680",
                        "url": "https://ubuntu.com/security/CVE-2025-38680",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39736",
                        "url": "https://ubuntu.com/security/CVE-2025-39736",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39737",
                        "url": "https://ubuntu.com/security/CVE-2025-39737",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38683",
                        "url": "https://ubuntu.com/security/CVE-2025-38683",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38685",
                        "url": "https://ubuntu.com/security/CVE-2025-38685",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39738",
                        "url": "https://ubuntu.com/security/CVE-2025-39738",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38687",
                        "url": "https://ubuntu.com/security/CVE-2025-38687",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39760",
                        "url": "https://ubuntu.com/security/CVE-2025-39760",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38688",
                        "url": "https://ubuntu.com/security/CVE-2025-38688",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39739",
                        "url": "https://ubuntu.com/security/CVE-2025-39739",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38691",
                        "url": "https://ubuntu.com/security/CVE-2025-38691",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39795",
                        "url": "https://ubuntu.com/security/CVE-2025-39795",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38692",
                        "url": "https://ubuntu.com/security/CVE-2025-38692",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38693",
                        "url": "https://ubuntu.com/security/CVE-2025-38693",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38694",
                        "url": "https://ubuntu.com/security/CVE-2025-38694",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38695",
                        "url": "https://ubuntu.com/security/CVE-2025-38695",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39742",
                        "url": "https://ubuntu.com/security/CVE-2025-39742",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38696",
                        "url": "https://ubuntu.com/security/CVE-2025-38696",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38697",
                        "url": "https://ubuntu.com/security/CVE-2025-38697",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38698",
                        "url": "https://ubuntu.com/security/CVE-2025-38698",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39743",
                        "url": "https://ubuntu.com/security/CVE-2025-39743",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38699",
                        "url": "https://ubuntu.com/security/CVE-2025-38699",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38700",
                        "url": "https://ubuntu.com/security/CVE-2025-38700",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38701",
                        "url": "https://ubuntu.com/security/CVE-2025-38701",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38702",
                        "url": "https://ubuntu.com/security/CVE-2025-38702",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39744",
                        "url": "https://ubuntu.com/security/CVE-2025-39744",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39761",
                        "url": "https://ubuntu.com/security/CVE-2025-39761",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39797",
                        "url": "https://ubuntu.com/security/CVE-2025-39797",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39749",
                        "url": "https://ubuntu.com/security/CVE-2025-39749",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39750",
                        "url": "https://ubuntu.com/security/CVE-2025-39750",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38706",
                        "url": "https://ubuntu.com/security/CVE-2025-38706",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39794",
                        "url": "https://ubuntu.com/security/CVE-2025-39794",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39752",
                        "url": "https://ubuntu.com/security/CVE-2025-39752",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39763",
                        "url": "https://ubuntu.com/security/CVE-2025-39763",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38707",
                        "url": "https://ubuntu.com/security/CVE-2025-38707",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38708",
                        "url": "https://ubuntu.com/security/CVE-2025-38708",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39753",
                        "url": "https://ubuntu.com/security/CVE-2025-39753",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38711",
                        "url": "https://ubuntu.com/security/CVE-2025-38711",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38712",
                        "url": "https://ubuntu.com/security/CVE-2025-38712",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38713",
                        "url": "https://ubuntu.com/security/CVE-2025-38713",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38714",
                        "url": "https://ubuntu.com/security/CVE-2025-38714",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38715",
                        "url": "https://ubuntu.com/security/CVE-2025-38715",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38716",
                        "url": "https://ubuntu.com/security/CVE-2025-38716",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38718",
                        "url": "https://ubuntu.com/security/CVE-2025-38718",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38721",
                        "url": "https://ubuntu.com/security/CVE-2025-38721",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38614",
                        "url": "https://ubuntu.com/security/CVE-2025-38614",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39756",
                        "url": "https://ubuntu.com/security/CVE-2025-39756",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39798",
                        "url": "https://ubuntu.com/security/CVE-2025-39798",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38724",
                        "url": "https://ubuntu.com/security/CVE-2025-38724",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38730",
                        "url": "https://ubuntu.com/security/CVE-2025-38730",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38725",
                        "url": "https://ubuntu.com/security/CVE-2025-38725",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38728",
                        "url": "https://ubuntu.com/security/CVE-2025-38728",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39757",
                        "url": "https://ubuntu.com/security/CVE-2025-39757",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38729",
                        "url": "https://ubuntu.com/security/CVE-2025-38729",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40297",
                        "url": "https://ubuntu.com/security/CVE-2025-40297",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40256",
                        "url": "https://ubuntu.com/security/CVE-2025-40256",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40215",
                        "url": "https://ubuntu.com/security/CVE-2025-40215",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40214",
                        "url": "https://ubuntu.com/security/CVE-2025-40214",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38248",
                        "url": "https://ubuntu.com/security/CVE-2025-38248",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38619",
                        "url": "https://ubuntu.com/security/CVE-2025-38619",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38582",
                        "url": "https://ubuntu.com/security/CVE-2025-38582",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38585",
                        "url": "https://ubuntu.com/security/CVE-2025-38585",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38593",
                        "url": "https://ubuntu.com/security/CVE-2025-38593",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39732",
                        "url": "https://ubuntu.com/security/CVE-2025-39732",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38595",
                        "url": "https://ubuntu.com/security/CVE-2025-38595",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38660",
                        "url": "https://ubuntu.com/security/CVE-2025-38660",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38555",
                        "url": "https://ubuntu.com/security/CVE-2025-38555",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2024-36331",
                        "url": "https://ubuntu.com/security/CVE-2024-36331",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38560",
                        "url": "https://ubuntu.com/security/CVE-2025-38560",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38501",
                        "url": "https://ubuntu.com/security/CVE-2025-38501",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38562",
                        "url": "https://ubuntu.com/security/CVE-2025-38562",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38566",
                        "url": "https://ubuntu.com/security/CVE-2025-38566",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38568",
                        "url": "https://ubuntu.com/security/CVE-2025-38568",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38571",
                        "url": "https://ubuntu.com/security/CVE-2025-38571",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38622",
                        "url": "https://ubuntu.com/security/CVE-2025-38622",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38572",
                        "url": "https://ubuntu.com/security/CVE-2025-38572",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38574",
                        "url": "https://ubuntu.com/security/CVE-2025-38574",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39730",
                        "url": "https://ubuntu.com/security/CVE-2025-39730",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38623",
                        "url": "https://ubuntu.com/security/CVE-2025-38623",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38576",
                        "url": "https://ubuntu.com/security/CVE-2025-38576",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38624",
                        "url": "https://ubuntu.com/security/CVE-2025-38624",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38625",
                        "url": "https://ubuntu.com/security/CVE-2025-38625",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38626",
                        "url": "https://ubuntu.com/security/CVE-2025-38626",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39731",
                        "url": "https://ubuntu.com/security/CVE-2025-39731",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38652",
                        "url": "https://ubuntu.com/security/CVE-2025-38652",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38577",
                        "url": "https://ubuntu.com/security/CVE-2025-38577",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38578",
                        "url": "https://ubuntu.com/security/CVE-2025-38578",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38579",
                        "url": "https://ubuntu.com/security/CVE-2025-38579",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38630",
                        "url": "https://ubuntu.com/security/CVE-2025-38630",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38632",
                        "url": "https://ubuntu.com/security/CVE-2025-38632",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38653",
                        "url": "https://ubuntu.com/security/CVE-2025-38653",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38581",
                        "url": "https://ubuntu.com/security/CVE-2025-38581",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38634",
                        "url": "https://ubuntu.com/security/CVE-2025-38634",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38583",
                        "url": "https://ubuntu.com/security/CVE-2025-38583",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38635",
                        "url": "https://ubuntu.com/security/CVE-2025-38635",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38587",
                        "url": "https://ubuntu.com/security/CVE-2025-38587",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38588",
                        "url": "https://ubuntu.com/security/CVE-2025-38588",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38590",
                        "url": "https://ubuntu.com/security/CVE-2025-38590",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38639",
                        "url": "https://ubuntu.com/security/CVE-2025-38639",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38640",
                        "url": "https://ubuntu.com/security/CVE-2025-38640",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38644",
                        "url": "https://ubuntu.com/security/CVE-2025-38644",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38553",
                        "url": "https://ubuntu.com/security/CVE-2025-38553",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38645",
                        "url": "https://ubuntu.com/security/CVE-2025-38645",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38601",
                        "url": "https://ubuntu.com/security/CVE-2025-38601",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38602",
                        "url": "https://ubuntu.com/security/CVE-2025-38602",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38604",
                        "url": "https://ubuntu.com/security/CVE-2025-38604",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38646",
                        "url": "https://ubuntu.com/security/CVE-2025-38646",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38608",
                        "url": "https://ubuntu.com/security/CVE-2025-38608",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38609",
                        "url": "https://ubuntu.com/security/CVE-2025-38609",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38610",
                        "url": "https://ubuntu.com/security/CVE-2025-38610",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38612",
                        "url": "https://ubuntu.com/security/CVE-2025-38612",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38648",
                        "url": "https://ubuntu.com/security/CVE-2025-38648",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38659",
                        "url": "https://ubuntu.com/security/CVE-2025-38659",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39734",
                        "url": "https://ubuntu.com/security/CVE-2025-39734",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38650",
                        "url": "https://ubuntu.com/security/CVE-2025-38650",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38615",
                        "url": "https://ubuntu.com/security/CVE-2025-38615",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38351",
                        "url": "https://ubuntu.com/security/CVE-2025-38351",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38675",
                        "url": "https://ubuntu.com/security/CVE-2025-38675",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38322",
                        "url": "https://ubuntu.com/security/CVE-2025-38322",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37777",
                        "url": "https://ubuntu.com/security/CVE-2025-37777",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37925",
                        "url": "https://ubuntu.com/security/CVE-2025-37925",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38663",
                        "url": "https://ubuntu.com/security/CVE-2025-38663",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38664",
                        "url": "https://ubuntu.com/security/CVE-2025-38664",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38670",
                        "url": "https://ubuntu.com/security/CVE-2025-38670",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38671",
                        "url": "https://ubuntu.com/security/CVE-2025-38671",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39726",
                        "url": "https://ubuntu.com/security/CVE-2025-39726",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38665",
                        "url": "https://ubuntu.com/security/CVE-2025-38665",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38668",
                        "url": "https://ubuntu.com/security/CVE-2025-38668",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38335",
                        "url": "https://ubuntu.com/security/CVE-2025-38335",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-22115",
                        "url": "https://ubuntu.com/security/CVE-2025-22115",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38549",
                        "url": "https://ubuntu.com/security/CVE-2025-38549",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38551",
                        "url": "https://ubuntu.com/security/CVE-2025-38551",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38531",
                        "url": "https://ubuntu.com/security/CVE-2025-38531",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38552",
                        "url": "https://ubuntu.com/security/CVE-2025-38552",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38491",
                        "url": "https://ubuntu.com/security/CVE-2025-38491",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38469",
                        "url": "https://ubuntu.com/security/CVE-2025-38469",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38499",
                        "url": "https://ubuntu.com/security/CVE-2025-38499",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38524",
                        "url": "https://ubuntu.com/security/CVE-2025-38524",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38468",
                        "url": "https://ubuntu.com/security/CVE-2025-38468",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38470",
                        "url": "https://ubuntu.com/security/CVE-2025-38470",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38471",
                        "url": "https://ubuntu.com/security/CVE-2025-38471",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38472",
                        "url": "https://ubuntu.com/security/CVE-2025-38472",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38550",
                        "url": "https://ubuntu.com/security/CVE-2025-38550",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38473",
                        "url": "https://ubuntu.com/security/CVE-2025-38473",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38474",
                        "url": "https://ubuntu.com/security/CVE-2025-38474",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38526",
                        "url": "https://ubuntu.com/security/CVE-2025-38526",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38548",
                        "url": "https://ubuntu.com/security/CVE-2025-38548",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38537",
                        "url": "https://ubuntu.com/security/CVE-2025-38537",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38527",
                        "url": "https://ubuntu.com/security/CVE-2025-38527",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38476",
                        "url": "https://ubuntu.com/security/CVE-2025-38476",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38528",
                        "url": "https://ubuntu.com/security/CVE-2025-38528",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38478",
                        "url": "https://ubuntu.com/security/CVE-2025-38478",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38480",
                        "url": "https://ubuntu.com/security/CVE-2025-38480",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38481",
                        "url": "https://ubuntu.com/security/CVE-2025-38481",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38482",
                        "url": "https://ubuntu.com/security/CVE-2025-38482",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38483",
                        "url": "https://ubuntu.com/security/CVE-2025-38483",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38529",
                        "url": "https://ubuntu.com/security/CVE-2025-38529",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38530",
                        "url": "https://ubuntu.com/security/CVE-2025-38530",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38485",
                        "url": "https://ubuntu.com/security/CVE-2025-38485",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38487",
                        "url": "https://ubuntu.com/security/CVE-2025-38487",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2024-50047",
                        "url": "https://ubuntu.com/security/CVE-2024-50047",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38488",
                        "url": "https://ubuntu.com/security/CVE-2025-38488",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38489",
                        "url": "https://ubuntu.com/security/CVE-2025-38489",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38532",
                        "url": "https://ubuntu.com/security/CVE-2025-38532",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38533",
                        "url": "https://ubuntu.com/security/CVE-2025-38533",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38490",
                        "url": "https://ubuntu.com/security/CVE-2025-38490",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38538",
                        "url": "https://ubuntu.com/security/CVE-2025-38538",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38493",
                        "url": "https://ubuntu.com/security/CVE-2025-38493",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38539",
                        "url": "https://ubuntu.com/security/CVE-2025-38539",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38494",
                        "url": "https://ubuntu.com/security/CVE-2025-38494",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38495",
                        "url": "https://ubuntu.com/security/CVE-2025-38495",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38496",
                        "url": "https://ubuntu.com/security/CVE-2025-38496",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38497",
                        "url": "https://ubuntu.com/security/CVE-2025-38497",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38535",
                        "url": "https://ubuntu.com/security/CVE-2025-38535",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38507",
                        "url": "https://ubuntu.com/security/CVE-2025-38507",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38511",
                        "url": "https://ubuntu.com/security/CVE-2025-38511",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38520",
                        "url": "https://ubuntu.com/security/CVE-2025-38520",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38521",
                        "url": "https://ubuntu.com/security/CVE-2025-38521",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38506",
                        "url": "https://ubuntu.com/security/CVE-2025-38506",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38104",
                        "url": "https://ubuntu.com/security/CVE-2025-38104",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38067",
                        "url": "https://ubuntu.com/security/CVE-2025-38067",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37984",
                        "url": "https://ubuntu.com/security/CVE-2025-37984",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38437",
                        "url": "https://ubuntu.com/security/CVE-2025-38437",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38510",
                        "url": "https://ubuntu.com/security/CVE-2025-38510",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38503",
                        "url": "https://ubuntu.com/security/CVE-2025-38503",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38439",
                        "url": "https://ubuntu.com/security/CVE-2025-38439",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38542",
                        "url": "https://ubuntu.com/security/CVE-2025-38542",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38441",
                        "url": "https://ubuntu.com/security/CVE-2025-38441",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38443",
                        "url": "https://ubuntu.com/security/CVE-2025-38443",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38444",
                        "url": "https://ubuntu.com/security/CVE-2025-38444",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38445",
                        "url": "https://ubuntu.com/security/CVE-2025-38445",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38543",
                        "url": "https://ubuntu.com/security/CVE-2025-38543",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38513",
                        "url": "https://ubuntu.com/security/CVE-2025-38513",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38448",
                        "url": "https://ubuntu.com/security/CVE-2025-38448",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38515",
                        "url": "https://ubuntu.com/security/CVE-2025-38515",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38449",
                        "url": "https://ubuntu.com/security/CVE-2025-38449",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38512",
                        "url": "https://ubuntu.com/security/CVE-2025-38512",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38516",
                        "url": "https://ubuntu.com/security/CVE-2025-38516",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38455",
                        "url": "https://ubuntu.com/security/CVE-2025-38455",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38456",
                        "url": "https://ubuntu.com/security/CVE-2025-38456",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38514",
                        "url": "https://ubuntu.com/security/CVE-2025-38514",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38544",
                        "url": "https://ubuntu.com/security/CVE-2025-38544",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38457",
                        "url": "https://ubuntu.com/security/CVE-2025-38457",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38458",
                        "url": "https://ubuntu.com/security/CVE-2025-38458",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38459",
                        "url": "https://ubuntu.com/security/CVE-2025-38459",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38546",
                        "url": "https://ubuntu.com/security/CVE-2025-38546",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38460",
                        "url": "https://ubuntu.com/security/CVE-2025-38460",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38461",
                        "url": "https://ubuntu.com/security/CVE-2025-38461",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38462",
                        "url": "https://ubuntu.com/security/CVE-2025-38462",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38463",
                        "url": "https://ubuntu.com/security/CVE-2025-38463",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38464",
                        "url": "https://ubuntu.com/security/CVE-2025-38464",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38465",
                        "url": "https://ubuntu.com/security/CVE-2025-38465",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38466",
                        "url": "https://ubuntu.com/security/CVE-2025-38466",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38467",
                        "url": "https://ubuntu.com/security/CVE-2025-38467",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38349",
                        "url": "https://ubuntu.com/security/CVE-2025-38349",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38407",
                        "url": "https://ubuntu.com/security/CVE-2025-38407",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38374",
                        "url": "https://ubuntu.com/security/CVE-2025-38374",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38373",
                        "url": "https://ubuntu.com/security/CVE-2025-38373",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38408",
                        "url": "https://ubuntu.com/security/CVE-2025-38408",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38279",
                        "url": "https://ubuntu.com/security/CVE-2025-38279",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38289",
                        "url": "https://ubuntu.com/security/CVE-2025-38289",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38392",
                        "url": "https://ubuntu.com/security/CVE-2025-38392",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38402",
                        "url": "https://ubuntu.com/security/CVE-2025-38402",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38405",
                        "url": "https://ubuntu.com/security/CVE-2025-38405",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38388",
                        "url": "https://ubuntu.com/security/CVE-2025-38388",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38390",
                        "url": "https://ubuntu.com/security/CVE-2025-38390",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2024-36350",
                        "url": "https://ubuntu.com/security/CVE-2024-36350",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2024-36357",
                        "url": "https://ubuntu.com/security/CVE-2024-36357",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38376",
                        "url": "https://ubuntu.com/security/CVE-2025-38376",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38396",
                        "url": "https://ubuntu.com/security/CVE-2025-38396",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38371",
                        "url": "https://ubuntu.com/security/CVE-2025-38371",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38384",
                        "url": "https://ubuntu.com/security/CVE-2025-38384",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38386",
                        "url": "https://ubuntu.com/security/CVE-2025-38386",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38406",
                        "url": "https://ubuntu.com/security/CVE-2025-38406",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38399",
                        "url": "https://ubuntu.com/security/CVE-2025-38399",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38409",
                        "url": "https://ubuntu.com/security/CVE-2025-38409",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38410",
                        "url": "https://ubuntu.com/security/CVE-2025-38410",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38377",
                        "url": "https://ubuntu.com/security/CVE-2025-38377",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38389",
                        "url": "https://ubuntu.com/security/CVE-2025-38389",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38385",
                        "url": "https://ubuntu.com/security/CVE-2025-38385",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38412",
                        "url": "https://ubuntu.com/security/CVE-2025-38412",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38382",
                        "url": "https://ubuntu.com/security/CVE-2025-38382",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38393",
                        "url": "https://ubuntu.com/security/CVE-2025-38393",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38400",
                        "url": "https://ubuntu.com/security/CVE-2025-38400",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38387",
                        "url": "https://ubuntu.com/security/CVE-2025-38387",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38401",
                        "url": "https://ubuntu.com/security/CVE-2025-38401",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38391",
                        "url": "https://ubuntu.com/security/CVE-2025-38391",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38395",
                        "url": "https://ubuntu.com/security/CVE-2025-38395",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38403",
                        "url": "https://ubuntu.com/security/CVE-2025-38403",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38375",
                        "url": "https://ubuntu.com/security/CVE-2025-38375",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37842",
                        "url": "https://ubuntu.com/security/CVE-2025-37842",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23155",
                        "url": "https://ubuntu.com/security/CVE-2025-23155",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-22101",
                        "url": "https://ubuntu.com/security/CVE-2025-22101",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38361",
                        "url": "https://ubuntu.com/security/CVE-2025-38361",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38364",
                        "url": "https://ubuntu.com/security/CVE-2025-38364",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38246",
                        "url": "https://ubuntu.com/security/CVE-2025-38246",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38250",
                        "url": "https://ubuntu.com/security/CVE-2025-38250",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38253",
                        "url": "https://ubuntu.com/security/CVE-2025-38253",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38264",
                        "url": "https://ubuntu.com/security/CVE-2025-38264",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38362",
                        "url": "https://ubuntu.com/security/CVE-2025-38362",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38354",
                        "url": "https://ubuntu.com/security/CVE-2025-38354",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38363",
                        "url": "https://ubuntu.com/security/CVE-2025-38363",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38239",
                        "url": "https://ubuntu.com/security/CVE-2025-38239",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38365",
                        "url": "https://ubuntu.com/security/CVE-2025-38365",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38244",
                        "url": "https://ubuntu.com/security/CVE-2025-38244",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38245",
                        "url": "https://ubuntu.com/security/CVE-2025-38245",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38249",
                        "url": "https://ubuntu.com/security/CVE-2025-38249",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38251",
                        "url": "https://ubuntu.com/security/CVE-2025-38251",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38255",
                        "url": "https://ubuntu.com/security/CVE-2025-38255",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38257",
                        "url": "https://ubuntu.com/security/CVE-2025-38257",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38258",
                        "url": "https://ubuntu.com/security/CVE-2025-38258",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38259",
                        "url": "https://ubuntu.com/security/CVE-2025-38259",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38230",
                        "url": "https://ubuntu.com/security/CVE-2025-38230",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38260",
                        "url": "https://ubuntu.com/security/CVE-2025-38260",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38262",
                        "url": "https://ubuntu.com/security/CVE-2025-38262",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38368",
                        "url": "https://ubuntu.com/security/CVE-2025-38368",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38436",
                        "url": "https://ubuntu.com/security/CVE-2025-38436",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38263",
                        "url": "https://ubuntu.com/security/CVE-2025-38263",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38369",
                        "url": "https://ubuntu.com/security/CVE-2025-38369",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-22128",
                        "url": "https://ubuntu.com/security/CVE-2025-22128",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38333",
                        "url": "https://ubuntu.com/security/CVE-2025-38333",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38210",
                        "url": "https://ubuntu.com/security/CVE-2025-38210",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38232",
                        "url": "https://ubuntu.com/security/CVE-2025-38232",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38320",
                        "url": "https://ubuntu.com/security/CVE-2025-38320",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38424",
                        "url": "https://ubuntu.com/security/CVE-2025-38424",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38321",
                        "url": "https://ubuntu.com/security/CVE-2025-38321",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38180",
                        "url": "https://ubuntu.com/security/CVE-2025-38180",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38323",
                        "url": "https://ubuntu.com/security/CVE-2025-38323",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38181",
                        "url": "https://ubuntu.com/security/CVE-2025-38181",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38182",
                        "url": "https://ubuntu.com/security/CVE-2025-38182",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38183",
                        "url": "https://ubuntu.com/security/CVE-2025-38183",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38184",
                        "url": "https://ubuntu.com/security/CVE-2025-38184",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38185",
                        "url": "https://ubuntu.com/security/CVE-2025-38185",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38324",
                        "url": "https://ubuntu.com/security/CVE-2025-38324",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38420",
                        "url": "https://ubuntu.com/security/CVE-2025-38420",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38326",
                        "url": "https://ubuntu.com/security/CVE-2025-38326",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38089",
                        "url": "https://ubuntu.com/security/CVE-2025-38089",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38084",
                        "url": "https://ubuntu.com/security/CVE-2025-38084",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38190",
                        "url": "https://ubuntu.com/security/CVE-2025-38190",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38191",
                        "url": "https://ubuntu.com/security/CVE-2025-38191",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38192",
                        "url": "https://ubuntu.com/security/CVE-2025-38192",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38193",
                        "url": "https://ubuntu.com/security/CVE-2025-38193",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38328",
                        "url": "https://ubuntu.com/security/CVE-2025-38328",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38194",
                        "url": "https://ubuntu.com/security/CVE-2025-38194",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38090",
                        "url": "https://ubuntu.com/security/CVE-2025-38090",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38197",
                        "url": "https://ubuntu.com/security/CVE-2025-38197",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38198",
                        "url": "https://ubuntu.com/security/CVE-2025-38198",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38331",
                        "url": "https://ubuntu.com/security/CVE-2025-38331",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38200",
                        "url": "https://ubuntu.com/security/CVE-2025-38200",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38332",
                        "url": "https://ubuntu.com/security/CVE-2025-38332",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38342",
                        "url": "https://ubuntu.com/security/CVE-2025-38342",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38334",
                        "url": "https://ubuntu.com/security/CVE-2025-38334",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38425",
                        "url": "https://ubuntu.com/security/CVE-2025-38425",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38343",
                        "url": "https://ubuntu.com/security/CVE-2025-38343",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38202",
                        "url": "https://ubuntu.com/security/CVE-2025-38202",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38422",
                        "url": "https://ubuntu.com/security/CVE-2025-38422",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38344",
                        "url": "https://ubuntu.com/security/CVE-2025-38344",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38345",
                        "url": "https://ubuntu.com/security/CVE-2025-38345",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38085",
                        "url": "https://ubuntu.com/security/CVE-2025-38085",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38208",
                        "url": "https://ubuntu.com/security/CVE-2025-38208",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38418",
                        "url": "https://ubuntu.com/security/CVE-2025-38418",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38419",
                        "url": "https://ubuntu.com/security/CVE-2025-38419",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38427",
                        "url": "https://ubuntu.com/security/CVE-2025-38427",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38086",
                        "url": "https://ubuntu.com/security/CVE-2025-38086",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38346",
                        "url": "https://ubuntu.com/security/CVE-2025-38346",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38211",
                        "url": "https://ubuntu.com/security/CVE-2025-38211",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38212",
                        "url": "https://ubuntu.com/security/CVE-2025-38212",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38214",
                        "url": "https://ubuntu.com/security/CVE-2025-38214",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38215",
                        "url": "https://ubuntu.com/security/CVE-2025-38215",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38087",
                        "url": "https://ubuntu.com/security/CVE-2025-38087",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38416",
                        "url": "https://ubuntu.com/security/CVE-2025-38416",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38217",
                        "url": "https://ubuntu.com/security/CVE-2025-38217",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38218",
                        "url": "https://ubuntu.com/security/CVE-2025-38218",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38219",
                        "url": "https://ubuntu.com/security/CVE-2025-38219",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38347",
                        "url": "https://ubuntu.com/security/CVE-2025-38347",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38428",
                        "url": "https://ubuntu.com/security/CVE-2025-38428",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38220",
                        "url": "https://ubuntu.com/security/CVE-2025-38220",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38222",
                        "url": "https://ubuntu.com/security/CVE-2025-38222",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38336",
                        "url": "https://ubuntu.com/security/CVE-2025-38336",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38429",
                        "url": "https://ubuntu.com/security/CVE-2025-38429",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38225",
                        "url": "https://ubuntu.com/security/CVE-2025-38225",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38226",
                        "url": "https://ubuntu.com/security/CVE-2025-38226",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38229",
                        "url": "https://ubuntu.com/security/CVE-2025-38229",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38337",
                        "url": "https://ubuntu.com/security/CVE-2025-38337",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38338",
                        "url": "https://ubuntu.com/security/CVE-2025-38338",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38231",
                        "url": "https://ubuntu.com/security/CVE-2025-38231",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38430",
                        "url": "https://ubuntu.com/security/CVE-2025-38430",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38348",
                        "url": "https://ubuntu.com/security/CVE-2025-38348",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38101",
                        "url": "https://ubuntu.com/security/CVE-2025-38101",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38269",
                        "url": "https://ubuntu.com/security/CVE-2025-38269",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38303",
                        "url": "https://ubuntu.com/security/CVE-2025-38303",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38414",
                        "url": "https://ubuntu.com/security/CVE-2025-38414",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38125",
                        "url": "https://ubuntu.com/security/CVE-2025-38125",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38129",
                        "url": "https://ubuntu.com/security/CVE-2025-38129",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38156",
                        "url": "https://ubuntu.com/security/CVE-2025-38156",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38162",
                        "url": "https://ubuntu.com/security/CVE-2025-38162",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38292",
                        "url": "https://ubuntu.com/security/CVE-2025-38292",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38164",
                        "url": "https://ubuntu.com/security/CVE-2025-38164",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38169",
                        "url": "https://ubuntu.com/security/CVE-2025-38169",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38299",
                        "url": "https://ubuntu.com/security/CVE-2025-38299",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38100",
                        "url": "https://ubuntu.com/security/CVE-2025-38100",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38102",
                        "url": "https://ubuntu.com/security/CVE-2025-38102",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38103",
                        "url": "https://ubuntu.com/security/CVE-2025-38103",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38107",
                        "url": "https://ubuntu.com/security/CVE-2025-38107",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38108",
                        "url": "https://ubuntu.com/security/CVE-2025-38108",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38109",
                        "url": "https://ubuntu.com/security/CVE-2025-38109",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38304",
                        "url": "https://ubuntu.com/security/CVE-2025-38304",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38110",
                        "url": "https://ubuntu.com/security/CVE-2025-38110",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38111",
                        "url": "https://ubuntu.com/security/CVE-2025-38111",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38112",
                        "url": "https://ubuntu.com/security/CVE-2025-38112",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38113",
                        "url": "https://ubuntu.com/security/CVE-2025-38113",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38088",
                        "url": "https://ubuntu.com/security/CVE-2025-38088",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38115",
                        "url": "https://ubuntu.com/security/CVE-2025-38115",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38305",
                        "url": "https://ubuntu.com/security/CVE-2025-38305",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38117",
                        "url": "https://ubuntu.com/security/CVE-2025-38117",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38119",
                        "url": "https://ubuntu.com/security/CVE-2025-38119",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38307",
                        "url": "https://ubuntu.com/security/CVE-2025-38307",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38310",
                        "url": "https://ubuntu.com/security/CVE-2025-38310",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38120",
                        "url": "https://ubuntu.com/security/CVE-2025-38120",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38122",
                        "url": "https://ubuntu.com/security/CVE-2025-38122",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38123",
                        "url": "https://ubuntu.com/security/CVE-2025-38123",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38124",
                        "url": "https://ubuntu.com/security/CVE-2025-38124",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38126",
                        "url": "https://ubuntu.com/security/CVE-2025-38126",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38127",
                        "url": "https://ubuntu.com/security/CVE-2025-38127",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38131",
                        "url": "https://ubuntu.com/security/CVE-2025-38131",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38274",
                        "url": "https://ubuntu.com/security/CVE-2025-38274",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38135",
                        "url": "https://ubuntu.com/security/CVE-2025-38135",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38136",
                        "url": "https://ubuntu.com/security/CVE-2025-38136",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38138",
                        "url": "https://ubuntu.com/security/CVE-2025-38138",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38275",
                        "url": "https://ubuntu.com/security/CVE-2025-38275",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38142",
                        "url": "https://ubuntu.com/security/CVE-2025-38142",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38277",
                        "url": "https://ubuntu.com/security/CVE-2025-38277",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38143",
                        "url": "https://ubuntu.com/security/CVE-2025-38143",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38312",
                        "url": "https://ubuntu.com/security/CVE-2025-38312",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38145",
                        "url": "https://ubuntu.com/security/CVE-2025-38145",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38313",
                        "url": "https://ubuntu.com/security/CVE-2025-38313",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38415",
                        "url": "https://ubuntu.com/security/CVE-2025-38415",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38146",
                        "url": "https://ubuntu.com/security/CVE-2025-38146",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38147",
                        "url": "https://ubuntu.com/security/CVE-2025-38147",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38278",
                        "url": "https://ubuntu.com/security/CVE-2025-38278",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38148",
                        "url": "https://ubuntu.com/security/CVE-2025-38148",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38149",
                        "url": "https://ubuntu.com/security/CVE-2025-38149",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38280",
                        "url": "https://ubuntu.com/security/CVE-2025-38280",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38153",
                        "url": "https://ubuntu.com/security/CVE-2025-38153",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38154",
                        "url": "https://ubuntu.com/security/CVE-2025-38154",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38155",
                        "url": "https://ubuntu.com/security/CVE-2025-38155",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38282",
                        "url": "https://ubuntu.com/security/CVE-2025-38282",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38157",
                        "url": "https://ubuntu.com/security/CVE-2025-38157",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38283",
                        "url": "https://ubuntu.com/security/CVE-2025-38283",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38158",
                        "url": "https://ubuntu.com/security/CVE-2025-38158",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39890",
                        "url": "https://ubuntu.com/security/CVE-2025-39890",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38159",
                        "url": "https://ubuntu.com/security/CVE-2025-38159",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38285",
                        "url": "https://ubuntu.com/security/CVE-2025-38285",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38286",
                        "url": "https://ubuntu.com/security/CVE-2025-38286",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38160",
                        "url": "https://ubuntu.com/security/CVE-2025-38160",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38161",
                        "url": "https://ubuntu.com/security/CVE-2025-38161",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38290",
                        "url": "https://ubuntu.com/security/CVE-2025-38290",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38163",
                        "url": "https://ubuntu.com/security/CVE-2025-38163",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38165",
                        "url": "https://ubuntu.com/security/CVE-2025-38165",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38166",
                        "url": "https://ubuntu.com/security/CVE-2025-38166",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38293",
                        "url": "https://ubuntu.com/security/CVE-2025-38293",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38295",
                        "url": "https://ubuntu.com/security/CVE-2025-38295",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38167",
                        "url": "https://ubuntu.com/security/CVE-2025-38167",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38170",
                        "url": "https://ubuntu.com/security/CVE-2025-38170",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38319",
                        "url": "https://ubuntu.com/security/CVE-2025-38319",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38298",
                        "url": "https://ubuntu.com/security/CVE-2025-38298",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38173",
                        "url": "https://ubuntu.com/security/CVE-2025-38173",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38300",
                        "url": "https://ubuntu.com/security/CVE-2025-38300",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38174",
                        "url": "https://ubuntu.com/security/CVE-2025-38174",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38265",
                        "url": "https://ubuntu.com/security/CVE-2025-38265",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38053",
                        "url": "https://ubuntu.com/security/CVE-2025-38053",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38055",
                        "url": "https://ubuntu.com/security/CVE-2025-38055",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38057",
                        "url": "https://ubuntu.com/security/CVE-2025-38057",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38060",
                        "url": "https://ubuntu.com/security/CVE-2025-38060",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38098",
                        "url": "https://ubuntu.com/security/CVE-2025-38098",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38099",
                        "url": "https://ubuntu.com/security/CVE-2025-38099",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38073",
                        "url": "https://ubuntu.com/security/CVE-2025-38073",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38051",
                        "url": "https://ubuntu.com/security/CVE-2025-38051",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38077",
                        "url": "https://ubuntu.com/security/CVE-2025-38077",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38078",
                        "url": "https://ubuntu.com/security/CVE-2025-38078",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38003",
                        "url": "https://ubuntu.com/security/CVE-2025-38003",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38004",
                        "url": "https://ubuntu.com/security/CVE-2025-38004",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38031",
                        "url": "https://ubuntu.com/security/CVE-2025-38031",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38079",
                        "url": "https://ubuntu.com/security/CVE-2025-38079",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38052",
                        "url": "https://ubuntu.com/security/CVE-2025-38052",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38097",
                        "url": "https://ubuntu.com/security/CVE-2025-38097",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38058",
                        "url": "https://ubuntu.com/security/CVE-2025-38058",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38059",
                        "url": "https://ubuntu.com/security/CVE-2025-38059",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38034",
                        "url": "https://ubuntu.com/security/CVE-2025-38034",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38035",
                        "url": "https://ubuntu.com/security/CVE-2025-38035",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38037",
                        "url": "https://ubuntu.com/security/CVE-2025-38037",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38039",
                        "url": "https://ubuntu.com/security/CVE-2025-38039",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38080",
                        "url": "https://ubuntu.com/security/CVE-2025-38080",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38040",
                        "url": "https://ubuntu.com/security/CVE-2025-38040",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38061",
                        "url": "https://ubuntu.com/security/CVE-2025-38061",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38062",
                        "url": "https://ubuntu.com/security/CVE-2025-38062",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38063",
                        "url": "https://ubuntu.com/security/CVE-2025-38063",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38043",
                        "url": "https://ubuntu.com/security/CVE-2025-38043",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38044",
                        "url": "https://ubuntu.com/security/CVE-2025-38044",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38065",
                        "url": "https://ubuntu.com/security/CVE-2025-38065",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38066",
                        "url": "https://ubuntu.com/security/CVE-2025-38066",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38068",
                        "url": "https://ubuntu.com/security/CVE-2025-38068",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38045",
                        "url": "https://ubuntu.com/security/CVE-2025-38045",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38071",
                        "url": "https://ubuntu.com/security/CVE-2025-38071",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38072",
                        "url": "https://ubuntu.com/security/CVE-2025-38072",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38081",
                        "url": "https://ubuntu.com/security/CVE-2025-38081",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38074",
                        "url": "https://ubuntu.com/security/CVE-2025-38074",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38048",
                        "url": "https://ubuntu.com/security/CVE-2025-38048",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38075",
                        "url": "https://ubuntu.com/security/CVE-2025-38075",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37968",
                        "url": "https://ubuntu.com/security/CVE-2025-37968",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38011",
                        "url": "https://ubuntu.com/security/CVE-2025-38011",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-21931",
                        "url": "https://ubuntu.com/security/CVE-2025-21931",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37960",
                        "url": "https://ubuntu.com/security/CVE-2025-37960",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37967",
                        "url": "https://ubuntu.com/security/CVE-2025-37967",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-22102",
                        "url": "https://ubuntu.com/security/CVE-2025-22102",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38008",
                        "url": "https://ubuntu.com/security/CVE-2025-38008",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38014",
                        "url": "https://ubuntu.com/security/CVE-2025-38014",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38015",
                        "url": "https://ubuntu.com/security/CVE-2025-38015",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38005",
                        "url": "https://ubuntu.com/security/CVE-2025-38005",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38009",
                        "url": "https://ubuntu.com/security/CVE-2025-38009",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38010",
                        "url": "https://ubuntu.com/security/CVE-2025-38010",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38095",
                        "url": "https://ubuntu.com/security/CVE-2025-38095",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38018",
                        "url": "https://ubuntu.com/security/CVE-2025-38018",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38019",
                        "url": "https://ubuntu.com/security/CVE-2025-38019",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38013",
                        "url": "https://ubuntu.com/security/CVE-2025-38013",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38027",
                        "url": "https://ubuntu.com/security/CVE-2025-38027",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38020",
                        "url": "https://ubuntu.com/security/CVE-2025-38020",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38094",
                        "url": "https://ubuntu.com/security/CVE-2025-38094",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38006",
                        "url": "https://ubuntu.com/security/CVE-2025-38006",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37992",
                        "url": "https://ubuntu.com/security/CVE-2025-37992",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38023",
                        "url": "https://ubuntu.com/security/CVE-2025-38023",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38007",
                        "url": "https://ubuntu.com/security/CVE-2025-38007",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38024",
                        "url": "https://ubuntu.com/security/CVE-2025-38024",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37957",
                        "url": "https://ubuntu.com/security/CVE-2025-37957",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37963",
                        "url": "https://ubuntu.com/security/CVE-2025-37963",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37948",
                        "url": "https://ubuntu.com/security/CVE-2025-37948",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37994",
                        "url": "https://ubuntu.com/security/CVE-2025-37994",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37995",
                        "url": "https://ubuntu.com/security/CVE-2025-37995",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37949",
                        "url": "https://ubuntu.com/security/CVE-2025-37949",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37954",
                        "url": "https://ubuntu.com/security/CVE-2025-37954",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37951",
                        "url": "https://ubuntu.com/security/CVE-2025-37951",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37969",
                        "url": "https://ubuntu.com/security/CVE-2025-37969",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37970",
                        "url": "https://ubuntu.com/security/CVE-2025-37970",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37972",
                        "url": "https://ubuntu.com/security/CVE-2025-37972",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37959",
                        "url": "https://ubuntu.com/security/CVE-2025-37959",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37961",
                        "url": "https://ubuntu.com/security/CVE-2025-37961",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37998",
                        "url": "https://ubuntu.com/security/CVE-2025-37998",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37952",
                        "url": "https://ubuntu.com/security/CVE-2025-37952",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37947",
                        "url": "https://ubuntu.com/security/CVE-2025-37947",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37956",
                        "url": "https://ubuntu.com/security/CVE-2025-37956",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37973",
                        "url": "https://ubuntu.com/security/CVE-2025-37973",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37920",
                        "url": "https://ubuntu.com/security/CVE-2025-37920",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37900",
                        "url": "https://ubuntu.com/security/CVE-2025-37900",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37931",
                        "url": "https://ubuntu.com/security/CVE-2025-37931",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37903",
                        "url": "https://ubuntu.com/security/CVE-2025-37903",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37905",
                        "url": "https://ubuntu.com/security/CVE-2025-37905",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37933",
                        "url": "https://ubuntu.com/security/CVE-2025-37933",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37909",
                        "url": "https://ubuntu.com/security/CVE-2025-37909",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37911",
                        "url": "https://ubuntu.com/security/CVE-2025-37911",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37935",
                        "url": "https://ubuntu.com/security/CVE-2025-37935",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37891",
                        "url": "https://ubuntu.com/security/CVE-2025-37891",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37912",
                        "url": "https://ubuntu.com/security/CVE-2025-37912",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37913",
                        "url": "https://ubuntu.com/security/CVE-2025-37913",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37914",
                        "url": "https://ubuntu.com/security/CVE-2025-37914",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37915",
                        "url": "https://ubuntu.com/security/CVE-2025-37915",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37916",
                        "url": "https://ubuntu.com/security/CVE-2025-37916",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37917",
                        "url": "https://ubuntu.com/security/CVE-2025-37917",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37918",
                        "url": "https://ubuntu.com/security/CVE-2025-37918",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37921",
                        "url": "https://ubuntu.com/security/CVE-2025-37921",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37897",
                        "url": "https://ubuntu.com/security/CVE-2025-37897",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37922",
                        "url": "https://ubuntu.com/security/CVE-2025-37922",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37923",
                        "url": "https://ubuntu.com/security/CVE-2025-37923",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37924",
                        "url": "https://ubuntu.com/security/CVE-2025-37924",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37927",
                        "url": "https://ubuntu.com/security/CVE-2025-37927",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37928",
                        "url": "https://ubuntu.com/security/CVE-2025-37928",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37990",
                        "url": "https://ubuntu.com/security/CVE-2025-37990",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37901",
                        "url": "https://ubuntu.com/security/CVE-2025-37901",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37936",
                        "url": "https://ubuntu.com/security/CVE-2025-37936",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37991",
                        "url": "https://ubuntu.com/security/CVE-2025-37991",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37930",
                        "url": "https://ubuntu.com/security/CVE-2025-37930",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37986",
                        "url": "https://ubuntu.com/security/CVE-2025-37986",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37809",
                        "url": "https://ubuntu.com/security/CVE-2025-37809",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37816",
                        "url": "https://ubuntu.com/security/CVE-2025-37816",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37822",
                        "url": "https://ubuntu.com/security/CVE-2025-37822",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37987",
                        "url": "https://ubuntu.com/security/CVE-2025-37987",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37826",
                        "url": "https://ubuntu.com/security/CVE-2025-37826",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37827",
                        "url": "https://ubuntu.com/security/CVE-2025-37827",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37977",
                        "url": "https://ubuntu.com/security/CVE-2025-37977",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37944",
                        "url": "https://ubuntu.com/security/CVE-2025-37944",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37761",
                        "url": "https://ubuntu.com/security/CVE-2025-37761",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37763",
                        "url": "https://ubuntu.com/security/CVE-2025-37763",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37764",
                        "url": "https://ubuntu.com/security/CVE-2025-37764",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37869",
                        "url": "https://ubuntu.com/security/CVE-2025-37869",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37978",
                        "url": "https://ubuntu.com/security/CVE-2025-37978",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37975",
                        "url": "https://ubuntu.com/security/CVE-2025-37975",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37872",
                        "url": "https://ubuntu.com/security/CVE-2025-37872",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37873",
                        "url": "https://ubuntu.com/security/CVE-2025-37873",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-22120",
                        "url": "https://ubuntu.com/security/CVE-2025-22120",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37799",
                        "url": "https://ubuntu.com/security/CVE-2025-37799",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37800",
                        "url": "https://ubuntu.com/security/CVE-2025-37800",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37878",
                        "url": "https://ubuntu.com/security/CVE-2025-37878",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37803",
                        "url": "https://ubuntu.com/security/CVE-2025-37803",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37879",
                        "url": "https://ubuntu.com/security/CVE-2025-37879",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37983",
                        "url": "https://ubuntu.com/security/CVE-2025-37983",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37881",
                        "url": "https://ubuntu.com/security/CVE-2025-37881",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37805",
                        "url": "https://ubuntu.com/security/CVE-2025-37805",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37883",
                        "url": "https://ubuntu.com/security/CVE-2025-37883",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37884",
                        "url": "https://ubuntu.com/security/CVE-2025-37884",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37808",
                        "url": "https://ubuntu.com/security/CVE-2025-37808",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37985",
                        "url": "https://ubuntu.com/security/CVE-2025-37985",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37810",
                        "url": "https://ubuntu.com/security/CVE-2025-37810",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37811",
                        "url": "https://ubuntu.com/security/CVE-2025-37811",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37812",
                        "url": "https://ubuntu.com/security/CVE-2025-37812",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37813",
                        "url": "https://ubuntu.com/security/CVE-2025-37813",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37815",
                        "url": "https://ubuntu.com/security/CVE-2025-37815",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37885",
                        "url": "https://ubuntu.com/security/CVE-2025-37885",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37817",
                        "url": "https://ubuntu.com/security/CVE-2025-37817",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37819",
                        "url": "https://ubuntu.com/security/CVE-2025-37819",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37820",
                        "url": "https://ubuntu.com/security/CVE-2025-37820",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37886",
                        "url": "https://ubuntu.com/security/CVE-2025-37886",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37887",
                        "url": "https://ubuntu.com/security/CVE-2025-37887",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37823",
                        "url": "https://ubuntu.com/security/CVE-2025-37823",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37988",
                        "url": "https://ubuntu.com/security/CVE-2025-37988",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37824",
                        "url": "https://ubuntu.com/security/CVE-2025-37824",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37989",
                        "url": "https://ubuntu.com/security/CVE-2025-37989",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37828",
                        "url": "https://ubuntu.com/security/CVE-2025-37828",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37829",
                        "url": "https://ubuntu.com/security/CVE-2025-37829",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37830",
                        "url": "https://ubuntu.com/security/CVE-2025-37830",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37831",
                        "url": "https://ubuntu.com/security/CVE-2025-37831",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37938",
                        "url": "https://ubuntu.com/security/CVE-2025-37938",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39989",
                        "url": "https://ubuntu.com/security/CVE-2025-39989",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-22026",
                        "url": "https://ubuntu.com/security/CVE-2025-22026",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37836",
                        "url": "https://ubuntu.com/security/CVE-2025-37836",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37846",
                        "url": "https://ubuntu.com/security/CVE-2025-37846",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37942",
                        "url": "https://ubuntu.com/security/CVE-2025-37942",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37856",
                        "url": "https://ubuntu.com/security/CVE-2025-37856",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37861",
                        "url": "https://ubuntu.com/security/CVE-2025-37861",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37744",
                        "url": "https://ubuntu.com/security/CVE-2025-37744",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37745",
                        "url": "https://ubuntu.com/security/CVE-2025-37745",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37945",
                        "url": "https://ubuntu.com/security/CVE-2025-37945",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37759",
                        "url": "https://ubuntu.com/security/CVE-2025-37759",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23140",
                        "url": "https://ubuntu.com/security/CVE-2025-23140",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-22126",
                        "url": "https://ubuntu.com/security/CVE-2025-22126",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37765",
                        "url": "https://ubuntu.com/security/CVE-2025-37765",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37766",
                        "url": "https://ubuntu.com/security/CVE-2025-37766",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37767",
                        "url": "https://ubuntu.com/security/CVE-2025-37767",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37768",
                        "url": "https://ubuntu.com/security/CVE-2025-37768",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37769",
                        "url": "https://ubuntu.com/security/CVE-2025-37769",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37770",
                        "url": "https://ubuntu.com/security/CVE-2025-37770",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37771",
                        "url": "https://ubuntu.com/security/CVE-2025-37771",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37772",
                        "url": "https://ubuntu.com/security/CVE-2025-37772",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37773",
                        "url": "https://ubuntu.com/security/CVE-2025-37773",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37775",
                        "url": "https://ubuntu.com/security/CVE-2025-37775",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37778",
                        "url": "https://ubuntu.com/security/CVE-2025-37778",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37863",
                        "url": "https://ubuntu.com/security/CVE-2025-37863",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37780",
                        "url": "https://ubuntu.com/security/CVE-2025-37780",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37781",
                        "url": "https://ubuntu.com/security/CVE-2025-37781",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37979",
                        "url": "https://ubuntu.com/security/CVE-2025-37979",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37784",
                        "url": "https://ubuntu.com/security/CVE-2025-37784",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37786",
                        "url": "https://ubuntu.com/security/CVE-2025-37786",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37864",
                        "url": "https://ubuntu.com/security/CVE-2025-37864",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37865",
                        "url": "https://ubuntu.com/security/CVE-2025-37865",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37787",
                        "url": "https://ubuntu.com/security/CVE-2025-37787",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37788",
                        "url": "https://ubuntu.com/security/CVE-2025-37788",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37874",
                        "url": "https://ubuntu.com/security/CVE-2025-37874",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37789",
                        "url": "https://ubuntu.com/security/CVE-2025-37789",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37980",
                        "url": "https://ubuntu.com/security/CVE-2025-37980",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37790",
                        "url": "https://ubuntu.com/security/CVE-2025-37790",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37875",
                        "url": "https://ubuntu.com/security/CVE-2025-37875",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37792",
                        "url": "https://ubuntu.com/security/CVE-2025-37792",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37867",
                        "url": "https://ubuntu.com/security/CVE-2025-37867",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37793",
                        "url": "https://ubuntu.com/security/CVE-2025-37793",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37982",
                        "url": "https://ubuntu.com/security/CVE-2025-37982",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37794",
                        "url": "https://ubuntu.com/security/CVE-2025-37794",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37796",
                        "url": "https://ubuntu.com/security/CVE-2025-37796",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23141",
                        "url": "https://ubuntu.com/security/CVE-2025-23141",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37940",
                        "url": "https://ubuntu.com/security/CVE-2025-37940",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37844",
                        "url": "https://ubuntu.com/security/CVE-2025-37844",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23142",
                        "url": "https://ubuntu.com/security/CVE-2025-23142",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23144",
                        "url": "https://ubuntu.com/security/CVE-2025-23144",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37892",
                        "url": "https://ubuntu.com/security/CVE-2025-37892",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23145",
                        "url": "https://ubuntu.com/security/CVE-2025-23145",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23146",
                        "url": "https://ubuntu.com/security/CVE-2025-23146",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37839",
                        "url": "https://ubuntu.com/security/CVE-2025-37839",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23147",
                        "url": "https://ubuntu.com/security/CVE-2025-23147",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23148",
                        "url": "https://ubuntu.com/security/CVE-2025-23148",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23149",
                        "url": "https://ubuntu.com/security/CVE-2025-23149",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23150",
                        "url": "https://ubuntu.com/security/CVE-2025-23150",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23151",
                        "url": "https://ubuntu.com/security/CVE-2025-23151",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23156",
                        "url": "https://ubuntu.com/security/CVE-2025-23156",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23157",
                        "url": "https://ubuntu.com/security/CVE-2025-23157",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37840",
                        "url": "https://ubuntu.com/security/CVE-2025-37840",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37849",
                        "url": "https://ubuntu.com/security/CVE-2025-37849",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23158",
                        "url": "https://ubuntu.com/security/CVE-2025-23158",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23159",
                        "url": "https://ubuntu.com/security/CVE-2025-23159",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23160",
                        "url": "https://ubuntu.com/security/CVE-2025-23160",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37850",
                        "url": "https://ubuntu.com/security/CVE-2025-37850",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37851",
                        "url": "https://ubuntu.com/security/CVE-2025-37851",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23161",
                        "url": "https://ubuntu.com/security/CVE-2025-23161",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37852",
                        "url": "https://ubuntu.com/security/CVE-2025-37852",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37853",
                        "url": "https://ubuntu.com/security/CVE-2025-37853",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37854",
                        "url": "https://ubuntu.com/security/CVE-2025-37854",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-23163",
                        "url": "https://ubuntu.com/security/CVE-2025-23163",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37857",
                        "url": "https://ubuntu.com/security/CVE-2025-37857",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37738",
                        "url": "https://ubuntu.com/security/CVE-2025-37738",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37739",
                        "url": "https://ubuntu.com/security/CVE-2025-37739",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37943",
                        "url": "https://ubuntu.com/security/CVE-2025-37943",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37740",
                        "url": "https://ubuntu.com/security/CVE-2025-37740",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37741",
                        "url": "https://ubuntu.com/security/CVE-2025-37741",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37858",
                        "url": "https://ubuntu.com/security/CVE-2025-37858",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37742",
                        "url": "https://ubuntu.com/security/CVE-2025-37742",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37859",
                        "url": "https://ubuntu.com/security/CVE-2025-37859",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37862",
                        "url": "https://ubuntu.com/security/CVE-2025-37862",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37841",
                        "url": "https://ubuntu.com/security/CVE-2025-37841",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37748",
                        "url": "https://ubuntu.com/security/CVE-2025-37748",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37749",
                        "url": "https://ubuntu.com/security/CVE-2025-37749",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37754",
                        "url": "https://ubuntu.com/security/CVE-2025-37754",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37755",
                        "url": "https://ubuntu.com/security/CVE-2025-37755",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37757",
                        "url": "https://ubuntu.com/security/CVE-2025-37757",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37758",
                        "url": "https://ubuntu.com/security/CVE-2025-37758",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-37801",
                        "url": "https://ubuntu.com/security/CVE-2025-37801",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39946",
                        "url": "https://ubuntu.com/security/CVE-2025-39946",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38584",
                        "url": "https://ubuntu.com/security/CVE-2025-38584",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40019",
                        "url": "https://ubuntu.com/security/CVE-2025-40019",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-38561",
                        "url": "https://ubuntu.com/security/CVE-2025-38561",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-39698",
                        "url": "https://ubuntu.com/security/CVE-2025-39698",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [
                    2138307,
                    2122531,
                    2138244,
                    2137901,
                    1786013,
                    2136820,
                    2137528,
                    2130244,
                    2128722,
                    2131265,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2137586,
                    2135716,
                    2135261,
                    1928890,
                    2112357,
                    2096976,
                    2012859,
                    2031531,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136740,
                    2136361,
                    2136361,
                    2136361,
                    2136361,
                    2136361,
                    2136361,
                    2136361,
                    2136361,
                    2136361,
                    2136361,
                    2136361,
                    2136361,
                    2136361,
                    2136361,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2136221,
                    2134382,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2135261,
                    2132317,
                    2065369,
                    2071861,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134640,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134499,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2134382,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133786,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2133301,
                    2131046,
                    2083800,
                    2127971,
                    2102077,
                    2121997,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130344,
                    2130277,
                    2130277,
                    2130277,
                    2130277,
                    2130277,
                    2130277,
                    2130277,
                    2130277,
                    2130277,
                    2130277,
                    2130277,
                    2130277,
                    2130277,
                    2130277,
                    2130277,
                    2130277,
                    2130277,
                    2130277,
                    2130277,
                    2130277,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129559,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2129307,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722,
                    2128722
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * noble/linux: 6.8.0-100.100 -proposed tracker (LP: #2138307)",
                            "",
                            "  * Turbo boost stuck disabled on Clevo PD5x_7xSNC_SND_SNE (LP: #2122531)",
                            "    - cpufreq: intel_pstate: Check IDA only before MSR_IA32_PERF_CTL writes",
                            "",
                            "  * [noble] write-sealed memfd mappings fail to map read-only (LP: #2138244)",
                            "    - SAUCE: Fix read-only mapping of write-sealed pages",
                            ""
                        ],
                        "package": "linux",
                        "version": "6.8.0-100.100",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2138307,
                            2122531,
                            2138244
                        ],
                        "author": "Stefan Bader <stefan.bader@canonical.com>",
                        "date": "Tue, 13 Jan 2026 14:56:02 +0100"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-39779",
                                "url": "https://ubuntu.com/security/CVE-2025-39779",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39759",
                                "url": "https://ubuntu.com/security/CVE-2025-39759",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39705",
                                "url": "https://ubuntu.com/security/CVE-2025-39705",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39707",
                                "url": "https://ubuntu.com/security/CVE-2025-39707",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39712",
                                "url": "https://ubuntu.com/security/CVE-2025-39712",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38686",
                                "url": "https://ubuntu.com/security/CVE-2025-38686",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38703",
                                "url": "https://ubuntu.com/security/CVE-2025-38703",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39746",
                                "url": "https://ubuntu.com/security/CVE-2025-39746",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39747",
                                "url": "https://ubuntu.com/security/CVE-2025-39747",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38704",
                                "url": "https://ubuntu.com/security/CVE-2025-38704",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39748",
                                "url": "https://ubuntu.com/security/CVE-2025-39748",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38705",
                                "url": "https://ubuntu.com/security/CVE-2025-38705",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38710",
                                "url": "https://ubuntu.com/security/CVE-2025-38710",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38722",
                                "url": "https://ubuntu.com/security/CVE-2025-38722",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38732",
                                "url": "https://ubuntu.com/security/CVE-2025-38732",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39766",
                                "url": "https://ubuntu.com/security/CVE-2025-39766",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38734",
                                "url": "https://ubuntu.com/security/CVE-2025-38734",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38735",
                                "url": "https://ubuntu.com/security/CVE-2025-38735",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39673",
                                "url": "https://ubuntu.com/security/CVE-2025-39673",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39770",
                                "url": "https://ubuntu.com/security/CVE-2025-39770",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39675",
                                "url": "https://ubuntu.com/security/CVE-2025-39675",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39772",
                                "url": "https://ubuntu.com/security/CVE-2025-39772",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38676",
                                "url": "https://ubuntu.com/security/CVE-2025-38676",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39676",
                                "url": "https://ubuntu.com/security/CVE-2025-39676",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39773",
                                "url": "https://ubuntu.com/security/CVE-2025-39773",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39679",
                                "url": "https://ubuntu.com/security/CVE-2025-39679",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39681",
                                "url": "https://ubuntu.com/security/CVE-2025-39681",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39687",
                                "url": "https://ubuntu.com/security/CVE-2025-39687",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39683",
                                "url": "https://ubuntu.com/security/CVE-2025-39683",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39801",
                                "url": "https://ubuntu.com/security/CVE-2025-39801",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39684",
                                "url": "https://ubuntu.com/security/CVE-2025-39684",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39685",
                                "url": "https://ubuntu.com/security/CVE-2025-39685",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39686",
                                "url": "https://ubuntu.com/security/CVE-2025-39686",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39689",
                                "url": "https://ubuntu.com/security/CVE-2025-39689",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39691",
                                "url": "https://ubuntu.com/security/CVE-2025-39691",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39692",
                                "url": "https://ubuntu.com/security/CVE-2025-39692",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39788",
                                "url": "https://ubuntu.com/security/CVE-2025-39788",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39693",
                                "url": "https://ubuntu.com/security/CVE-2025-39693",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39694",
                                "url": "https://ubuntu.com/security/CVE-2025-39694",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39776",
                                "url": "https://ubuntu.com/security/CVE-2025-39776",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38681",
                                "url": "https://ubuntu.com/security/CVE-2025-38681",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39800",
                                "url": "https://ubuntu.com/security/CVE-2025-39800",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38684",
                                "url": "https://ubuntu.com/security/CVE-2025-38684",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-21884",
                                "url": "https://ubuntu.com/security/CVE-2025-21884",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39701",
                                "url": "https://ubuntu.com/security/CVE-2025-39701",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39702",
                                "url": "https://ubuntu.com/security/CVE-2025-39702",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39703",
                                "url": "https://ubuntu.com/security/CVE-2025-39703",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39706",
                                "url": "https://ubuntu.com/security/CVE-2025-39706",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39709",
                                "url": "https://ubuntu.com/security/CVE-2025-39709",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39710",
                                "url": "https://ubuntu.com/security/CVE-2025-39710",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39711",
                                "url": "https://ubuntu.com/security/CVE-2025-39711",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39713",
                                "url": "https://ubuntu.com/security/CVE-2025-39713",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39714",
                                "url": "https://ubuntu.com/security/CVE-2025-39714",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39715",
                                "url": "https://ubuntu.com/security/CVE-2025-39715",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39716",
                                "url": "https://ubuntu.com/security/CVE-2025-39716",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39781",
                                "url": "https://ubuntu.com/security/CVE-2025-39781",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39782",
                                "url": "https://ubuntu.com/security/CVE-2025-39782",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38677",
                                "url": "https://ubuntu.com/security/CVE-2025-38677",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39718",
                                "url": "https://ubuntu.com/security/CVE-2025-39718",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39783",
                                "url": "https://ubuntu.com/security/CVE-2025-39783",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39719",
                                "url": "https://ubuntu.com/security/CVE-2025-39719",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39787",
                                "url": "https://ubuntu.com/security/CVE-2025-39787",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39720",
                                "url": "https://ubuntu.com/security/CVE-2025-39720",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39721",
                                "url": "https://ubuntu.com/security/CVE-2025-39721",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39790",
                                "url": "https://ubuntu.com/security/CVE-2025-39790",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39724",
                                "url": "https://ubuntu.com/security/CVE-2025-39724",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39758",
                                "url": "https://ubuntu.com/security/CVE-2025-39758",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38679",
                                "url": "https://ubuntu.com/security/CVE-2025-38679",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38680",
                                "url": "https://ubuntu.com/security/CVE-2025-38680",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39736",
                                "url": "https://ubuntu.com/security/CVE-2025-39736",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39737",
                                "url": "https://ubuntu.com/security/CVE-2025-39737",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38683",
                                "url": "https://ubuntu.com/security/CVE-2025-38683",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38685",
                                "url": "https://ubuntu.com/security/CVE-2025-38685",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39738",
                                "url": "https://ubuntu.com/security/CVE-2025-39738",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38687",
                                "url": "https://ubuntu.com/security/CVE-2025-38687",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39760",
                                "url": "https://ubuntu.com/security/CVE-2025-39760",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38688",
                                "url": "https://ubuntu.com/security/CVE-2025-38688",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39739",
                                "url": "https://ubuntu.com/security/CVE-2025-39739",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38691",
                                "url": "https://ubuntu.com/security/CVE-2025-38691",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39795",
                                "url": "https://ubuntu.com/security/CVE-2025-39795",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38692",
                                "url": "https://ubuntu.com/security/CVE-2025-38692",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38693",
                                "url": "https://ubuntu.com/security/CVE-2025-38693",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38694",
                                "url": "https://ubuntu.com/security/CVE-2025-38694",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38695",
                                "url": "https://ubuntu.com/security/CVE-2025-38695",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39742",
                                "url": "https://ubuntu.com/security/CVE-2025-39742",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38696",
                                "url": "https://ubuntu.com/security/CVE-2025-38696",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38697",
                                "url": "https://ubuntu.com/security/CVE-2025-38697",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38698",
                                "url": "https://ubuntu.com/security/CVE-2025-38698",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39743",
                                "url": "https://ubuntu.com/security/CVE-2025-39743",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38699",
                                "url": "https://ubuntu.com/security/CVE-2025-38699",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38700",
                                "url": "https://ubuntu.com/security/CVE-2025-38700",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38701",
                                "url": "https://ubuntu.com/security/CVE-2025-38701",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38702",
                                "url": "https://ubuntu.com/security/CVE-2025-38702",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39744",
                                "url": "https://ubuntu.com/security/CVE-2025-39744",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39761",
                                "url": "https://ubuntu.com/security/CVE-2025-39761",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39797",
                                "url": "https://ubuntu.com/security/CVE-2025-39797",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39749",
                                "url": "https://ubuntu.com/security/CVE-2025-39749",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39750",
                                "url": "https://ubuntu.com/security/CVE-2025-39750",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38706",
                                "url": "https://ubuntu.com/security/CVE-2025-38706",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39794",
                                "url": "https://ubuntu.com/security/CVE-2025-39794",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39752",
                                "url": "https://ubuntu.com/security/CVE-2025-39752",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39763",
                                "url": "https://ubuntu.com/security/CVE-2025-39763",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38707",
                                "url": "https://ubuntu.com/security/CVE-2025-38707",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38708",
                                "url": "https://ubuntu.com/security/CVE-2025-38708",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39753",
                                "url": "https://ubuntu.com/security/CVE-2025-39753",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38711",
                                "url": "https://ubuntu.com/security/CVE-2025-38711",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38712",
                                "url": "https://ubuntu.com/security/CVE-2025-38712",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38713",
                                "url": "https://ubuntu.com/security/CVE-2025-38713",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38714",
                                "url": "https://ubuntu.com/security/CVE-2025-38714",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38715",
                                "url": "https://ubuntu.com/security/CVE-2025-38715",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38716",
                                "url": "https://ubuntu.com/security/CVE-2025-38716",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38718",
                                "url": "https://ubuntu.com/security/CVE-2025-38718",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38721",
                                "url": "https://ubuntu.com/security/CVE-2025-38721",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38614",
                                "url": "https://ubuntu.com/security/CVE-2025-38614",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39756",
                                "url": "https://ubuntu.com/security/CVE-2025-39756",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39798",
                                "url": "https://ubuntu.com/security/CVE-2025-39798",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38724",
                                "url": "https://ubuntu.com/security/CVE-2025-38724",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38730",
                                "url": "https://ubuntu.com/security/CVE-2025-38730",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38725",
                                "url": "https://ubuntu.com/security/CVE-2025-38725",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38728",
                                "url": "https://ubuntu.com/security/CVE-2025-38728",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39757",
                                "url": "https://ubuntu.com/security/CVE-2025-39757",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38729",
                                "url": "https://ubuntu.com/security/CVE-2025-38729",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40297",
                                "url": "https://ubuntu.com/security/CVE-2025-40297",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40256",
                                "url": "https://ubuntu.com/security/CVE-2025-40256",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40215",
                                "url": "https://ubuntu.com/security/CVE-2025-40215",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40214",
                                "url": "https://ubuntu.com/security/CVE-2025-40214",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38248",
                                "url": "https://ubuntu.com/security/CVE-2025-38248",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38619",
                                "url": "https://ubuntu.com/security/CVE-2025-38619",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38582",
                                "url": "https://ubuntu.com/security/CVE-2025-38582",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38585",
                                "url": "https://ubuntu.com/security/CVE-2025-38585",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38593",
                                "url": "https://ubuntu.com/security/CVE-2025-38593",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39732",
                                "url": "https://ubuntu.com/security/CVE-2025-39732",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38595",
                                "url": "https://ubuntu.com/security/CVE-2025-38595",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38660",
                                "url": "https://ubuntu.com/security/CVE-2025-38660",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38555",
                                "url": "https://ubuntu.com/security/CVE-2025-38555",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2024-36331",
                                "url": "https://ubuntu.com/security/CVE-2024-36331",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38560",
                                "url": "https://ubuntu.com/security/CVE-2025-38560",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38501",
                                "url": "https://ubuntu.com/security/CVE-2025-38501",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38562",
                                "url": "https://ubuntu.com/security/CVE-2025-38562",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38566",
                                "url": "https://ubuntu.com/security/CVE-2025-38566",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38568",
                                "url": "https://ubuntu.com/security/CVE-2025-38568",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38571",
                                "url": "https://ubuntu.com/security/CVE-2025-38571",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38622",
                                "url": "https://ubuntu.com/security/CVE-2025-38622",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38572",
                                "url": "https://ubuntu.com/security/CVE-2025-38572",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38574",
                                "url": "https://ubuntu.com/security/CVE-2025-38574",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39730",
                                "url": "https://ubuntu.com/security/CVE-2025-39730",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38623",
                                "url": "https://ubuntu.com/security/CVE-2025-38623",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38576",
                                "url": "https://ubuntu.com/security/CVE-2025-38576",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38624",
                                "url": "https://ubuntu.com/security/CVE-2025-38624",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38625",
                                "url": "https://ubuntu.com/security/CVE-2025-38625",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38626",
                                "url": "https://ubuntu.com/security/CVE-2025-38626",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39731",
                                "url": "https://ubuntu.com/security/CVE-2025-39731",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38652",
                                "url": "https://ubuntu.com/security/CVE-2025-38652",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38577",
                                "url": "https://ubuntu.com/security/CVE-2025-38577",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38578",
                                "url": "https://ubuntu.com/security/CVE-2025-38578",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38579",
                                "url": "https://ubuntu.com/security/CVE-2025-38579",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38630",
                                "url": "https://ubuntu.com/security/CVE-2025-38630",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38632",
                                "url": "https://ubuntu.com/security/CVE-2025-38632",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38653",
                                "url": "https://ubuntu.com/security/CVE-2025-38653",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38581",
                                "url": "https://ubuntu.com/security/CVE-2025-38581",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38634",
                                "url": "https://ubuntu.com/security/CVE-2025-38634",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38583",
                                "url": "https://ubuntu.com/security/CVE-2025-38583",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38635",
                                "url": "https://ubuntu.com/security/CVE-2025-38635",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38587",
                                "url": "https://ubuntu.com/security/CVE-2025-38587",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38588",
                                "url": "https://ubuntu.com/security/CVE-2025-38588",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38590",
                                "url": "https://ubuntu.com/security/CVE-2025-38590",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38639",
                                "url": "https://ubuntu.com/security/CVE-2025-38639",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38640",
                                "url": "https://ubuntu.com/security/CVE-2025-38640",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38644",
                                "url": "https://ubuntu.com/security/CVE-2025-38644",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38553",
                                "url": "https://ubuntu.com/security/CVE-2025-38553",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38645",
                                "url": "https://ubuntu.com/security/CVE-2025-38645",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38601",
                                "url": "https://ubuntu.com/security/CVE-2025-38601",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38602",
                                "url": "https://ubuntu.com/security/CVE-2025-38602",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38604",
                                "url": "https://ubuntu.com/security/CVE-2025-38604",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38646",
                                "url": "https://ubuntu.com/security/CVE-2025-38646",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38608",
                                "url": "https://ubuntu.com/security/CVE-2025-38608",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38609",
                                "url": "https://ubuntu.com/security/CVE-2025-38609",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38610",
                                "url": "https://ubuntu.com/security/CVE-2025-38610",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38612",
                                "url": "https://ubuntu.com/security/CVE-2025-38612",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38648",
                                "url": "https://ubuntu.com/security/CVE-2025-38648",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38659",
                                "url": "https://ubuntu.com/security/CVE-2025-38659",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39734",
                                "url": "https://ubuntu.com/security/CVE-2025-39734",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38650",
                                "url": "https://ubuntu.com/security/CVE-2025-38650",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38615",
                                "url": "https://ubuntu.com/security/CVE-2025-38615",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38351",
                                "url": "https://ubuntu.com/security/CVE-2025-38351",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38675",
                                "url": "https://ubuntu.com/security/CVE-2025-38675",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38322",
                                "url": "https://ubuntu.com/security/CVE-2025-38322",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37777",
                                "url": "https://ubuntu.com/security/CVE-2025-37777",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37925",
                                "url": "https://ubuntu.com/security/CVE-2025-37925",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38663",
                                "url": "https://ubuntu.com/security/CVE-2025-38663",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38664",
                                "url": "https://ubuntu.com/security/CVE-2025-38664",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38670",
                                "url": "https://ubuntu.com/security/CVE-2025-38670",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38671",
                                "url": "https://ubuntu.com/security/CVE-2025-38671",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39726",
                                "url": "https://ubuntu.com/security/CVE-2025-39726",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38665",
                                "url": "https://ubuntu.com/security/CVE-2025-38665",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38668",
                                "url": "https://ubuntu.com/security/CVE-2025-38668",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38335",
                                "url": "https://ubuntu.com/security/CVE-2025-38335",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-22115",
                                "url": "https://ubuntu.com/security/CVE-2025-22115",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38549",
                                "url": "https://ubuntu.com/security/CVE-2025-38549",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38551",
                                "url": "https://ubuntu.com/security/CVE-2025-38551",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38531",
                                "url": "https://ubuntu.com/security/CVE-2025-38531",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38552",
                                "url": "https://ubuntu.com/security/CVE-2025-38552",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38491",
                                "url": "https://ubuntu.com/security/CVE-2025-38491",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38469",
                                "url": "https://ubuntu.com/security/CVE-2025-38469",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38499",
                                "url": "https://ubuntu.com/security/CVE-2025-38499",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38524",
                                "url": "https://ubuntu.com/security/CVE-2025-38524",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38468",
                                "url": "https://ubuntu.com/security/CVE-2025-38468",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38470",
                                "url": "https://ubuntu.com/security/CVE-2025-38470",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38471",
                                "url": "https://ubuntu.com/security/CVE-2025-38471",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38472",
                                "url": "https://ubuntu.com/security/CVE-2025-38472",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38550",
                                "url": "https://ubuntu.com/security/CVE-2025-38550",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38473",
                                "url": "https://ubuntu.com/security/CVE-2025-38473",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38474",
                                "url": "https://ubuntu.com/security/CVE-2025-38474",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38526",
                                "url": "https://ubuntu.com/security/CVE-2025-38526",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38548",
                                "url": "https://ubuntu.com/security/CVE-2025-38548",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38537",
                                "url": "https://ubuntu.com/security/CVE-2025-38537",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38527",
                                "url": "https://ubuntu.com/security/CVE-2025-38527",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38476",
                                "url": "https://ubuntu.com/security/CVE-2025-38476",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38528",
                                "url": "https://ubuntu.com/security/CVE-2025-38528",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38478",
                                "url": "https://ubuntu.com/security/CVE-2025-38478",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38480",
                                "url": "https://ubuntu.com/security/CVE-2025-38480",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38481",
                                "url": "https://ubuntu.com/security/CVE-2025-38481",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38482",
                                "url": "https://ubuntu.com/security/CVE-2025-38482",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38483",
                                "url": "https://ubuntu.com/security/CVE-2025-38483",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38529",
                                "url": "https://ubuntu.com/security/CVE-2025-38529",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38530",
                                "url": "https://ubuntu.com/security/CVE-2025-38530",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38485",
                                "url": "https://ubuntu.com/security/CVE-2025-38485",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38487",
                                "url": "https://ubuntu.com/security/CVE-2025-38487",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2024-50047",
                                "url": "https://ubuntu.com/security/CVE-2024-50047",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38488",
                                "url": "https://ubuntu.com/security/CVE-2025-38488",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38489",
                                "url": "https://ubuntu.com/security/CVE-2025-38489",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38532",
                                "url": "https://ubuntu.com/security/CVE-2025-38532",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38533",
                                "url": "https://ubuntu.com/security/CVE-2025-38533",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38490",
                                "url": "https://ubuntu.com/security/CVE-2025-38490",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38538",
                                "url": "https://ubuntu.com/security/CVE-2025-38538",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38493",
                                "url": "https://ubuntu.com/security/CVE-2025-38493",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38539",
                                "url": "https://ubuntu.com/security/CVE-2025-38539",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38494",
                                "url": "https://ubuntu.com/security/CVE-2025-38494",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38495",
                                "url": "https://ubuntu.com/security/CVE-2025-38495",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38496",
                                "url": "https://ubuntu.com/security/CVE-2025-38496",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38497",
                                "url": "https://ubuntu.com/security/CVE-2025-38497",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38535",
                                "url": "https://ubuntu.com/security/CVE-2025-38535",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38507",
                                "url": "https://ubuntu.com/security/CVE-2025-38507",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38511",
                                "url": "https://ubuntu.com/security/CVE-2025-38511",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38520",
                                "url": "https://ubuntu.com/security/CVE-2025-38520",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38521",
                                "url": "https://ubuntu.com/security/CVE-2025-38521",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38506",
                                "url": "https://ubuntu.com/security/CVE-2025-38506",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38104",
                                "url": "https://ubuntu.com/security/CVE-2025-38104",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38067",
                                "url": "https://ubuntu.com/security/CVE-2025-38067",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37984",
                                "url": "https://ubuntu.com/security/CVE-2025-37984",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38437",
                                "url": "https://ubuntu.com/security/CVE-2025-38437",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38510",
                                "url": "https://ubuntu.com/security/CVE-2025-38510",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38503",
                                "url": "https://ubuntu.com/security/CVE-2025-38503",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38439",
                                "url": "https://ubuntu.com/security/CVE-2025-38439",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38542",
                                "url": "https://ubuntu.com/security/CVE-2025-38542",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38441",
                                "url": "https://ubuntu.com/security/CVE-2025-38441",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38443",
                                "url": "https://ubuntu.com/security/CVE-2025-38443",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38444",
                                "url": "https://ubuntu.com/security/CVE-2025-38444",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38445",
                                "url": "https://ubuntu.com/security/CVE-2025-38445",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38543",
                                "url": "https://ubuntu.com/security/CVE-2025-38543",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38513",
                                "url": "https://ubuntu.com/security/CVE-2025-38513",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38448",
                                "url": "https://ubuntu.com/security/CVE-2025-38448",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38515",
                                "url": "https://ubuntu.com/security/CVE-2025-38515",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38449",
                                "url": "https://ubuntu.com/security/CVE-2025-38449",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38512",
                                "url": "https://ubuntu.com/security/CVE-2025-38512",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38516",
                                "url": "https://ubuntu.com/security/CVE-2025-38516",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38455",
                                "url": "https://ubuntu.com/security/CVE-2025-38455",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38456",
                                "url": "https://ubuntu.com/security/CVE-2025-38456",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38514",
                                "url": "https://ubuntu.com/security/CVE-2025-38514",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38544",
                                "url": "https://ubuntu.com/security/CVE-2025-38544",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38457",
                                "url": "https://ubuntu.com/security/CVE-2025-38457",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38458",
                                "url": "https://ubuntu.com/security/CVE-2025-38458",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38459",
                                "url": "https://ubuntu.com/security/CVE-2025-38459",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38546",
                                "url": "https://ubuntu.com/security/CVE-2025-38546",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38460",
                                "url": "https://ubuntu.com/security/CVE-2025-38460",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38461",
                                "url": "https://ubuntu.com/security/CVE-2025-38461",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38462",
                                "url": "https://ubuntu.com/security/CVE-2025-38462",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38463",
                                "url": "https://ubuntu.com/security/CVE-2025-38463",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38464",
                                "url": "https://ubuntu.com/security/CVE-2025-38464",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38465",
                                "url": "https://ubuntu.com/security/CVE-2025-38465",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38466",
                                "url": "https://ubuntu.com/security/CVE-2025-38466",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38467",
                                "url": "https://ubuntu.com/security/CVE-2025-38467",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38349",
                                "url": "https://ubuntu.com/security/CVE-2025-38349",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38407",
                                "url": "https://ubuntu.com/security/CVE-2025-38407",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38374",
                                "url": "https://ubuntu.com/security/CVE-2025-38374",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38373",
                                "url": "https://ubuntu.com/security/CVE-2025-38373",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38408",
                                "url": "https://ubuntu.com/security/CVE-2025-38408",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38279",
                                "url": "https://ubuntu.com/security/CVE-2025-38279",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38289",
                                "url": "https://ubuntu.com/security/CVE-2025-38289",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38392",
                                "url": "https://ubuntu.com/security/CVE-2025-38392",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38402",
                                "url": "https://ubuntu.com/security/CVE-2025-38402",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38405",
                                "url": "https://ubuntu.com/security/CVE-2025-38405",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38388",
                                "url": "https://ubuntu.com/security/CVE-2025-38388",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38390",
                                "url": "https://ubuntu.com/security/CVE-2025-38390",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2024-36350",
                                "url": "https://ubuntu.com/security/CVE-2024-36350",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2024-36357",
                                "url": "https://ubuntu.com/security/CVE-2024-36357",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38376",
                                "url": "https://ubuntu.com/security/CVE-2025-38376",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38396",
                                "url": "https://ubuntu.com/security/CVE-2025-38396",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38371",
                                "url": "https://ubuntu.com/security/CVE-2025-38371",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38384",
                                "url": "https://ubuntu.com/security/CVE-2025-38384",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38386",
                                "url": "https://ubuntu.com/security/CVE-2025-38386",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38406",
                                "url": "https://ubuntu.com/security/CVE-2025-38406",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38399",
                                "url": "https://ubuntu.com/security/CVE-2025-38399",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38409",
                                "url": "https://ubuntu.com/security/CVE-2025-38409",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38410",
                                "url": "https://ubuntu.com/security/CVE-2025-38410",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38377",
                                "url": "https://ubuntu.com/security/CVE-2025-38377",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38389",
                                "url": "https://ubuntu.com/security/CVE-2025-38389",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38385",
                                "url": "https://ubuntu.com/security/CVE-2025-38385",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38412",
                                "url": "https://ubuntu.com/security/CVE-2025-38412",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38382",
                                "url": "https://ubuntu.com/security/CVE-2025-38382",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38393",
                                "url": "https://ubuntu.com/security/CVE-2025-38393",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38400",
                                "url": "https://ubuntu.com/security/CVE-2025-38400",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38387",
                                "url": "https://ubuntu.com/security/CVE-2025-38387",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38401",
                                "url": "https://ubuntu.com/security/CVE-2025-38401",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38391",
                                "url": "https://ubuntu.com/security/CVE-2025-38391",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38395",
                                "url": "https://ubuntu.com/security/CVE-2025-38395",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38403",
                                "url": "https://ubuntu.com/security/CVE-2025-38403",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38375",
                                "url": "https://ubuntu.com/security/CVE-2025-38375",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37842",
                                "url": "https://ubuntu.com/security/CVE-2025-37842",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23155",
                                "url": "https://ubuntu.com/security/CVE-2025-23155",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-22101",
                                "url": "https://ubuntu.com/security/CVE-2025-22101",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38361",
                                "url": "https://ubuntu.com/security/CVE-2025-38361",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38364",
                                "url": "https://ubuntu.com/security/CVE-2025-38364",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38246",
                                "url": "https://ubuntu.com/security/CVE-2025-38246",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38250",
                                "url": "https://ubuntu.com/security/CVE-2025-38250",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38253",
                                "url": "https://ubuntu.com/security/CVE-2025-38253",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38264",
                                "url": "https://ubuntu.com/security/CVE-2025-38264",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38362",
                                "url": "https://ubuntu.com/security/CVE-2025-38362",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38354",
                                "url": "https://ubuntu.com/security/CVE-2025-38354",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38363",
                                "url": "https://ubuntu.com/security/CVE-2025-38363",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38239",
                                "url": "https://ubuntu.com/security/CVE-2025-38239",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38365",
                                "url": "https://ubuntu.com/security/CVE-2025-38365",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38244",
                                "url": "https://ubuntu.com/security/CVE-2025-38244",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38245",
                                "url": "https://ubuntu.com/security/CVE-2025-38245",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38249",
                                "url": "https://ubuntu.com/security/CVE-2025-38249",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38251",
                                "url": "https://ubuntu.com/security/CVE-2025-38251",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38255",
                                "url": "https://ubuntu.com/security/CVE-2025-38255",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38257",
                                "url": "https://ubuntu.com/security/CVE-2025-38257",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38258",
                                "url": "https://ubuntu.com/security/CVE-2025-38258",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38259",
                                "url": "https://ubuntu.com/security/CVE-2025-38259",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38230",
                                "url": "https://ubuntu.com/security/CVE-2025-38230",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38260",
                                "url": "https://ubuntu.com/security/CVE-2025-38260",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38262",
                                "url": "https://ubuntu.com/security/CVE-2025-38262",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38368",
                                "url": "https://ubuntu.com/security/CVE-2025-38368",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38436",
                                "url": "https://ubuntu.com/security/CVE-2025-38436",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38263",
                                "url": "https://ubuntu.com/security/CVE-2025-38263",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38369",
                                "url": "https://ubuntu.com/security/CVE-2025-38369",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-22128",
                                "url": "https://ubuntu.com/security/CVE-2025-22128",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38333",
                                "url": "https://ubuntu.com/security/CVE-2025-38333",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38210",
                                "url": "https://ubuntu.com/security/CVE-2025-38210",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38232",
                                "url": "https://ubuntu.com/security/CVE-2025-38232",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38320",
                                "url": "https://ubuntu.com/security/CVE-2025-38320",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38424",
                                "url": "https://ubuntu.com/security/CVE-2025-38424",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38321",
                                "url": "https://ubuntu.com/security/CVE-2025-38321",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38180",
                                "url": "https://ubuntu.com/security/CVE-2025-38180",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38323",
                                "url": "https://ubuntu.com/security/CVE-2025-38323",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38181",
                                "url": "https://ubuntu.com/security/CVE-2025-38181",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38182",
                                "url": "https://ubuntu.com/security/CVE-2025-38182",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38183",
                                "url": "https://ubuntu.com/security/CVE-2025-38183",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38184",
                                "url": "https://ubuntu.com/security/CVE-2025-38184",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38185",
                                "url": "https://ubuntu.com/security/CVE-2025-38185",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38324",
                                "url": "https://ubuntu.com/security/CVE-2025-38324",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38420",
                                "url": "https://ubuntu.com/security/CVE-2025-38420",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38326",
                                "url": "https://ubuntu.com/security/CVE-2025-38326",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38089",
                                "url": "https://ubuntu.com/security/CVE-2025-38089",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38084",
                                "url": "https://ubuntu.com/security/CVE-2025-38084",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38190",
                                "url": "https://ubuntu.com/security/CVE-2025-38190",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38191",
                                "url": "https://ubuntu.com/security/CVE-2025-38191",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38192",
                                "url": "https://ubuntu.com/security/CVE-2025-38192",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38193",
                                "url": "https://ubuntu.com/security/CVE-2025-38193",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38328",
                                "url": "https://ubuntu.com/security/CVE-2025-38328",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38194",
                                "url": "https://ubuntu.com/security/CVE-2025-38194",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38090",
                                "url": "https://ubuntu.com/security/CVE-2025-38090",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38197",
                                "url": "https://ubuntu.com/security/CVE-2025-38197",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38198",
                                "url": "https://ubuntu.com/security/CVE-2025-38198",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38331",
                                "url": "https://ubuntu.com/security/CVE-2025-38331",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38200",
                                "url": "https://ubuntu.com/security/CVE-2025-38200",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38332",
                                "url": "https://ubuntu.com/security/CVE-2025-38332",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38342",
                                "url": "https://ubuntu.com/security/CVE-2025-38342",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38334",
                                "url": "https://ubuntu.com/security/CVE-2025-38334",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38425",
                                "url": "https://ubuntu.com/security/CVE-2025-38425",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38343",
                                "url": "https://ubuntu.com/security/CVE-2025-38343",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38202",
                                "url": "https://ubuntu.com/security/CVE-2025-38202",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38422",
                                "url": "https://ubuntu.com/security/CVE-2025-38422",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38344",
                                "url": "https://ubuntu.com/security/CVE-2025-38344",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38345",
                                "url": "https://ubuntu.com/security/CVE-2025-38345",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38085",
                                "url": "https://ubuntu.com/security/CVE-2025-38085",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38208",
                                "url": "https://ubuntu.com/security/CVE-2025-38208",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38418",
                                "url": "https://ubuntu.com/security/CVE-2025-38418",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38419",
                                "url": "https://ubuntu.com/security/CVE-2025-38419",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38427",
                                "url": "https://ubuntu.com/security/CVE-2025-38427",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38086",
                                "url": "https://ubuntu.com/security/CVE-2025-38086",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38346",
                                "url": "https://ubuntu.com/security/CVE-2025-38346",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38211",
                                "url": "https://ubuntu.com/security/CVE-2025-38211",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38212",
                                "url": "https://ubuntu.com/security/CVE-2025-38212",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38214",
                                "url": "https://ubuntu.com/security/CVE-2025-38214",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38215",
                                "url": "https://ubuntu.com/security/CVE-2025-38215",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38087",
                                "url": "https://ubuntu.com/security/CVE-2025-38087",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38416",
                                "url": "https://ubuntu.com/security/CVE-2025-38416",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38217",
                                "url": "https://ubuntu.com/security/CVE-2025-38217",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38218",
                                "url": "https://ubuntu.com/security/CVE-2025-38218",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38219",
                                "url": "https://ubuntu.com/security/CVE-2025-38219",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38347",
                                "url": "https://ubuntu.com/security/CVE-2025-38347",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38428",
                                "url": "https://ubuntu.com/security/CVE-2025-38428",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38220",
                                "url": "https://ubuntu.com/security/CVE-2025-38220",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38222",
                                "url": "https://ubuntu.com/security/CVE-2025-38222",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38336",
                                "url": "https://ubuntu.com/security/CVE-2025-38336",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38429",
                                "url": "https://ubuntu.com/security/CVE-2025-38429",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38225",
                                "url": "https://ubuntu.com/security/CVE-2025-38225",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38226",
                                "url": "https://ubuntu.com/security/CVE-2025-38226",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38229",
                                "url": "https://ubuntu.com/security/CVE-2025-38229",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38337",
                                "url": "https://ubuntu.com/security/CVE-2025-38337",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38338",
                                "url": "https://ubuntu.com/security/CVE-2025-38338",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38231",
                                "url": "https://ubuntu.com/security/CVE-2025-38231",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38430",
                                "url": "https://ubuntu.com/security/CVE-2025-38430",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38348",
                                "url": "https://ubuntu.com/security/CVE-2025-38348",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38101",
                                "url": "https://ubuntu.com/security/CVE-2025-38101",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38269",
                                "url": "https://ubuntu.com/security/CVE-2025-38269",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38303",
                                "url": "https://ubuntu.com/security/CVE-2025-38303",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38414",
                                "url": "https://ubuntu.com/security/CVE-2025-38414",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38125",
                                "url": "https://ubuntu.com/security/CVE-2025-38125",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38129",
                                "url": "https://ubuntu.com/security/CVE-2025-38129",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38156",
                                "url": "https://ubuntu.com/security/CVE-2025-38156",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38162",
                                "url": "https://ubuntu.com/security/CVE-2025-38162",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38292",
                                "url": "https://ubuntu.com/security/CVE-2025-38292",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38164",
                                "url": "https://ubuntu.com/security/CVE-2025-38164",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38169",
                                "url": "https://ubuntu.com/security/CVE-2025-38169",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38299",
                                "url": "https://ubuntu.com/security/CVE-2025-38299",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38100",
                                "url": "https://ubuntu.com/security/CVE-2025-38100",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38102",
                                "url": "https://ubuntu.com/security/CVE-2025-38102",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38103",
                                "url": "https://ubuntu.com/security/CVE-2025-38103",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38107",
                                "url": "https://ubuntu.com/security/CVE-2025-38107",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38108",
                                "url": "https://ubuntu.com/security/CVE-2025-38108",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38109",
                                "url": "https://ubuntu.com/security/CVE-2025-38109",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38304",
                                "url": "https://ubuntu.com/security/CVE-2025-38304",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38110",
                                "url": "https://ubuntu.com/security/CVE-2025-38110",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38111",
                                "url": "https://ubuntu.com/security/CVE-2025-38111",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38112",
                                "url": "https://ubuntu.com/security/CVE-2025-38112",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38113",
                                "url": "https://ubuntu.com/security/CVE-2025-38113",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38088",
                                "url": "https://ubuntu.com/security/CVE-2025-38088",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38115",
                                "url": "https://ubuntu.com/security/CVE-2025-38115",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38305",
                                "url": "https://ubuntu.com/security/CVE-2025-38305",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38117",
                                "url": "https://ubuntu.com/security/CVE-2025-38117",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38119",
                                "url": "https://ubuntu.com/security/CVE-2025-38119",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38307",
                                "url": "https://ubuntu.com/security/CVE-2025-38307",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38310",
                                "url": "https://ubuntu.com/security/CVE-2025-38310",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38120",
                                "url": "https://ubuntu.com/security/CVE-2025-38120",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38122",
                                "url": "https://ubuntu.com/security/CVE-2025-38122",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38123",
                                "url": "https://ubuntu.com/security/CVE-2025-38123",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38124",
                                "url": "https://ubuntu.com/security/CVE-2025-38124",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38126",
                                "url": "https://ubuntu.com/security/CVE-2025-38126",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38127",
                                "url": "https://ubuntu.com/security/CVE-2025-38127",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38131",
                                "url": "https://ubuntu.com/security/CVE-2025-38131",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38274",
                                "url": "https://ubuntu.com/security/CVE-2025-38274",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38135",
                                "url": "https://ubuntu.com/security/CVE-2025-38135",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38136",
                                "url": "https://ubuntu.com/security/CVE-2025-38136",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38138",
                                "url": "https://ubuntu.com/security/CVE-2025-38138",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38275",
                                "url": "https://ubuntu.com/security/CVE-2025-38275",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38142",
                                "url": "https://ubuntu.com/security/CVE-2025-38142",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38277",
                                "url": "https://ubuntu.com/security/CVE-2025-38277",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38143",
                                "url": "https://ubuntu.com/security/CVE-2025-38143",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38312",
                                "url": "https://ubuntu.com/security/CVE-2025-38312",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38145",
                                "url": "https://ubuntu.com/security/CVE-2025-38145",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38313",
                                "url": "https://ubuntu.com/security/CVE-2025-38313",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38415",
                                "url": "https://ubuntu.com/security/CVE-2025-38415",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38146",
                                "url": "https://ubuntu.com/security/CVE-2025-38146",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38147",
                                "url": "https://ubuntu.com/security/CVE-2025-38147",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38278",
                                "url": "https://ubuntu.com/security/CVE-2025-38278",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38148",
                                "url": "https://ubuntu.com/security/CVE-2025-38148",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38149",
                                "url": "https://ubuntu.com/security/CVE-2025-38149",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38280",
                                "url": "https://ubuntu.com/security/CVE-2025-38280",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38153",
                                "url": "https://ubuntu.com/security/CVE-2025-38153",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38154",
                                "url": "https://ubuntu.com/security/CVE-2025-38154",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38155",
                                "url": "https://ubuntu.com/security/CVE-2025-38155",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38282",
                                "url": "https://ubuntu.com/security/CVE-2025-38282",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38157",
                                "url": "https://ubuntu.com/security/CVE-2025-38157",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38283",
                                "url": "https://ubuntu.com/security/CVE-2025-38283",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38158",
                                "url": "https://ubuntu.com/security/CVE-2025-38158",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39890",
                                "url": "https://ubuntu.com/security/CVE-2025-39890",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38159",
                                "url": "https://ubuntu.com/security/CVE-2025-38159",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38285",
                                "url": "https://ubuntu.com/security/CVE-2025-38285",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38286",
                                "url": "https://ubuntu.com/security/CVE-2025-38286",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38160",
                                "url": "https://ubuntu.com/security/CVE-2025-38160",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38161",
                                "url": "https://ubuntu.com/security/CVE-2025-38161",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38290",
                                "url": "https://ubuntu.com/security/CVE-2025-38290",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38163",
                                "url": "https://ubuntu.com/security/CVE-2025-38163",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38165",
                                "url": "https://ubuntu.com/security/CVE-2025-38165",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38166",
                                "url": "https://ubuntu.com/security/CVE-2025-38166",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38293",
                                "url": "https://ubuntu.com/security/CVE-2025-38293",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38295",
                                "url": "https://ubuntu.com/security/CVE-2025-38295",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38167",
                                "url": "https://ubuntu.com/security/CVE-2025-38167",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38170",
                                "url": "https://ubuntu.com/security/CVE-2025-38170",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38319",
                                "url": "https://ubuntu.com/security/CVE-2025-38319",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38298",
                                "url": "https://ubuntu.com/security/CVE-2025-38298",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38173",
                                "url": "https://ubuntu.com/security/CVE-2025-38173",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38300",
                                "url": "https://ubuntu.com/security/CVE-2025-38300",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38174",
                                "url": "https://ubuntu.com/security/CVE-2025-38174",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38265",
                                "url": "https://ubuntu.com/security/CVE-2025-38265",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38053",
                                "url": "https://ubuntu.com/security/CVE-2025-38053",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38055",
                                "url": "https://ubuntu.com/security/CVE-2025-38055",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38057",
                                "url": "https://ubuntu.com/security/CVE-2025-38057",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38060",
                                "url": "https://ubuntu.com/security/CVE-2025-38060",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38098",
                                "url": "https://ubuntu.com/security/CVE-2025-38098",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38099",
                                "url": "https://ubuntu.com/security/CVE-2025-38099",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38073",
                                "url": "https://ubuntu.com/security/CVE-2025-38073",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38051",
                                "url": "https://ubuntu.com/security/CVE-2025-38051",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38077",
                                "url": "https://ubuntu.com/security/CVE-2025-38077",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38078",
                                "url": "https://ubuntu.com/security/CVE-2025-38078",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38003",
                                "url": "https://ubuntu.com/security/CVE-2025-38003",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38004",
                                "url": "https://ubuntu.com/security/CVE-2025-38004",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38031",
                                "url": "https://ubuntu.com/security/CVE-2025-38031",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38079",
                                "url": "https://ubuntu.com/security/CVE-2025-38079",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38052",
                                "url": "https://ubuntu.com/security/CVE-2025-38052",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38097",
                                "url": "https://ubuntu.com/security/CVE-2025-38097",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38058",
                                "url": "https://ubuntu.com/security/CVE-2025-38058",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38059",
                                "url": "https://ubuntu.com/security/CVE-2025-38059",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38034",
                                "url": "https://ubuntu.com/security/CVE-2025-38034",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38035",
                                "url": "https://ubuntu.com/security/CVE-2025-38035",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38037",
                                "url": "https://ubuntu.com/security/CVE-2025-38037",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38039",
                                "url": "https://ubuntu.com/security/CVE-2025-38039",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38080",
                                "url": "https://ubuntu.com/security/CVE-2025-38080",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38040",
                                "url": "https://ubuntu.com/security/CVE-2025-38040",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38061",
                                "url": "https://ubuntu.com/security/CVE-2025-38061",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38062",
                                "url": "https://ubuntu.com/security/CVE-2025-38062",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38063",
                                "url": "https://ubuntu.com/security/CVE-2025-38063",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38043",
                                "url": "https://ubuntu.com/security/CVE-2025-38043",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38044",
                                "url": "https://ubuntu.com/security/CVE-2025-38044",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38065",
                                "url": "https://ubuntu.com/security/CVE-2025-38065",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38066",
                                "url": "https://ubuntu.com/security/CVE-2025-38066",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38068",
                                "url": "https://ubuntu.com/security/CVE-2025-38068",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38045",
                                "url": "https://ubuntu.com/security/CVE-2025-38045",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38071",
                                "url": "https://ubuntu.com/security/CVE-2025-38071",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38072",
                                "url": "https://ubuntu.com/security/CVE-2025-38072",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38081",
                                "url": "https://ubuntu.com/security/CVE-2025-38081",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38074",
                                "url": "https://ubuntu.com/security/CVE-2025-38074",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38048",
                                "url": "https://ubuntu.com/security/CVE-2025-38048",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38075",
                                "url": "https://ubuntu.com/security/CVE-2025-38075",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37968",
                                "url": "https://ubuntu.com/security/CVE-2025-37968",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38011",
                                "url": "https://ubuntu.com/security/CVE-2025-38011",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-21931",
                                "url": "https://ubuntu.com/security/CVE-2025-21931",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37960",
                                "url": "https://ubuntu.com/security/CVE-2025-37960",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37967",
                                "url": "https://ubuntu.com/security/CVE-2025-37967",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-22102",
                                "url": "https://ubuntu.com/security/CVE-2025-22102",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38008",
                                "url": "https://ubuntu.com/security/CVE-2025-38008",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38014",
                                "url": "https://ubuntu.com/security/CVE-2025-38014",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38015",
                                "url": "https://ubuntu.com/security/CVE-2025-38015",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38005",
                                "url": "https://ubuntu.com/security/CVE-2025-38005",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38009",
                                "url": "https://ubuntu.com/security/CVE-2025-38009",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38010",
                                "url": "https://ubuntu.com/security/CVE-2025-38010",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38095",
                                "url": "https://ubuntu.com/security/CVE-2025-38095",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38018",
                                "url": "https://ubuntu.com/security/CVE-2025-38018",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38019",
                                "url": "https://ubuntu.com/security/CVE-2025-38019",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38013",
                                "url": "https://ubuntu.com/security/CVE-2025-38013",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38027",
                                "url": "https://ubuntu.com/security/CVE-2025-38027",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38020",
                                "url": "https://ubuntu.com/security/CVE-2025-38020",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38094",
                                "url": "https://ubuntu.com/security/CVE-2025-38094",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38006",
                                "url": "https://ubuntu.com/security/CVE-2025-38006",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37992",
                                "url": "https://ubuntu.com/security/CVE-2025-37992",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38023",
                                "url": "https://ubuntu.com/security/CVE-2025-38023",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38007",
                                "url": "https://ubuntu.com/security/CVE-2025-38007",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38024",
                                "url": "https://ubuntu.com/security/CVE-2025-38024",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37957",
                                "url": "https://ubuntu.com/security/CVE-2025-37957",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37963",
                                "url": "https://ubuntu.com/security/CVE-2025-37963",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37948",
                                "url": "https://ubuntu.com/security/CVE-2025-37948",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37994",
                                "url": "https://ubuntu.com/security/CVE-2025-37994",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37995",
                                "url": "https://ubuntu.com/security/CVE-2025-37995",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37949",
                                "url": "https://ubuntu.com/security/CVE-2025-37949",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37954",
                                "url": "https://ubuntu.com/security/CVE-2025-37954",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37951",
                                "url": "https://ubuntu.com/security/CVE-2025-37951",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37969",
                                "url": "https://ubuntu.com/security/CVE-2025-37969",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37970",
                                "url": "https://ubuntu.com/security/CVE-2025-37970",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37972",
                                "url": "https://ubuntu.com/security/CVE-2025-37972",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37959",
                                "url": "https://ubuntu.com/security/CVE-2025-37959",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37961",
                                "url": "https://ubuntu.com/security/CVE-2025-37961",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37998",
                                "url": "https://ubuntu.com/security/CVE-2025-37998",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37952",
                                "url": "https://ubuntu.com/security/CVE-2025-37952",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37947",
                                "url": "https://ubuntu.com/security/CVE-2025-37947",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37956",
                                "url": "https://ubuntu.com/security/CVE-2025-37956",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37973",
                                "url": "https://ubuntu.com/security/CVE-2025-37973",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37920",
                                "url": "https://ubuntu.com/security/CVE-2025-37920",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37900",
                                "url": "https://ubuntu.com/security/CVE-2025-37900",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37931",
                                "url": "https://ubuntu.com/security/CVE-2025-37931",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37903",
                                "url": "https://ubuntu.com/security/CVE-2025-37903",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37905",
                                "url": "https://ubuntu.com/security/CVE-2025-37905",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37933",
                                "url": "https://ubuntu.com/security/CVE-2025-37933",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37909",
                                "url": "https://ubuntu.com/security/CVE-2025-37909",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37911",
                                "url": "https://ubuntu.com/security/CVE-2025-37911",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37935",
                                "url": "https://ubuntu.com/security/CVE-2025-37935",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37891",
                                "url": "https://ubuntu.com/security/CVE-2025-37891",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37912",
                                "url": "https://ubuntu.com/security/CVE-2025-37912",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37913",
                                "url": "https://ubuntu.com/security/CVE-2025-37913",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37914",
                                "url": "https://ubuntu.com/security/CVE-2025-37914",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37915",
                                "url": "https://ubuntu.com/security/CVE-2025-37915",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37916",
                                "url": "https://ubuntu.com/security/CVE-2025-37916",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37917",
                                "url": "https://ubuntu.com/security/CVE-2025-37917",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37918",
                                "url": "https://ubuntu.com/security/CVE-2025-37918",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37921",
                                "url": "https://ubuntu.com/security/CVE-2025-37921",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37897",
                                "url": "https://ubuntu.com/security/CVE-2025-37897",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37922",
                                "url": "https://ubuntu.com/security/CVE-2025-37922",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37923",
                                "url": "https://ubuntu.com/security/CVE-2025-37923",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37924",
                                "url": "https://ubuntu.com/security/CVE-2025-37924",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37927",
                                "url": "https://ubuntu.com/security/CVE-2025-37927",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37928",
                                "url": "https://ubuntu.com/security/CVE-2025-37928",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37990",
                                "url": "https://ubuntu.com/security/CVE-2025-37990",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37901",
                                "url": "https://ubuntu.com/security/CVE-2025-37901",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37936",
                                "url": "https://ubuntu.com/security/CVE-2025-37936",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37991",
                                "url": "https://ubuntu.com/security/CVE-2025-37991",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37930",
                                "url": "https://ubuntu.com/security/CVE-2025-37930",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37986",
                                "url": "https://ubuntu.com/security/CVE-2025-37986",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37809",
                                "url": "https://ubuntu.com/security/CVE-2025-37809",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37816",
                                "url": "https://ubuntu.com/security/CVE-2025-37816",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37822",
                                "url": "https://ubuntu.com/security/CVE-2025-37822",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37987",
                                "url": "https://ubuntu.com/security/CVE-2025-37987",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37826",
                                "url": "https://ubuntu.com/security/CVE-2025-37826",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37827",
                                "url": "https://ubuntu.com/security/CVE-2025-37827",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37977",
                                "url": "https://ubuntu.com/security/CVE-2025-37977",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37944",
                                "url": "https://ubuntu.com/security/CVE-2025-37944",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37761",
                                "url": "https://ubuntu.com/security/CVE-2025-37761",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37763",
                                "url": "https://ubuntu.com/security/CVE-2025-37763",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37764",
                                "url": "https://ubuntu.com/security/CVE-2025-37764",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37869",
                                "url": "https://ubuntu.com/security/CVE-2025-37869",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37978",
                                "url": "https://ubuntu.com/security/CVE-2025-37978",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37975",
                                "url": "https://ubuntu.com/security/CVE-2025-37975",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37872",
                                "url": "https://ubuntu.com/security/CVE-2025-37872",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37873",
                                "url": "https://ubuntu.com/security/CVE-2025-37873",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-22120",
                                "url": "https://ubuntu.com/security/CVE-2025-22120",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37799",
                                "url": "https://ubuntu.com/security/CVE-2025-37799",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37800",
                                "url": "https://ubuntu.com/security/CVE-2025-37800",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37878",
                                "url": "https://ubuntu.com/security/CVE-2025-37878",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37803",
                                "url": "https://ubuntu.com/security/CVE-2025-37803",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37879",
                                "url": "https://ubuntu.com/security/CVE-2025-37879",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37983",
                                "url": "https://ubuntu.com/security/CVE-2025-37983",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37881",
                                "url": "https://ubuntu.com/security/CVE-2025-37881",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37805",
                                "url": "https://ubuntu.com/security/CVE-2025-37805",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37883",
                                "url": "https://ubuntu.com/security/CVE-2025-37883",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37884",
                                "url": "https://ubuntu.com/security/CVE-2025-37884",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37808",
                                "url": "https://ubuntu.com/security/CVE-2025-37808",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37985",
                                "url": "https://ubuntu.com/security/CVE-2025-37985",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37810",
                                "url": "https://ubuntu.com/security/CVE-2025-37810",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37811",
                                "url": "https://ubuntu.com/security/CVE-2025-37811",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37812",
                                "url": "https://ubuntu.com/security/CVE-2025-37812",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37813",
                                "url": "https://ubuntu.com/security/CVE-2025-37813",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37815",
                                "url": "https://ubuntu.com/security/CVE-2025-37815",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37885",
                                "url": "https://ubuntu.com/security/CVE-2025-37885",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37817",
                                "url": "https://ubuntu.com/security/CVE-2025-37817",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37819",
                                "url": "https://ubuntu.com/security/CVE-2025-37819",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37820",
                                "url": "https://ubuntu.com/security/CVE-2025-37820",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37886",
                                "url": "https://ubuntu.com/security/CVE-2025-37886",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37887",
                                "url": "https://ubuntu.com/security/CVE-2025-37887",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37823",
                                "url": "https://ubuntu.com/security/CVE-2025-37823",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37988",
                                "url": "https://ubuntu.com/security/CVE-2025-37988",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37824",
                                "url": "https://ubuntu.com/security/CVE-2025-37824",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37989",
                                "url": "https://ubuntu.com/security/CVE-2025-37989",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37828",
                                "url": "https://ubuntu.com/security/CVE-2025-37828",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37829",
                                "url": "https://ubuntu.com/security/CVE-2025-37829",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37830",
                                "url": "https://ubuntu.com/security/CVE-2025-37830",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37831",
                                "url": "https://ubuntu.com/security/CVE-2025-37831",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37938",
                                "url": "https://ubuntu.com/security/CVE-2025-37938",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39989",
                                "url": "https://ubuntu.com/security/CVE-2025-39989",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-22026",
                                "url": "https://ubuntu.com/security/CVE-2025-22026",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37836",
                                "url": "https://ubuntu.com/security/CVE-2025-37836",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37846",
                                "url": "https://ubuntu.com/security/CVE-2025-37846",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37942",
                                "url": "https://ubuntu.com/security/CVE-2025-37942",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37856",
                                "url": "https://ubuntu.com/security/CVE-2025-37856",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37861",
                                "url": "https://ubuntu.com/security/CVE-2025-37861",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37744",
                                "url": "https://ubuntu.com/security/CVE-2025-37744",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37745",
                                "url": "https://ubuntu.com/security/CVE-2025-37745",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37945",
                                "url": "https://ubuntu.com/security/CVE-2025-37945",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37759",
                                "url": "https://ubuntu.com/security/CVE-2025-37759",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23140",
                                "url": "https://ubuntu.com/security/CVE-2025-23140",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-22126",
                                "url": "https://ubuntu.com/security/CVE-2025-22126",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37765",
                                "url": "https://ubuntu.com/security/CVE-2025-37765",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37766",
                                "url": "https://ubuntu.com/security/CVE-2025-37766",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37767",
                                "url": "https://ubuntu.com/security/CVE-2025-37767",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37768",
                                "url": "https://ubuntu.com/security/CVE-2025-37768",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37769",
                                "url": "https://ubuntu.com/security/CVE-2025-37769",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37770",
                                "url": "https://ubuntu.com/security/CVE-2025-37770",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37771",
                                "url": "https://ubuntu.com/security/CVE-2025-37771",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37772",
                                "url": "https://ubuntu.com/security/CVE-2025-37772",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37773",
                                "url": "https://ubuntu.com/security/CVE-2025-37773",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37775",
                                "url": "https://ubuntu.com/security/CVE-2025-37775",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37778",
                                "url": "https://ubuntu.com/security/CVE-2025-37778",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37863",
                                "url": "https://ubuntu.com/security/CVE-2025-37863",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37780",
                                "url": "https://ubuntu.com/security/CVE-2025-37780",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37781",
                                "url": "https://ubuntu.com/security/CVE-2025-37781",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37979",
                                "url": "https://ubuntu.com/security/CVE-2025-37979",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37784",
                                "url": "https://ubuntu.com/security/CVE-2025-37784",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37786",
                                "url": "https://ubuntu.com/security/CVE-2025-37786",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37864",
                                "url": "https://ubuntu.com/security/CVE-2025-37864",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37865",
                                "url": "https://ubuntu.com/security/CVE-2025-37865",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37787",
                                "url": "https://ubuntu.com/security/CVE-2025-37787",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37788",
                                "url": "https://ubuntu.com/security/CVE-2025-37788",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37874",
                                "url": "https://ubuntu.com/security/CVE-2025-37874",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37789",
                                "url": "https://ubuntu.com/security/CVE-2025-37789",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37980",
                                "url": "https://ubuntu.com/security/CVE-2025-37980",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37790",
                                "url": "https://ubuntu.com/security/CVE-2025-37790",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37875",
                                "url": "https://ubuntu.com/security/CVE-2025-37875",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37792",
                                "url": "https://ubuntu.com/security/CVE-2025-37792",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37867",
                                "url": "https://ubuntu.com/security/CVE-2025-37867",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37793",
                                "url": "https://ubuntu.com/security/CVE-2025-37793",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37982",
                                "url": "https://ubuntu.com/security/CVE-2025-37982",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37794",
                                "url": "https://ubuntu.com/security/CVE-2025-37794",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37796",
                                "url": "https://ubuntu.com/security/CVE-2025-37796",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23141",
                                "url": "https://ubuntu.com/security/CVE-2025-23141",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37940",
                                "url": "https://ubuntu.com/security/CVE-2025-37940",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37844",
                                "url": "https://ubuntu.com/security/CVE-2025-37844",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23142",
                                "url": "https://ubuntu.com/security/CVE-2025-23142",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23144",
                                "url": "https://ubuntu.com/security/CVE-2025-23144",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37892",
                                "url": "https://ubuntu.com/security/CVE-2025-37892",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23145",
                                "url": "https://ubuntu.com/security/CVE-2025-23145",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23146",
                                "url": "https://ubuntu.com/security/CVE-2025-23146",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37839",
                                "url": "https://ubuntu.com/security/CVE-2025-37839",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23147",
                                "url": "https://ubuntu.com/security/CVE-2025-23147",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23148",
                                "url": "https://ubuntu.com/security/CVE-2025-23148",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23149",
                                "url": "https://ubuntu.com/security/CVE-2025-23149",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23150",
                                "url": "https://ubuntu.com/security/CVE-2025-23150",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23151",
                                "url": "https://ubuntu.com/security/CVE-2025-23151",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23156",
                                "url": "https://ubuntu.com/security/CVE-2025-23156",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23157",
                                "url": "https://ubuntu.com/security/CVE-2025-23157",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37840",
                                "url": "https://ubuntu.com/security/CVE-2025-37840",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37849",
                                "url": "https://ubuntu.com/security/CVE-2025-37849",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23158",
                                "url": "https://ubuntu.com/security/CVE-2025-23158",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23159",
                                "url": "https://ubuntu.com/security/CVE-2025-23159",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23160",
                                "url": "https://ubuntu.com/security/CVE-2025-23160",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37850",
                                "url": "https://ubuntu.com/security/CVE-2025-37850",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37851",
                                "url": "https://ubuntu.com/security/CVE-2025-37851",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23161",
                                "url": "https://ubuntu.com/security/CVE-2025-23161",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37852",
                                "url": "https://ubuntu.com/security/CVE-2025-37852",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37853",
                                "url": "https://ubuntu.com/security/CVE-2025-37853",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37854",
                                "url": "https://ubuntu.com/security/CVE-2025-37854",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-23163",
                                "url": "https://ubuntu.com/security/CVE-2025-23163",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37857",
                                "url": "https://ubuntu.com/security/CVE-2025-37857",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37738",
                                "url": "https://ubuntu.com/security/CVE-2025-37738",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37739",
                                "url": "https://ubuntu.com/security/CVE-2025-37739",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37943",
                                "url": "https://ubuntu.com/security/CVE-2025-37943",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37740",
                                "url": "https://ubuntu.com/security/CVE-2025-37740",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37741",
                                "url": "https://ubuntu.com/security/CVE-2025-37741",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37858",
                                "url": "https://ubuntu.com/security/CVE-2025-37858",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37742",
                                "url": "https://ubuntu.com/security/CVE-2025-37742",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37859",
                                "url": "https://ubuntu.com/security/CVE-2025-37859",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37862",
                                "url": "https://ubuntu.com/security/CVE-2025-37862",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37841",
                                "url": "https://ubuntu.com/security/CVE-2025-37841",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37748",
                                "url": "https://ubuntu.com/security/CVE-2025-37748",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37749",
                                "url": "https://ubuntu.com/security/CVE-2025-37749",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37754",
                                "url": "https://ubuntu.com/security/CVE-2025-37754",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37755",
                                "url": "https://ubuntu.com/security/CVE-2025-37755",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37757",
                                "url": "https://ubuntu.com/security/CVE-2025-37757",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37758",
                                "url": "https://ubuntu.com/security/CVE-2025-37758",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-37801",
                                "url": "https://ubuntu.com/security/CVE-2025-37801",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39946",
                                "url": "https://ubuntu.com/security/CVE-2025-39946",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38584",
                                "url": "https://ubuntu.com/security/CVE-2025-38584",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40019",
                                "url": "https://ubuntu.com/security/CVE-2025-40019",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-38561",
                                "url": "https://ubuntu.com/security/CVE-2025-38561",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-39698",
                                "url": "https://ubuntu.com/security/CVE-2025-39698",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * noble/linux: 6.8.0-98.98 -proposed tracker (LP: #2137901)",
                            "",
                            "  * Packaging resync (LP: #1786013)",
                            "    - [Packaging] debian.master/dkms-versions -- update from kernel-versions",
                            "      (main/2026.01.12)",
                            "",
                            "  * ubuntu_kselftests:_net/net:gre_gso.sh failing (LP: #2136820)",
                            "    - SAUCE increase socat timeout in gre_gso.sh",
                            "",
                            "  * TPM timeouts occur on some Infineon TPMs (LP: #2137528)",
                            "    - tpm: Make chip->{status,cancel,req_canceled} opt",
                            "    - tpm: Check for completion after timeout",
                            "",
                            "  * power: intel_pstate: Fix unchecked MSR (LP: #2130244)",
                            "    - cpufreq: intel_pstate: Unchecked MSR aceess in legacy mode",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722)",
                            "    - selftests/futex: futex_waitv wouldblock test should fail",
                            "    - drm/i915/dg2: wait for HuC load completion before running selftests",
                            "    - drm/i915: Disable RPG during live selftest",
                            "    - objtool: Fix INSN_CONTEXT_SWITCH handling in validate_unret()",
                            "    - octeontx2-pf: qos: fix VF root node parent queue index",
                            "    - tc: Ensure we have enough buffer space when sending filter netlink",
                            "      notifications",
                            "    - net: ethtool: Don't call .cleanup_data when prepare_data fails",
                            "    - drm/tests: modeset: Fix drm_display_mode memory leak",
                            "    - drm/tests: helpers: Add atomic helpers",
                            "    - drm/tests: Add helper to create mock plane",
                            "    - drm/tests: Add helper to create mock crtc",
                            "    - drm/tests: helpers: Add helper for drm_display_mode_from_cea_vic()",
                            "    - drm/tests: helpers: Fix compiler warning",
                            "    - drm/tests: helpers: Create kunit helper to destroy a drm_display_mode",
                            "    - drm/tests: cmdline: Fix drm_display_mode memory leak",
                            "    - drm/tests: modes: Fix drm_display_mode memory leak",
                            "    - drm/tests: probe-helper: Fix drm_display_mode memory leak",
                            "    - ata: sata_sx4: Add error handling in pdc20621_i2c_read()",
                            "    - nvmet-fcloop: swap list_add_tail arguments",
                            "    - net_sched: sch_sfq: use a temporary work area for validating",
                            "      configuration",
                            "    - Revert \"net_sched: sch_sfq: move the limit validation\"",
                            "    - net_sched: sch_sfq: move the limit validation",
                            "    - ipv6: Align behavior across nexthops during path selection",
                            "    - nft_set_pipapo: fix incorrect avx2 match of 5th field octet",
                            "    - fs: consistently deref the files table with rcu_dereference_raw()",
                            "    - umount: Allow superblock owners to force umount",
                            "    - x86/mm: Clear _PAGE_DIRTY for kernel mappings when we clear _PAGE_RW",
                            "    - x86/ia32: Leave NULL selector values 0~3 unchanged",
                            "    - x86/cpu: Don't clear X86_FEATURE_LAHF_LM flag in init_amd_k8() on AMD",
                            "      when running in a virtual machine",
                            "    - perf: arm_pmu: Don't disable counter in armpmu_add()",
                            "    - arm64: cputype: Add QCOM_CPU_PART_KRYO_3XX_GOLD",
                            "    - xen/mcelog: Add __nonstring annotations for unterminated strings",
                            "    - zstd: Increase DYNAMIC_BMI2 GCC version cutoff from 4.8 to 11.0 to work",
                            "      around compiler segfault",
                            "    - ASoC: SOF: topology: Use krealloc_array() to replace krealloc()",
                            "    - HID: pidff: Convert infinite length from Linux API to PID standard",
                            "    - HID: pidff: Do not send effect envelope if it's empty",
                            "    - HID: pidff: Add MISSING_DELAY quirk and its detection",
                            "    - HID: pidff: Add MISSING_PBO quirk and its detection",
                            "    - HID: pidff: Add PERMISSIVE_CONTROL quirk",
                            "    - HID: pidff: Add hid_pidff_init_with_quirks and export as GPL symbol",
                            "    - HID: pidff: Add FIX_WHEEL_DIRECTION quirk",
                            "    - HID: Add hid-universal-pidff driver and supported device ids",
                            "    - [Config] enable hid-universal-pidff driver",
                            "    - HID: pidff: Add PERIODIC_SINE_ONLY quirk",
                            "    - ALSA: hda: intel: Fix Optimus when GPU has no sound",
                            "    - ALSA: hda: intel: Add Lenovo IdeaPad Z570 to probe denylist",
                            "    - ASoC: fsl_audmix: register card device depends on 'dais' property",
                            "    - media: uvcvideo: Add quirk for Actions UVC05",
                            "    - mmc: dw_mmc: add a quirk for accessing 64-bit FIFOs in two halves",
                            "    - ALSA: usb-audio: Fix CME quirk for UF series keyboards",
                            "    - ASoC: amd: Add DMI quirk for ACP6X mic support",
                            "    - ASoC: amd: yc: update quirk data for new Lenovo model",
                            "    - f2fs: don't retry IO for corrupted data scenario",
                            "    - scsi: target: spc: Fix RSOC parameter data header size",
                            "    - net: usb: asix_devices: add FiberGecko DeviceID",
                            "    - fs/jfs: cast inactags to s64 to prevent potential overflow",
                            "    - ata: libata-eh: Do not use ATAPI DMA for a device limited to PIO mode",
                            "    - net: sfp: add quirk for 2.5G OEM BX SFP",
                            "    - ahci: add PCI ID for Marvell 88SE9215 SATA Controller",
                            "    - ext4: protect ext4_release_dquot against freezing",
                            "    - Revert \"f2fs: rebuild nat_bits during umount\"",
                            "    - cdc_ether|r8152: ThinkPad Hybrid USB-C/A Dock quirk",
                            "    - wifi: mt76: mt76x2u: add TP-Link TL-WDN6200 ID to device table",
                            "    - tracing: fix return value in __ftrace_event_enable_disable for",
                            "      TRACE_REG_UNREGISTER",
                            "    - Bluetooth: hci_uart: fix race during initialization",
                            "    - Bluetooth: qca: simplify WCN399x NVM loading",
                            "    - drm: allow encoder mode_set even when connectors change for crtc",
                            "    - drm/amd/display: Update Cursor request mode to the beginning prefetch",
                            "      always",
                            "    - drm/amd/display: add workaround flag to link to force FFE preset",
                            "    - drm: panel-orientation-quirks: Add support for AYANEO 2S",
                            "    - drm: panel-orientation-quirks: Add quirks for AYA NEO Flip DS and KB",
                            "    - drm: panel-orientation-quirks: Add quirk for AYA NEO Slide",
                            "    - drm: panel-orientation-quirks: Add new quirk for GPD Win 2",
                            "    - drm: panel-orientation-quirks: Add quirk for OneXPlayer Mini (Intel)",
                            "    - drm/bridge: panel: forbid initializing a panel with unknown connector",
                            "      type",
                            "    - drivers: base: devres: Allow to release group on device release",
                            "    - drm/amdkfd: clamp queue size to minimum",
                            "    - drm/amdkfd: Fix pqm_destroy_queue race with GPU reset",
                            "    - drm/mediatek: mtk_dpi: Move the input_2p_en bit to platform data",
                            "    - drm/mediatek: mtk_dpi: Explicitly manage TVD clock in power on/off",
                            "    - drm/amdgpu: grab an additional reference on the gang fence v2",
                            "    - tracing: probe-events: Add comments about entry data storing code",
                            "    - ktest: Fix Test Failures Due to Missing LOG_FILE Directories",
                            "    - tpm, tpm_tis: Workaround failed command reception on Infineon devices",
                            "    - pwm: rcar: Improve register calculation",
                            "    - pwm: fsl-ftm: Handle clk_get_rate() returning 0",
                            "    - bpf: support SKF_NET_OFF and SKF_LL_OFF on skb frags",
                            "    - ext4: don't treat fhandle lookup of ea_inode as FS corruption",
                            "    - dt-bindings: media: st,stmipid02: correct lane-polarities maxItems",
                            "    - media: mtk-vcodec: venc: avoid -Wenum-compare-conditional warning",
                            "    - media: i2c: adv748x: Fix test pattern selection mask",
                            "    - media: vim2m: print device name after registering device",
                            "    - media: siano: Fix error handling in smsdvb_module_init()",
                            "    - xenfs/xensyms: respect hypervisor's \"next\" indication",
                            "    - arm64: cputype: Add MIDR_CORTEX_A76AE",
                            "    - arm64: errata: Add QCOM_KRYO_4XX_GOLD to the spectre_bhb_k24_list",
                            "    - arm64: errata: Assume that unknown CPUs _are_ vulnerable to Spectre BHB",
                            "    - arm64: errata: Add KRYO 2XX/3XX/4XX silver cores to Spectre BHB safe",
                            "      list",
                            "    - spi: cadence-qspi: Fix probe on AM62A LP SK",
                            "    - tpm, tpm_tis: Fix timeout handling when waiting for TPM status",
                            "    - media: streamzap: prevent processing IR data on URB failure",
                            "    - media: visl: Fix ERANGE error when setting enum controls",
                            "    - media: platform: stm32: Add check for clk_enable()",
                            "    - media: v4l2-dv-timings: prevent possible overflow in v4l2_detect_gtf()",
                            "    - media: i2c: ccs: Set the device's runtime PM status correctly in remove",
                            "    - media: i2c: ccs: Set the device's runtime PM status correctly in probe",
                            "    - media: i2c: ov7251: Set enable GPIO low in probe",
                            "    - media: i2c: ov7251: Introduce 1 ms delay between regulators and en GPIO",
                            "    - media: i2c: imx219: Rectify runtime PM handling in probe and remove",
                            "    - mptcp: sockopt: fix getting IPV6_V6ONLY",
                            "    - mtd: Add check for devm_kcalloc()",
                            "    - net: dsa: mv88e6xxx: workaround RGMII transmit delay erratum for 6320",
                            "      family",
                            "    - mtd: Replace kcalloc() with devm_kcalloc()",
                            "    - clocksource/drivers/stm32-lptimer: Use wakeup capable instead of init",
                            "      wakeup",
                            "    - wifi: mt76: Add check for devm_kstrdup()",
                            "    - wifi: mac80211: fix integer overflow in hwmp_route_info_get()",
                            "    - io_uring/kbuf: reject zero sized provided buffers",
                            "    - ASoC: q6apm: add q6apm_get_hw_pointer helper",
                            "    - ASoC: qdsp6: q6apm-dai: set 10 ms period and buffer alignment.",
                            "    - ASoC: qdsp6: q6apm-dai: fix capture pipeline overruns.",
                            "    - ASoC: qdsp6: q6asm-dai: fix q6asm_dai_compr_set_params error path",
                            "    - f2fs: fix to avoid atomicity corruption of atomic file",
                            "    - vdpa/mlx5: Fix oversized null mkey longer than 32bit",
                            "    - udf: Fix inode_getblk() return value",
                            "    - smb311 client: fix missing tcon check when mounting with linux/posix",
                            "      extensions",
                            "    - i3c: master: svc: Use readsb helper for reading MDB",
                            "    - leds: rgb: leds-qcom-lpg: Fix pwm resolution max for Hi-Res PWMs",
                            "    - leds: rgb: leds-qcom-lpg: Fix calculation of best period Hi-Res PWMs",
                            "    - mailbox: tegra-hsp: Define dimensioning masks in SoC data",
                            "    - locking/lockdep: Decrease nr_unused_locks if lock unused in zap_class()",
                            "    - lib: scatterlist: fix sg_split_phys to preserve original scatterlist",
                            "      offsets",
                            "    - mptcp: only inc MPJoinAckHMacFailure for HMAC failures",
                            "    - mtd: rawnand: Add status chack in r852_ready()",
                            "    - arm64: mm: Correct the update of max_pfn",
                            "    - arm64: dts: mediatek: mt8173: Fix disp-pwm compatible string",
                            "    - btrfs: fix non-empty delayed iputs list on unmount due to compressed",
                            "      write workers",
                            "    - btrfs: zoned: fix zone activation with missing devices",
                            "    - btrfs: zoned: fix zone finishing with missing devices",
                            "    - iommufd: Fix uninitialized rc in iommufd_access_rw()",
                            "    - sparc/mm: disable preemption in lazy mmu mode",
                            "    - sparc/mm: avoid calling arch_enter/leave_lazy_mmu() in set_ptes",
                            "    - mm/rmap: reject hugetlb folios in folio_make_device_exclusive()",
                            "    - mm: make page_mapped_in_vma() hugetlb walk aware",
                            "    - mm: fix lazy mmu docs and usage",
                            "    - mm/mremap: correctly handle partial mremap() of VMA starting at 0",
                            "    - mm: add missing release barrier on PGDAT_RECLAIM_LOCKED unlock",
                            "    - mm/userfaultfd: fix release hang over concurrent GUP",
                            "    - mm/hwpoison: do not send SIGBUS to processes with recovered clean pages",
                            "    - mm/hugetlb: move hugetlb_sysctl_init() to the __init section",
                            "    - x86/xen: fix balloon target initialization for PVH dom0",
                            "    - tracing: Do not add length to print format in synthetic events",
                            "    - thermal/drivers/rockchip: Add missing rk3328 mapping entry",
                            "    - cifs: fix integer overflow in match_server()",
                            "    - clk: qcom: clk-branch: Fix invert halt status bit check for votable",
                            "      clocks",
                            "    - clk: qcom: gdsc: Release pm subdomains in reverse add order",
                            "    - clk: qcom: gdsc: Capture pm_genpd_add_subdomain result code",
                            "    - clk: qcom: gdsc: Set retain_ff before moving to HW CTRL",
                            "    - crypto: ccp - Fix check for the primary ASP device",
                            "    - dm-ebs: fix prefetch-vs-suspend race",
                            "    - dm-integrity: set ti->error on memory allocation failure",
                            "    - dm-verity: fix prefetch-vs-suspend race",
                            "    - dt-bindings: coresight: qcom,coresight-tpda: Fix too many 'reg'",
                            "    - dt-bindings: coresight: qcom,coresight-tpdm: Fix too many 'reg'",
                            "    - gpio: tegra186: fix resource handling in ACPI probe path",
                            "    - gpio: zynq: Fix wakeup source leaks on device unbind",
                            "    - gve: handle overflow when reporting TX consumed descriptors",
                            "    - KVM: x86: Explicitly zero-initialize on-stack CPUID unions",
                            "    - ntb: use 64-bit arithmetic for the MSI doorbell mask",
                            "    - of/irq: Fix device node refcount leakage in API of_irq_parse_one()",
                            "    - of/irq: Fix device node refcount leakage in API of_irq_parse_raw()",
                            "    - of/irq: Fix device node refcount leakages in of_irq_count()",
                            "    - of/irq: Fix device node refcount leakage in API irq_of_parse_and_map()",
                            "    - of/irq: Fix device node refcount leakages in of_irq_init()",
                            "    - PCI: brcmstb: Fix missing of_node_put() in brcm_pcie_probe()",
                            "    - PCI: Fix reference leak in pci_alloc_child_bus()",
                            "    - phy: freescale: imx8m-pcie: assert phy reset and perst in power off",
                            "    - pinctrl: qcom: Clear latched interrupt status when changing IRQ type",
                            "    - selftests: mptcp: close fd_in before returning in main_loop",
                            "    - selftests: mptcp: fix incorrect fd checks in main_loop",
                            "    - arm64: errata: Add newer ARM cores to the spectre_bhb_loop_affected()",
                            "      lists",
                            "    - ACPI: platform-profile: Fix CFI violation when accessing sysfs files",
                            "    - iommufd: Fail replace if device has not been attached",
                            "    - x86/e820: Fix handling of subpage regions when calculating nosave ranges",
                            "      in e820__register_nosave_regions()",
                            "    - media: mediatek: vcodec: mark vdec_vp9_slice_map_counts_eob_coef",
                            "      noinline",
                            "    - Bluetooth: hci_uart: Fix another race during initialization",
                            "    - scsi: hisi_sas: Enable force phy when SATA disk directly connected",
                            "    - wifi: mac80211: Update skb's control block key in ieee80211_tx_dequeue()",
                            "    - scsi: iscsi: Fix missing scsi_host_put() in error path",
                            "    - md/raid10: fix missing discard IO accounting",
                            "    - md/md-bitmap: fix stats collection for external bitmaps",
                            "    - ASoC: dwc: always enable/disable i2s irqs",
                            "    - ovl: remove unused forward declaration",
                            "    - RDMA/usnic: Fix passing zero to PTR_ERR in usnic_ib_pci_probe()",
                            "    - RDMA/hns: Fix wrong maximum DMA segment size",
                            "    - ASoC: cs42l43: Reset clamp override on jack removal",
                            "    - Bluetooth: hci_event: Fix sending MGMT_EV_DEVICE_FOUND for invalid",
                            "      address",
                            "    - Bluetooth: l2cap: Check encryption key size on incoming connection",
                            "    - Revert \"wifi: mac80211: Update skb's control block key in",
                            "      ieee80211_tx_dequeue()\"",
                            "    - igc: increase wait time before retrying PTM",
                            "    - igc: move ktime snapshot into PTM retry loop",
                            "    - igc: handle the IGC_PTP_ENABLED flag correctly",
                            "    - igc: cleanup PTP module if probe fails",
                            "    - igc: add lock preventing multiple simultaneous PTM transactions",
                            "    - test suite: use %zu to print size_t",
                            "    - pds_core: fix memory leak in pdsc_debugfs_add_qcq()",
                            "    - net: ethernet: ti: am65-cpsw-nuss: rename phy_node -> port_np",
                            "    - net: ethernet: ti: am65-cpsw: fix port_np reference counting",
                            "    - ata: libata-sata: Save all fields from sense data descriptor",
                            "    - netlink: specs: rt-link: add an attr layer around alt-ifname",
                            "    - netlink: specs: rt-link: adjust mctp attribute naming",
                            "    - net: b53: enable BPDU reception for management port",
                            "    - net: bridge: switchdev: do not notify new brentries as changed",
                            "    - net: dsa: avoid refcount warnings when ds->ops->tag_8021q_vlan_del()",
                            "      fails",
                            "    - ptp: ocp: fix start time alignment in ptp_ocp_signal_set",
                            "    - net: ti: icss-iep: Add pwidth configuration for perout signal",
                            "    - net: ti: icss-iep: Add phase offset configuration for perout signal",
                            "    - net: ethernet: mtk_eth_soc: correct the max weight of the queue limit",
                            "      for 100Mbps",
                            "    - net: ethernet: mtk_eth_soc: revise QDMA packet scheduler settings",
                            "    - riscv: Properly export reserved regions in /proc/iomem",
                            "    - kunit: qemu_configs: SH: Respect kunit cmdline",
                            "    - riscv: KGDB: Do not inline arch_kgdb_breakpoint()",
                            "    - riscv: KGDB: Remove \".option norvc/.option rvc\" for kgdb_compiled_break",
                            "    - cpufreq/sched: Fix the usage of CPUFREQ_NEED_UPDATE_LIMITS",
                            "    - writeback: fix false warning in inode_to_wb()",
                            "    - ASoC: codecs:lpass-wsa-macro: Fix vi feedback rate",
                            "    - ASoC: codecs:lpass-wsa-macro: Fix logic of enabling vi channels",
                            "    - asus-laptop: Fix an uninitialized variable",
                            "    - nfs: add missing selections of CONFIG_CRC32",
                            "    - nfsd: decrease sc_count directly if fail to queue dl_recall",
                            "    - i2c: atr: Fix wrong include",
                            "    - ftrace: fix incorrect hash size in register_ftrace_direct()",
                            "    - Bluetooth: l2cap: Process valid commands in too long frame",
                            "    - Bluetooth: vhci: Avoid needless snprintf() calls",
                            "    - btrfs: correctly escape subvol in btrfs_show_options()",
                            "    - crypto: caam/qi - Fix drv_ctx refcount bug",
                            "    - Revert \"UBUNTU: SAUCE: fs: hfs/hfsplus: add key_len boundary check to",
                            "      hfs_bnode_read_key\"",
                            "    - hfs/hfsplus: fix slab-out-of-bounds in hfs_bnode_read_key",
                            "    - loop: properly send KOBJ_CHANGED uevent for disk device",
                            "    - loop: LOOP_SET_FD: send uevents for partitions",
                            "    - mm/gup: fix wrongly calculated returned value in",
                            "      fault_in_safe_writeable()",
                            "    - mm: fix filemap_get_folios_contig returning batches of identical folios",
                            "    - mm: fix apply_to_existing_page_range()",
                            "    - ksmbd: Prevent integer overflow in calculation of deadtime",
                            "    - Revert \"smb: client: fix TCP timers deadlock after rmmod\"",
                            "    - riscv: Avoid fortify warning in syscall_get_arguments()",
                            "    - selftests/mm: generate a temporary mountpoint for cgroup filesystem",
                            "    - smb3 client: fix open hardlink on deferred close file error",
                            "    - string: Add load_unaligned_zeropad() code path to sized_strscpy()",
                            "    - tracing: Fix filter string testing",
                            "    - x86/microcode/AMD: Extend the SHA check to Zen5, block loading of any",
                            "      unreleased standalone Zen5 microcode patches",
                            "    - x86/cpu/amd: Fix workaround for erratum 1054",
                            "    - x86/boot/sev: Avoid shared GHCB page for early memory acceptance",
                            "    - scsi: megaraid_sas: Block zero-length ATA VPD inquiry",
                            "    - scsi: ufs: exynos: Ensure consistent phy reference counts",
                            "    - perf/x86/intel: Allow to update user space GPRs from PEBS records",
                            "    - perf/x86/intel/uncore: Fix the scale of IIO free running counters on SNR",
                            "    - perf/x86/intel/uncore: Fix the scale of IIO free running counters on ICX",
                            "    - perf/x86/intel/uncore: Fix the scale of IIO free running counters on SPR",
                            "    - drm/repaper: fix integer overflows in repeat functions",
                            "    - drm/msm/a6xx: Fix stale rpmh votes from GPU",
                            "    - drm/amd: Handle being compiled without SI or CIK support better",
                            "    - drm/amdgpu/dma_buf: fix page_link check",
                            "    - drm/sti: remove duplicate object names",
                            "    - drm/i915/gvt: fix unterminated-string-initialization warning",
                            "    - io_uring/net: fix accept multishot handling",
                            "    - cpufreq: Reference count policy in cpufreq_update_limits()",
                            "    - kbuild: Add '-fno-builtin-wcslen'",
                            "    - mptcp: sockopt: fix getting freebind & transparent",
                            "    - misc: pci_endpoint_test: Fix 'irq_type' to convey the correct type",
                            "    - efi/libstub: Bump up EFI_MMAP_NR_SLACK_SLOTS to 32",
                            "    - x86/xen: move xen_reserve_extra_memory()",
                            "    - x86/xen: fix memblock_reserve() usage on PVH",
                            "    - x86/split_lock: Fix the delayed detection logic",
                            "    - LoongArch: Eliminate superfluous get_numa_distances_cnt()",
                            "    - Revert \"usb: typec: fix potential array underflow in",
                            "      ucsi_ccg_sync_control()\"",
                            "    - usb: typec: fix potential array underflow in ucsi_ccg_sync_control()",
                            "    - usb: typec: fix pm usage counter imbalance in ucsi_ccg_sync_control()",
                            "    - landlock: Add the errata interface",
                            "    - nvmet-fc: Remove unused functions",
                            "    - xdp: Reset bpf_redirect_info before running a xdp's BPF prog.",
                            "    - sign-file,extract-cert: move common SSL helper functions to a header",
                            "    - sign-file,extract-cert: avoid using deprecated ERR_get_error_line()",
                            "    - sign-file,extract-cert: use pkcs11 provider for OPENSSL MAJOR >= 3",
                            "    - MIPS: dec: Declare which_prom() as static",
                            "    - MIPS: cevt-ds1287: Add missing ds1287.h include",
                            "    - MIPS: ds1287: Match ds1287_set_base_clock() function types",
                            "    - drm/tests: Build KMS helpers when DRM_KUNIT_TEST_HELPERS is enabled",
                            "    - ASoC: Intel: adl: add 2xrt1316 audio configuration",
                            "    - cgroup/cpuset: Fix incorrect isolated_cpus update in",
                            "      update_parent_effective_cpumask()",
                            "    - cgroup/cpuset: Correct invalid remote parition prs",
                            "    - cgroup/cpuset: Fix error handling in remote_partition_disable()",
                            "    - cgroup/cpuset: Revert \"Allow suppression of sched domain rebuild in",
                            "      update_cpumasks_hier()\"",
                            "    - cgroup/cpuset: Enforce at most one rebuild_sched_domains_locked() call",
                            "      per operation",
                            "    - cgroup/cpuset: Further optimize code if CONFIG_CPUSETS_V1 not set",
                            "    - cgroup/cpuset: Fix race between newly created partition and dying one",
                            "    - gpiolib: of: Fix the choice for Ingenic NAND quirk",
                            "    - ublk: refactor recovery configuration flag helpers",
                            "    - net: phy: move phy_link_change() prior to mdio_bus_phy_may_suspend()",
                            "    - iommu/exynos: Fix suspend/resume with IDENTITY domain",
                            "    - perf/dwc_pcie: fix some unreleased resources",
                            "    - Flush console log from kernel_power_off()",
                            "    - ASoC: amd: ps: use macro for ACP6.3 pci revision id",
                            "    - media: s5p-mfc: Corrected NV12M/NV21M plane-sizes",
                            "    - wifi: ath11k: Fix DMA buffer allocation to resolve SWIOTLB issues",
                            "    - wifi: ath11k: fix memory leak in ath11k_xxx_remove()",
                            "    - wifi: mac80211: ensure sdata->work is canceled before initialized.",
                            "    - can: flexcan: Add quirk to handle separate interrupt lines for mailboxes",
                            "    - can: flexcan: add NXP S32G2/S32G3 SoC support",
                            "    - Bluetooth: btusb: Add 2 HWIDs for MT7922",
                            "    - Bluetooth: Add quirk for broken READ_VOICE_SETTING",
                            "    - Bluetooth: Add quirk for broken READ_PAGE_SCAN_TYPE",
                            "    - drm/debugfs: fix printk format for bridge index",
                            "    - drm/amd/display: stop DML2 from removing pipes based on planes",
                            "    - drm/xe/xelp: Move Wa_16011163337 from tunings to workarounds",
                            "    - PCI: Add Rockchip Vendor ID",
                            "    - HID: pidff: Clamp PERIODIC effect period to device's logical range",
                            "    - HID: pidff: Stop all effects before enabling actuators",
                            "    - HID: pidff: Completely rework and fix pidff_reset function",
                            "    - HID: pidff: Simplify pidff_upload_effect function",
                            "    - HID: pidff: Define values used in pidff_find_special_fields",
                            "    - HID: pidff: Rescale time values to match field units",
                            "    - HID: pidff: Factor out code for setting gain",
                            "    - HID: pidff: Move all hid-pidff definitions to a dedicated header",
                            "    - HID: pidff: Simplify pidff_rescale_signed",
                            "    - HID: pidff: Use macros instead of hardcoded min/max values for shorts",
                            "    - HID: pidff: Factor out pool report fetch and remove excess declaration",
                            "    - HID: hid-universal-pidff: Add Asetek wheelbases support",
                            "    - HID: pidff: Comment and code style update",
                            "    - HID: pidff: Support device error response from PID_BLOCK_LOAD",
                            "    - HID: pidff: Remove redundant call to pidff_find_special_keys",
                            "    - HID: pidff: Rename two functions to align them with naming convention",
                            "    - HID: pidff: Clamp effect playback LOOP_COUNT value",
                            "    - HID: pidff: Compute INFINITE value instead of using hardcoded 0xffff",
                            "    - HID: pidff: Fix 90 degrees direction name North -> East",
                            "    - HID: pidff: Fix set_device_control()",
                            "    - media: mgb4: Fix CMT registers update logic",
                            "    - media: mgb4: Fix switched CMT frequency range \"magic values\" sets",
                            "    - media: rockchip: rga: fix rga offset lookup",
                            "    - media: v4l: Add a helper for setting up link-frequencies control",
                            "    - media: v4l2-common.h: kerneldoc: correctly format return values",
                            "    - media: imx219: Adjust PLL settings based on the number of MIPI lanes",
                            "    - media: nuvoton: Fix reference handling of ece_node",
                            "    - media: nuvoton: Fix reference handling of ece_pdev",
                            "    - media: i2c: imx319: Rectify runtime PM handling probe and remove",
                            "    - media: i2c: imx214: Rectify probe error handling related to runtime PM",
                            "    - media: chips-media: wave5: Fix gray color on screen",
                            "    - media: chips-media: wave5: Fix a hang after seeking",
                            "    - wifi: mt76: mt7925: ensure wow pattern command align fw format",
                            "    - wifi: mt76: mt7925: fix country count limitation for CLC",
                            "    - ALSA: hda/realtek: Enable Mute LED on HP OMEN 16 Laptop xd000xx",
                            "    - accel/ivpu: Fix warning in ivpu_ipc_send_receive_internal()",
                            "    - ima: limit the number of open-writers integrity violations",
                            "    - arm64: dts: exynos: gs101: disable pinctrl_gsacore node",
                            "    - btrfs: tests: fix chunk map leak after failure to add it to the tree",
                            "    - mm/damon/ops: have damon_get_folio return folio even for tail pages",
                            "    - CIFS: Propagate min offload along with other parameters from primary to",
                            "      secondary channels.",
                            "    - dm-integrity: fix non-constant-time tag verification",
                            "    - landlock: Move code to ease future backports",
                            "    - landlock: Add erratum for TCP fix",
                            "    - misc: pci_endpoint_test: Fix displaying 'irq_type' after 'request_irq'",
                            "      error",
                            "    - net: mana: Switch to page pool for jumbo frames",
                            "    - PCI: j721e: Fix the value of .linkdown_irq_regfield for J784S4",
                            "    - pinctrl: samsung: add support for eint_fltcon_offset",
                            "    - s390/virtio_ccw: Don't allocate/assign airqs for non-existing queues",
                            "    - thermal/drivers/mediatek/lvts_thermal: Allow early empty sensor slots",
                            "    - thermal/drivers/mediatek/lvts_thermal: Fix wrong lvts_ctrl index",
                            "    - thermal/drivers/mediatek/lvts: Disable monitor mode during suspend",
                            "    - thermal/drivers/mediatek/lvts: Disable Stage 3 thermal threshold",
                            "    - NFSD: fix decoding in nfs4_xdr_dec_cb_getattr",
                            "    - libbpf: Prevent compiler warnings/errors",
                            "    - Upstream stable to v6.6.88, v6.12.24",
                            "    - SAUCE: Enable upstream config option \"CONFIG_CPUSETS_V1\"",
                            "",
                            "  * [SRU] ixgbe: Add support for E610 in Noble (LP: #2131265)",
                            "    - ixgbe: Add support for E610 FW Admin Command Interface",
                            "    - ixgbe: Add support for E610 device capabilities detection",
                            "    - ixgbe: Add link management support for E610 device",
                            "    - ixgbe: Add support for NVM handling in E610 device",
                            "    - ixgbe: Add support for EEPROM dump in E610 device",
                            "    - ixgbe: Add ixgbe_x540 multiple header inclusion protection",
                            "    - ixgbe: Clean up the E610 link management related code",
                            "    - ixgbe: Enable link management in E610 device",
                            "    - ixgbe: fix media type detection for E610 device",
                            "    - ixgbe: fix media cage present detection for E610 device",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586)",
                            "    - io_uring: don't use int for ABI",
                            "    - ALSA: hda/realtek: Fix headset mic on HONOR BRB-X",
                            "    - ALSA: hda/realtek: Add Framework Laptop 13 (AMD Ryzen AI 300) to quirks",
                            "    - smb: client: remove redundant lstrp update in negotiate protocol",
                            "    - gpio: virtio: Fix config space reading.",
                            "    - gpio: mlxbf2: use platform_get_irq_optional()",
                            "    - gpio: mlxbf3: use platform_get_irq_optional()",
                            "    - netlink: avoid infinite retry looping in netlink_unicast()",
                            "    - net: phy: micrel: fix KSZ8081/KSZ8091 cable test",
                            "    - net: gianfar: fix device leak when querying time stamp info",
                            "    - net: enetc: fix device and OF node leak at probe",
                            "    - net: mtk_eth_soc: fix device leak at probe",
                            "    - net: ti: icss-iep: fix device and OF node leaks at probe",
                            "    - net: dpaa: fix device leak when querying time stamp info",
                            "    - NFSD: detect mismatch of file handle and delegation stateid in OPEN op",
                            "    - PCI: Extend isolated function probing to LoongArch",
                            "    - LoongArch: BPF: Fix jump offset calculation in tailcall",
                            "    - sunvdc: Balance device refcount in vdc_port_mpgroup_check",
                            "    - Documentation: ACPI: Fix parent device references",
                            "    - ACPI: processor: perflib: Fix initial _PPC limit application",
                            "    - ACPI: processor: perflib: Move problematic pr->performance check",
                            "    - smb: client: let send_done() cleanup before calling",
                            "      smbd_disconnect_rdma_connection()",
                            "    - smb: client: don't wait for info->send_pending == 0 on error",
                            "    - KVM: x86: Plumb \"force_immediate_exit\" into kvm_entry() tracepoint",
                            "    - KVM: VMX: Re-enter guest in fastpath for \"spurious\" preemption timer",
                            "      exits",
                            "    - KVM: VMX: Handle forced exit due to preemption timer in fastpath",
                            "    - KVM: x86: Move handling of is_guest_mode() into fastpath exit handlers",
                            "    - KVM: VMX: Handle KVM-induced preemption timer exits in fastpath for L2",
                            "    - KVM: x86: Fully defer to vendor code to decide how to force immediate",
                            "      exit",
                            "    - KVM: x86: Convert vcpu_run()'s immediate exit param into a generic",
                            "      bitmap",
                            "    - KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag",
                            "    - KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is supported",
                            "    - KVM: VMX: Extract checking of guest's DEBUGCTL into helper",
                            "    - KVM: nVMX: Check vmcs12->guest_ia32_debugctl on nested VM-Enter",
                            "    - KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter APIs",
                            "    - KVM: VMX: Preserve host's DEBUGCTLMSR_FREEZE_IN_SMM while running the",
                            "      guest",
                            "    - udp: also consider secpath when evaluating ipsec use for checksumming",
                            "    - net: ti: icss-iep: Fix incorrect type for return value in extts_enable()",
                            "    - intel_idle: Allow loading ACPI tables for any family",
                            "    - ptp: prevent possible ABBA deadlock in ptp_clock_freerun()",
                            "    - arm64: Handle KCOV __init vs inline mismatches",
                            "    - nvme-pci: try function level reset on init failure",
                            "    - udf: Verify partition map count",
                            "    - hfs: fix not erasing deleted b-tree node issue",
                            "    - better lockdep annotations for simple_recursive_removal()",
                            "    - ata: libata-sata: Disallow changing LPM state if not supported",
                            "    - fs/ntfs3: correctly create symlink for relative path",
                            "    - ext2: Handle fiemap on empty files to prevent EINVAL",
                            "    - fix locking in efi_secret_unlink()",
                            "    - securityfs: don't pin dentries twice, once is enough...",
                            "    - tracefs: Add d_delete to remove negative dentries",
                            "    - usb: xhci: print xhci->xhc_state when queue_command failed",
                            "    - platform/x86/amd: pmc: Add Lenovo Yoga 6 13ALC6 to pmc quirk list",
                            "    - cpufreq: CPPC: Mark driver with NEED_UPDATE_LIMITS flag",
                            "    - selftests/futex: Define SYS_futex on 32-bit architectures with 64-bit",
                            "      time_t",
                            "    - usb: typec: ucsi: psy: Set current max to 100mA for BC 1.2 and Default",
                            "    - usb: xhci: Avoid showing warnings for dying controller",
                            "    - usb: xhci: Set avg_trb_len = 8 for EP0 during Address Device Command",
                            "    - usb: xhci: Avoid showing errors during surprise removal",
                            "    - soc: qcom: rpmh-rsc: Add RSC version 4 support",
                            "    - remoteproc: imx_rproc: skip clock enable when M-core is managed by the",
                            "      SCU",
                            "    - gpio: wcd934x: check the return value of regmap_update_bits()",
                            "    - cpufreq: Exit governor when failed to start old governor",
                            "    - PM / devfreq: governor: Replace sscanf() with kstrtoul() in",
                            "      set_freq_store()",
                            "    - EDAC/synopsys: Clear the ECC counters on init",
                            "    - ASoC: soc-dapm: set bias_level if snd_soc_dapm_set_bias_level() was",
                            "      successed",
                            "    - thermal/drivers/qcom-spmi-temp-alarm: Enable stage 2 shutdown when",
                            "      required",
                            "    - tools/nolibc: define time_t in terms of __kernel_old_time_t",
                            "    - iio: adc: ad_sigma_delta: don't overallocate scan buffer",
                            "    - gpio: tps65912: check the return value of regmap_update_bits()",
                            "    - tools/build: Fix s390(x) cross-compilation with clang",
                            "    - selftests: tracing: Use mutex_unlock for testing glob filter",
                            "    - ACPI: PRM: Reduce unnecessary printing to avoid user confusion",
                            "    - firmware: tegra: Fix IVC dependency problems",
                            "    - PM: runtime: Clear power.needs_force_resume in pm_runtime_reinit()",
                            "    - thermal: sysfs: Return ENODATA instead of EAGAIN for reads",
                            "    - PM: sleep: console: Fix the black screen issue",
                            "    - ACPI: processor: fix acpi_object initialization",
                            "    - mmc: sdhci-msm: Ensure SD card power isn't ON when card removed",
                            "    - ACPI: APEI: GHES: add TAINT_MACHINE_CHECK on GHES panic path",
                            "    - pps: clients: gpio: fix interrupt handling order in remove path",
                            "    - reset: brcmstb: Enable reset drivers for ARCH_BCM2835",
                            "    - char: misc: Fix improper and inaccurate error code returned by",
                            "      misc_init()",
                            "    - mei: bus: Check for still connected devices in mei_cl_bus_dev_release()",
                            "    - mmc: rtsx_usb_sdmmc: Fix error-path in sd_set_power_mode()",
                            "    - ALSA: hda: Handle the jack polling always via a work",
                            "    - ALSA: hda: Disable jack polling at shutdown",
                            "    - x86/bugs: Avoid warning when overriding return thunk",
                            "    - ASoC: hdac_hdmi: Rate limit logging on connection and disconnection",
                            "    - ALSA: intel8x0: Fix incorrect codec index usage in mixer for ICH4",
                            "    - usb: typec: intel_pmc_mux: Defer probe if SCU IPC isn't present",
                            "    - usb: core: usb_submit_urb: downgrade type check",
                            "    - pm: cpupower: Fix the snapshot-order of tsc,mperf, clock in mperf_stop()",
                            "    - imx8m-blk-ctrl: set ISI panic write hurry level",
                            "    - soc: qcom: mdt_loader: Actually use the e_phoff",
                            "    - platform/x86: thinkpad_acpi: Handle KCOV __init vs inline mismatches",
                            "    - platform/chrome: cros_ec_typec: Defer probe on missing EC parent",
                            "    - ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control",
                            "    - ALSA: pcm: Rewrite recalculate_boundary() to avoid costly loop",
                            "    - ALSA: usb-audio: Avoid precedence issues in mixer_quirks macros",
                            "    - iio: adc: ad7768-1: Ensure SYNC_IN pulse minimum timing requirement",
                            "    - ASoC: codecs: rt5640: Retry DEVICE_ID verification",
                            "    - ASoC: qcom: use drvdata instead of component to keep id",
                            "    - powerpc/thp: tracing: Hide hugepage events under CONFIG_PPC_BOOK3S_64",
                            "    - Bluetooth: hci_sock: Reset cookie to zero in hci_sock_free_cookie()",
                            "    - xen/netfront: Fix TX response spurious interrupts",
                            "    - net: usb: cdc-ncm: check for filtering capability",
                            "    - ktest.pl: Prevent recursion of default variable options",
                            "    - wifi: cfg80211: reject HTC bit for management frames",
                            "    - s390/time: Use monotonic clock in get_cycles()",
                            "    - be2net: Use correct byte order and format string for TCP seq and ack_seq",
                            "    - wifi: rtw89: Lower the timeout in rtw89_fw_read_c2h_reg() for USB",
                            "    - et131x: Add missing check after DMA map",
                            "    - net: ag71xx: Add missing check after DMA map",
                            "    - net/mlx5e: Properly access RCU protected qdisc_sleeping variable",
                            "    - arm64: Mark kernel as tainted on SAE and SError panic",
                            "    - net: mctp: Prevent duplicate binds",
                            "    - wifi: cfg80211: Fix interface type validation",
                            "    - net: ipv4: fix incorrect MTU in broadcast routes",
                            "    - net: thunderx: Fix format-truncation warning in bgx_acpi_match_id()",
                            "    - net: phy: micrel: Add ksz9131_resume()",
                            "    - perf/cxlpmu: Remove unintended newline from IRQ name format string",
                            "    - wifi: iwlwifi: mvm: set gtk id also in older FWs",
                            "    - um: Re-evaluate thread flags repeatedly",
                            "    - wifi: iwlwifi: mvm: fix scan request validation",
                            "    - s390/stp: Remove udelay from stp_sync_clock()",
                            "    - sched/fair: Bump sd->max_newidle_lb_cost when newidle balance fails",
                            "    - wifi: mac80211: don't complete management TX on SAE commit",
                            "    - (powerpc/512) Fix possible `dma_unmap_single()` on uninitialized pointer",
                            "    - ipv6: mcast: Check inet6_dev->dead under idev->mc_lock in",
                            "      __ipv6_dev_mc_inc().",
                            "    - wifi: mac80211: fix rx link assignment for non-MLO stations",
                            "    - drm/msm: use trylock for debugfs",
                            "    - wifi: rtw89: Fix rtw89_mac_power_switch() for USB",
                            "    - wifi: rtw89: Disable deep power saving for USB/SDIO",
                            "    - wifi: mt76: mt7915: mcu: re-init MCU before loading FW patch",
                            "    - kselftest/arm64: Specify SVE data when testing VL set in sve-ptrace",
                            "    - net: thunderbolt: Enable end-to-end flow control also in transmit",
                            "    - net: thunderbolt: Fix the parameter passing of",
                            "      tb_xdomain_enable_paths()/tb_xdomain_disable_paths()",
                            "    - net: atlantic: add set_power to fw_ops for atl2 to fix wol",
                            "    - net: fec: allow disable coalescing",
                            "    - drm/amd/display: Separate set_gsl from set_gsl_source_select",
                            "    - wifi: ath12k: Add memset and update default rate value in wmi tx",
                            "      completion",
                            "    - wifi: iwlwifi: dvm: fix potential overflow in rs_fill_link_cmd()",
                            "    - wifi: iwlwifi: fw: Fix possible memory leak in iwl_fw_dbg_collect",
                            "    - drm/amd/display: Fix 'failed to blank crtc!'",
                            "    - wifi: mac80211: update radar_required in channel context after channel",
                            "      switch",
                            "    - wifi: rtlwifi: fix possible skb memory leak in",
                            "      `_rtl_pci_rx_interrupt()`.",
                            "    - wifi: ath12k: Enable REO queue lookup table feature on QCN9274 hw2.0",
                            "    - powerpc: floppy: Add missing checks after DMA map",
                            "    - netmem: fix skb_frag_address_safe with unreadable skbs",
                            "    - wifi: iwlegacy: Check rate_idx range after addition",
                            "    - neighbour: add support for NUD_PERMANENT proxy entries",
                            "    - dpaa_eth: don't use fixed_phy_change_carrier",
                            "    - drm/amd: Allow printing VanGogh OD SCLK levels without setting dpm to",
                            "      manual",
                            "    - net: vlan: Make is_vlan_dev() a stub when VLAN is not configured",
                            "    - net: vlan: Replace BUG() with WARN_ON_ONCE() in vlan_dev_* stubs",
                            "    - gve: Return error for unknown admin queue command",
                            "    - net: dsa: b53: fix b53_imp_vlan_setup for BCM5325",
                            "    - net: dsa: b53: prevent GMII_PORT_OVERRIDE_CTRL access on BCM5325",
                            "    - net: dsa: b53: prevent DIS_LEARNING access on BCM5325",
                            "    - net: dsa: b53: prevent SWITCH_CTRL access on BCM5325",
                            "    - bpftool: Fix JSON writer resource leak in version command",
                            "    - ptp: Use ratelimite for freerun error message",
                            "    - wifi: rtlwifi: fix possible skb memory leak in",
                            "      _rtl_pci_init_one_rxdesc()",
                            "    - ionic: clean dbpage in de-init",
                            "    - net: ncsi: Fix buffer overflow in fetching version id",
                            "    - drm: renesas: rz-du: mipi_dsi: Add min check for VCLK range",
                            "    - drm/ttm: Should to return the evict error",
                            "    - uapi: in6: restore visibility of most IPv6 socket options",
                            "    - bpf: Make reg_not_null() true for CONST_PTR_TO_MAP",
                            "    - selftests/bpf: Fix a user_ringbuf failure with arm64 64KB page size",
                            "    - drm/amd/display: Avoid trying AUX transactions on disconnected ports",
                            "    - drm/ttm: Respect the shrinker core free target",
                            "    - net: dsa: b53: fix IP_MULTICAST_CTRL on BCM5325",
                            "    - vsock/virtio: Resize receive buffers so that each SKB fits in a 4K page",
                            "    - vhost: fail early when __vhost_add_used() fails",
                            "    - drm/amd/display: Only finalize atomic_obj if it was initialized",
                            "    - drm/amd/display: Avoid configuring PSR granularity if PSR-SU not",
                            "      supported",
                            "    - watchdog: sbsa: Adjust keepalive timeout to avoid MediaTek WS0 race",
                            "      condition",
                            "    - cifs: Fix calling CIFSFindFirst() for root path without msearch",
                            "    - crypto: hisilicon/hpre - fix dma unmap sequence",
                            "    - clk: tegra: periph: Fix error handling and resolve unsigned compare",
                            "      warning",
                            "    - mfd: axp20x: Set explicit ID for AXP313 regulator",
                            "    - phy: rockchip-pcie: Properly disable TEST_WRITE strobe signal",
                            "    - fs/orangefs: use snprintf() instead of sprintf()",
                            "    - watchdog: dw_wdt: Fix default timeout",
                            "    - hwmon: (emc2305) Set initial PWM minimum value during probe based on",
                            "      thermal state",
                            "    - clk: qcom: ipq5018: keep XO clock always on",
                            "    - MIPS: vpe-mt: add missing prototypes for vpe_{alloc,start,stop,free}",
                            "    - watchdog: iTCO_wdt: Report error if timeout configuration fails",
                            "    - crypto: jitter - fix intermediary handling",
                            "    - MIPS: lantiq: falcon: sysctrl: fix request memory check logic",
                            "    - media: v4l2-common: Reduce warnings about missing V4L2_CID_LINK_FREQ",
                            "      control",
                            "    - leds: leds-lp50xx: Handle reg to get correct multi_index",
                            "    - dmaengine: stm32-dma: configure next sg only if there are more than 2",
                            "      sgs",
                            "    - RDMA/core: reduce stack using in nldev_stat_get_doit()",
                            "    - power: supply: qcom_battmgr: Add lithium-polymer entry",
                            "    - scsi: mpt3sas: Correctly handle ATA device errors",
                            "    - scsi: mpi3mr: Correctly handle ATA device errors",
                            "    - pinctrl: stm32: Manage irq affinity settings",
                            "    - media: tc358743: Check I2C succeeded during probe",
                            "    - media: tc358743: Return an appropriate colorspace from tc358743_set_fmt",
                            "    - media: tc358743: Increase FIFO trigger level to 374",
                            "    - media: usb: hdpvr: disable zero-length read messages",
                            "    - media: uvcvideo: Fix bandwidth issue for Alcor camera",
                            "    - crypto: octeontx2 - add timeout for load_fvc completion poll",
                            "    - soundwire: amd: serialize amd manager resume sequence during pm_prepare",
                            "    - soundwire: Move handle_nested_irq outside of sdw_dev_lock",
                            "    - md: dm-zoned-target: Initialize return variable r to avoid uninitialized",
                            "      use",
                            "    - module: Prevent silent truncation of module name in delete_module(2)",
                            "    - i3c: add missing include to internal header",
                            "    - rtc: ds1307: handle oscillator stop flag (OSF) for ds1341",
                            "    - i3c: don't fail if GETHDRCAP is unsupported",
                            "    - i3c: master: Initialize ret in i3c_i2c_notifier_call()",
                            "    - dm-mpath: don't print the \"loaded\" message if registering fails",
                            "    - dm-table: fix checking for rq stackable devices",
                            "    - apparmor: use the condition in AA_BUG_FMT even with debug disabled",
                            "    - i2c: Force DLL0945 touchpad i2c freq to 100khz",
                            "    - f2fs: check the generic conditions first",
                            "    - kconfig: lxdialog: replace strcpy() with strncpy() in inputbox.c",
                            "    - vfio/type1: conditional rescheduling while pinning",
                            "    - kconfig: nconf: Ensure null termination where strncpy is used",
                            "    - scsi: Fix sas_user_scan() to handle wildcard and multi-channel scans",
                            "    - scsi: target: core: Generate correct identifiers for PR OUT transport",
                            "      IDs",
                            "    - scsi: aacraid: Stop using PCI_IRQ_AFFINITY",
                            "    - vfio/mlx5: fix possible overflow in tracking max message size",
                            "    - ipmi: Use dev_warn_ratelimited() for incorrect message warnings",
                            "    - kconfig: gconf: avoid hardcoding model2 in on_treeview2_cursor_changed()",
                            "    - kconfig: gconf: fix potential memory leak in renderer_edited()",
                            "    - kconfig: lxdialog: fix 'space' to (de)select options",
                            "    - ipmi: Fix strcpy source and destination the same",
                            "    - net: phy: smsc: add proper reset flags for LAN8710A",
                            "    - ASoC: Intel: avs: Fix uninitialized pointer error in probe()",
                            "    - pNFS: Fix stripe mapping in block/scsi layout",
                            "    - pNFS: Fix disk addr range check in block/scsi layout",
                            "    - pNFS: Handle RPC size limit for layoutcommits",
                            "    - rtc: ds1307: remove clear of oscillator stop flag (OSF) in probe",
                            "    - scsi: lpfc: Remove redundant assignment to avoid memory leak",
                            "    - ASoC: fsl_sai: replace regmap_write with regmap_update_bits",
                            "    - cifs: reset iface weights when we cannot find a candidate",
                            "    - iommufd: Report unmapped bytes in the error path of",
                            "      iopt_unmap_iova_range",
                            "    - ext4: fix zombie groups in average fragment size lists",
                            "    - ext4: fix largest free orders lists corruption on mb_optimize_scan",
                            "      switch",
                            "    - misc: rtsx: usb: Ensure mmc child device is active when card is present",
                            "    - usb: typec: ucsi: Update power_supply on power role change",
                            "    - thunderbolt: Fix copy+paste error in match_service_id()",
                            "    - cdc-acm: fix race between initial clearing halt and open",
                            "    - btrfs: zoned: use filesystem size not disk size for reclaim decision",
                            "    - btrfs: abort transaction during log replay if walk_log_tree() failed",
                            "    - btrfs: zoned: do not remove unwritten non-data block group",
                            "    - btrfs: clear dirty status from extent buffer on error at",
                            "      insert_new_root()",
                            "    - btrfs: fix log tree replay failure due to file with 0 links and extents",
                            "    - btrfs: zoned: do not select metadata BG as finish target",
                            "    - parisc: Makefile: fix a typo in palo.conf",
                            "    - media: uvcvideo: Do not mark valid metadata as invalid",
                            "    - tools/nolibc: fix spelling of FD_SETBITMASK in FD_* macros",
                            "    - HID: magicmouse: avoid setting up battery timer when not needed",
                            "    - HID: apple: avoid setting up battery timer for devices without battery",
                            "    - rcu: Fix racy re-initialization of irq_work causing hangs",
                            "    - cpufreq: armada-8k: Fix off by one in armada_8k_cpufreq_free_table()",
                            "    - platform/chrome: cros_ec: Unregister notifier in cros_ec_unregister()",
                            "    - m68k: Fix lost column on framebuffer debug console",
                            "    - usb: atm: cxacru: Merge cxacru_upload_firmware() into",
                            "      cxacru_heavy_init()",
                            "    - usb: gadget: udc: renesas_usb3: fix device leak at unbind",
                            "    - usb: musb: omap2430: fix device leak at unbind",
                            "    - usb: dwc3: meson-g12a: fix device leaks at unbind",
                            "    - bus: mhi: host: Fix endianness of BHI vector table",
                            "    - vt: keyboard: Don't process Unicode characters in K_OFF mode",
                            "    - vt: defkeymap: Map keycodes above 127 to K_HOLE",
                            "    - lib/crypto: mips/chacha: Fix clang build and remove unneeded byteswap",
                            "    - crypto: qat - lower priority for skcipher and aead algorithms",
                            "    - ksmbd: extend the connection limiting mechanism to support IPv6",
                            "    - tracing: fprobe-event: Sanitize wildcard for fprobe event name",
                            "    - ext4: check fast symlink for ea_inode correctly",
                            "    - ext4: fix fsmap end of range reporting with bigalloc",
                            "    - ext4: fix reserved gdt blocks handling in fsmap",
                            "    - ext4: don't try to clear the orphan_present feature block device is r/o",
                            "    - ext4: use kmalloc_array() for array space allocation",
                            "    - ext4: fix hole length calculation overflow in non-extent inodes",
                            "    - btrfs: zoned: fix write time activation failure for metadata block group",
                            "    - arm64: dts: ti: k3-pinctrl: Enable Schmitt Trigger by default",
                            "    - arm64: dts: ti: k3-am62a7-sk: fix pinmux for main_uart1",
                            "    - arm64: dts: ti: k3-am62-verdin: Enable pull-ups on I2C buses",
                            "    - dt-bindings: display: sprd,sharkl3-dpu: Fix missing clocks constraints",
                            "    - dt-bindings: display: sprd,sharkl3-dsi-host: Fix missing clocks",
                            "      constraints",
                            "    - scsi: mpi3mr: Fix race between config read submit and interrupt",
                            "      completion",
                            "    - ata: libata-scsi: Fix ata_to_sense_error() status handling",
                            "    - scsi: ufs: ufs-pci: Fix hibernate state transition for Intel MTL-like",
                            "      host controllers",
                            "    - scsi: ufs: ufs-pci: Fix default runtime and system PM levels",
                            "    - ata: libata-scsi: Fix CDL control",
                            "    - zynq_fpga: use sgtable-based scatterlist wrappers",
                            "    - iio: adc: ad_sigma_delta: change to buffer predisable",
                            "    - wifi: brcmsmac: Remove const from tbl_ptr parameter in",
                            "      wlc_lcnphy_common_read_table()",
                            "    - wifi: ath12k: fix dest ring-buffer corruption",
                            "    - wifi: ath12k: fix source ring-buffer corruption",
                            "    - wifi: ath12k: fix dest ring-buffer corruption when ring is full",
                            "    - wifi: ath11k: fix dest ring-buffer corruption",
                            "    - wifi: ath11k: fix source ring-buffer corruption",
                            "    - wifi: ath11k: fix dest ring-buffer corruption when ring is full",
                            "    - pwm: imx-tpm: Reset counter if CMOD is 0",
                            "    - pwm: mediatek: Handle hardware enable and clock enable separately",
                            "    - pwm: mediatek: Fix duty and period setting",
                            "    - hwmon: (gsc-hwmon) fix fan pwm setpoint show functions",
                            "    - mtd: spi-nor: Fix spi_nor_try_unlock_all()",
                            "    - mtd: spinand: propagate spinand_wait() errors from spinand_write_page()",
                            "    - mtd: rawnand: fsmc: Add missing check after DMA map",
                            "    - mtd: rawnand: renesas: Add missing check after DMA map",
                            "    - PCI: endpoint: Fix configfs group removal on driver teardown",
                            "    - vhost/vsock: Avoid allocating arbitrarily-sized SKBs",
                            "    - phy: qcom: phy-qcom-m31: Update IPQ5332 M31 USB phy initialization",
                            "      sequence",
                            "    - soc/tegra: pmc: Ensure power-domains are in a known state",
                            "    - parisc: Check region is readable by user in raw_copy_from_user()",
                            "    - parisc: Define and use set_pte_at()",
                            "    - parisc: Makefile: explain that 64BIT requires both 32-bit and 64-bit",
                            "      compilers",
                            "    - parisc: Rename pte_needs_flush() to pte_needs_cache_flush() in cache.c",
                            "    - parisc: Try to fixup kernel exception in bad_area_nosemaphore path of",
                            "      do_page_fault()",
                            "    - parisc: Update comments in make_insert_tlb",
                            "    - media: gspca: Add bounds checking to firmware parser",
                            "    - media: hi556: correct the test pattern configuration",
                            "    - media: imx: fix a potential memory leak in",
                            "      imx_media_csc_scaler_device_init()",
                            "    - media: vivid: fix wrong pixel_array control size",
                            "    - media: verisilicon: Fix AV1 decoder clock frequency",
                            "    - media: v4l2-ctrls: Don't reset handler's error in",
                            "      v4l2_ctrl_handler_free()",
                            "    - media: ov2659: Fix memory leaks in ov2659_probe()",
                            "    - media: qcom: camss: cleanup media device allocated resource on error",
                            "      path",
                            "    - media: venus: hfi: explicitly release IRQ during teardown",
                            "    - media: venus: vdec: Clamp param smaller than 1fps and bigger than 240.",
                            "    - media: venus: venc: Clamp param smaller than 1fps and bigger than 240",
                            "    - drm/amd: Restore cached power limit during resume",
                            "    - drm/amdgpu: update mmhub 3.0.1 client id mappings",
                            "    - drm/amd/display: Add primary plane to commits for correct VRR handling",
                            "    - drm/amd/display: Don't overwrite dce60_clk_mgr",
                            "    - mptcp: drop skb if MPTCP skb extension allocation fails",
                            "    - mptcp: pm: kernel: flush: do not reset ADD_ADDR limit",
                            "    - selftests/memfd: add test for mapping write-sealed memfd read-only",
                            "    - net: Add net_passive_inc() and net_passive_dec().",
                            "    - smb: client: fix netns refcount leak after net_passive changes",
                            "    - net_sched: sch_ets: implement lockless ets_dump()",
                            "    - leds: flash: leds-qcom-flash: Limit LED current based on thermal",
                            "      condition",
                            "    - leds: flash: leds-qcom-flash: Fix registry access after re-bind",
                            "    - fscrypt: Don't use problematic non-inline crypto engines",
                            "    - block: Make REQ_OP_ZONE_FINISH a write operation",
                            "    - usb: typec: fusb302: cache PD RX state",
                            "    - btrfs: don't ignore inode missing when replaying log tree",
                            "    - btrfs: move transaction aborts to the error site in",
                            "      add_block_group_free_space()",
                            "    - btrfs: always abort transaction on failure to add block group to free",
                            "      space tree",
                            "    - xfs: fully decouple XFS_IBULK* flags from XFS_IWALK* flags",
                            "    - btrfs: fix ssd_spread overallocation",
                            "    - btrfs: constify more pointer parameters",
                            "    - btrfs: populate otime when logging an inode item",
                            "    - btrfs: send: factor out common logic when sending xattrs",
                            "    - btrfs: send: only use boolean variables at process_recorded_refs()",
                            "    - btrfs: send: add and use helper to rename current inode when processing",
                            "      refs",
                            "    - btrfs: send: keep the current inode's path cached",
                            "    - btrfs: send: avoid path allocation for the current inode when issuing",
                            "      commands",
                            "    - btrfs: send: use fallocate for hole punching with send stream v2",
                            "    - btrfs: send: make fs_path_len() inline and constify its argument",
                            "    - wifi: mac80211: check basic rates validity in sta_link_apply_parameters",
                            "    - usb: dwc3: imx8mp: fix device leak at unbind",
                            "    - ata: Fix SATA_MOBILE_LPM_POLICY description in Kconfig",
                            "    - PM: runtime: Take active children into account in",
                            "      pm_runtime_get_if_in_use()",
                            "    - ata: libata-scsi: Return aborted command when missing sense and result",
                            "      TF",
                            "    - kbuild: userprogs: use correct linker when mixing clang and GNU ld",
                            "    - memstick: Fix deadlock by moving removing flag earlier",
                            "    - mmc: sdhci-pci-gli: GL9763e: Rename the gli_set_gl9763e() for",
                            "      consistency",
                            "    - squashfs: fix memory leak in squashfs_fill_super",
                            "    - mm/memory-failure: fix infinite UCE for VM_PFNMAP pfn",
                            "    - ALSA: hda/realtek: Add support for HP EliteBook x360 830 G6 and",
                            "      EliteBook 830 G6",
                            "    - drm/amd/display: Fix fractional fb divider in set_pixel_clock_v3",
                            "    - drm/amd/display: Fix DP audio DTO1 clock source on DCE 6.",
                            "    - drm/amd/display: Find first CRTC and its line time in",
                            "      dce110_fill_display_configs",
                            "    - drm/amd/display: Fill display clock and vblank time in",
                            "      dce110_fill_display_configs",
                            "    - soc: qcom: mdt_loader: Fix error return values in mdt_header_valid()",
                            "    - PCI: rockchip: Use standard PCIe definitions",
                            "    - PCI: rockchip: Set Target Link Speed to 5.0 GT/s before retraining",
                            "    - PCI: imx6: Delay link start until configfs 'start' written",
                            "    - PCI: imx6: Add IMX8MM_EP and IMX8MP_EP fixed 256-byte BAR 4 in",
                            "      epc_features",
                            "    - scsi: mpi3mr: Drop unnecessary volatile from __iomem pointers",
                            "    - scsi: mpi3mr: Serialize admin queue BAR writes on 32-bit systems",
                            "    - ext4: preserve SB_I_VERSION on remount",
                            "    - arm64: dts: ti: k3-am62-main: Remove eMMC High Speed DDR support",
                            "    - mptcp: remove duplicate sk_reset_timer call",
                            "    - mptcp: disable add_addr retransmission when timeout is 0",
                            "    - selftests: mptcp: pm: check flush doesn't reset limits",
                            "    - mmc: sdhci-pci-gli: Use PCI AER definitions, not hard-coded values",
                            "    - mmc: sdhci-pci-gli: Add a new function to simplify the code",
                            "    - cpuidle: menu: Remove iowait influence",
                            "    - cpuidle: governors: menu: Avoid selecting states with too much latency",
                            "    - fpga: zynq_fpga: Fix the wrong usage of dma_map_sgtable()",
                            "    - iio: pressure: bmp280: Use IS_ERR() in bmp280_common_probe()",
                            "    - iio: proximity: isl29501: fix buffered read on big-endian systems",
                            "    - most: core: Drop device reference after usage in get_channel()",
                            "    - cdx: Fix off-by-one error in cdx_rpmsg_probe()",
                            "    - usb: quirks: Add DELAY_INIT quick for another SanDisk 3.2Gen1 Flash",
                            "      Drive",
                            "    - usb: core: hcd: fix accessing unmapped memory in SINGLE_STEP_SET_FEATURE",
                            "      test",
                            "    - usb: renesas-xhci: Fix External ROM access timeouts",
                            "    - USB: storage: Add unusual-devs entry for Novatek NTK96550-based camera",
                            "    - usb: storage: realtek_cr: Use correct byte order for bcs->Residue",
                            "    - USB: storage: Ignore driver CD mode for Realtek multi-mode Wi-Fi dongles",
                            "    - usb: dwc3: Ignore late xferNotReady event to prevent halt timeout",
                            "    - usb: dwc3: pci: add support for the Intel Wildcat Lake",
                            "    - drm/amd/display: Don't overclock DCE 6 by 15%",
                            "    - compiler: remove __ADDRESSABLE_ASM{_STR,}() again",
                            "    - mmc: sdhci-pci-gli: GL9763e: Mask the replay timer timeout of AER",
                            "    - powerpc/boot: Fix build with gcc 15",
                            "    - tracing: Remove unneeded goto out logic",
                            "    - iio: temperature: maxim_thermocouple: use DMA-safe buffer for spi_read()",
                            "    - iio: imu: inv_icm42600: switch timestamp type from int64_t __aligned(8)",
                            "      to aligned_s64",
                            "    - iio: imu: inv_icm42600: use = { } instead of memset()",
                            "    - iio: imu: inv_icm42600: Convert to uXX and sXX integer types",
                            "    - iio: imu: inv_icm42600: change invalid data error to -EBUSY",
                            "    - usb: xhci: Fix slot_id resource race conflict",
                            "    - usb: typec: maxim_contaminant: re-enable cc toggle if cc is open and",
                            "      port is clean",
                            "    - usb: typec: maxim_contaminant: disable low power mode when reading",
                            "      comparator values",
                            "    - spi: spi-fsl-lpspi: Clamp too high speed_hz",
                            "    - cgroup/cpuset: Use static_branch_enable_cpuslocked() on",
                            "      cpusets_insane_config_key",
                            "    - iosys-map: Fix undefined behavior in iosys_map_clear()",
                            "    - RDMA/erdma: Fix ignored return value of init_kernel_qp",
                            "    - RDMA/bnxt_re: Fix to do SRQ armena by default",
                            "    - RDMA/bnxt_re: Fix to remove workload check in SRQ limit path",
                            "    - RDMA/bnxt_re: Fix to initialize the PBL array",
                            "    - Bluetooth: hci_event: fix MTU for BN == 0 in CIS Established",
                            "    - Bluetooth: hci_conn: do return error from hci_enhanced_setup_sync()",
                            "    - mlxsw: spectrum: Forward packets with an IPv4 link-local source IP",
                            "    - ALSA: usb-audio: Fix size validation in convert_chmap_v3()",
                            "    - ipv6: sr: validate HMAC algorithm ID in seg6_hmac_info_add",
                            "    - net: ethernet: mtk_ppe: add RCU lock around dev_fill_forward_path",
                            "    - phy: mscc: Fix timestamping for vsc8584",
                            "    - net: usb: asix_devices: Fix PHY address mask in MDIO bus initialization",
                            "    - LoongArch: Optimize module load time by optimizing PLT/GOT counting",
                            "    - ixgbe: xsk: resolve the negative overflow of budget in ixgbe_xmit_zc",
                            "    - igc: fix disabling L1.2 PCI-E link substate on I226 on init",
                            "    - net/sched: Remove unnecessary WARNING condition for empty child qdisc in",
                            "      htb_activate",
                            "    - bonding: update LACP activity flag after setting lacp_active",
                            "    - bonding: Add independent control state machine",
                            "    - bonding: send LACPDUs periodically in passive mode after receiving",
                            "      partner's LACPDU",
                            "    - Octeontx2-af: Skip overlap check for SPI field",
                            "    - net/mlx5: Base ECVF devlink port attrs from 0",
                            "    - net/mlx5e: Preserve shared buffer capacity during headroom updates",
                            "    - ALSA: usb-audio: Use correct sub-type for UAC3 feature unit validation",
                            "    - s390/hypfs: Avoid unnecessary ioctl registration in debugfs",
                            "    - s390/hypfs: Enable limited access during lockdown",
                            "    - alloc_fdtable(): change calling conventions.",
                            "    - LoongArch: Avoid in-place string operation on FDT content",
                            "    - clk: samsung: gs101: fix CLK_DOUT_CMU_G3D_BUSD",
                            "    - mm/memory-tier: fix abstract distance calculation overflow",
                            "    - nvme-tcp: log TLS handshake failures at error level",
                            "    - ata: ahci: Disallow LPM policy control if not supported",
                            "    - ata: ahci: Disable DIPM if host lacks support",
                            "    - usb: typec: tcpm/tcpci_maxim: fix irq wake usage",
                            "    - pmdomain: ti: Select PM_GENERIC_DOMAINS",
                            "    - cpufreq: intel_pstate: Add Granite Rapids support in no-HWP mode",
                            "    - platform/chrome: cros_ec_sensorhub: Retries when a sensor is not ready",
                            "    - ASoC: SOF: topology: Parse the dapm_widget_tokens in case of DSPless",
                            "      mode",
                            "    - tty: serial: fix print format specifiers",
                            "    - netfilter: nft_set_pipapo: prefer kvmalloc for scratch maps",
                            "    - wifi: iwlwifi: mvm: avoid outdated reorder buffer head_sn",
                            "    - idpf: preserve coalescing settings across resets",
                            "    - wifi: mac80211: don't unreserve never reserved chanctx",
                            "    - sched/deadline: Fix accounting after global limits change",
                            "    - wifi: mac80211: avoid weird state in error path",
                            "    - perf/arm: Add missing .suppress_bind_attrs",
                            "    - drm/imagination: Clear runtime PM errors while resetting the GPU",
                            "    - drm/xe/xe_query: Use separate iterator while filling GT list",
                            "    - wifi: ath12k: Fix station association with MBSSID Non-TX BSS",
                            "    - lib: packing: Include necessary headers",
                            "    - arm64: stacktrace: Check kretprobe_find_ret_addr() return value",
                            "    - net: dsa: b53: ensure BCM5325 PHYs are enabled",
                            "    - drm/amd/display: Update DMCUB loading sequence for DCN3.5",
                            "    - drm/amd/display: Disable dsc_power_gate for dcn314 by default",
                            "    - RDMA/bnxt_re: Fix size of uverbs_copy_to() in",
                            "      BNXT_RE_METHOD_GET_TOGGLE_MEM",
                            "    - media: ipu-bridge: Add _HID for OV5670",
                            "    - scsi: lpfc: Ensure HBA_SETUP flag is used only for SLI4 in",
                            "      dev_loss_tmo_callbk",
                            "    - media: uvcvideo: Add quirk for HP Webcam HD 2300",
                            "    - crypto: ccp - Add missing bootloader info reg for pspv6",
                            "    - soundwire: amd: cancel pending slave status handling workqueue during",
                            "      remove sequence",
                            "    - tools/power turbostat: Fix build with musl",
                            "    - tools/power turbostat: Handle cap_get_proc() ENOSYS",
                            "    - smb: client: don't call init_waitqueue_head(&info->conn_wait) twice in",
                            "      _smbd_get_connection",
                            "    - lib/sbitmap: convert shallow_depth from one word to the whole sbitmap",
                            "    - drm/amdgpu: fix vram reservation issue",
                            "    - btrfs: qgroup: set quota enabled bit if quota disable fails flushing",
                            "      reservations",
                            "    - btrfs: qgroup: fix qgroup create ioctl returning success after quotas",
                            "      disabled",
                            "    - btrfs: don't skip remaining extrefs if dir not found during log replay",
                            "    - btrfs: error on missing block group when unaccounting log tree extent",
                            "      buffers",
                            "    - btrfs: fix iteration bug in __qgroup_excl_accounting()",
                            "    - xfs: fix scrub trace with null pointer in quotacheck",
                            "    - media: v4l2: Add support for NV12M tiled variants to v4l2_format_info()",
                            "    - PCI: Store all PCIe Supported Link Speeds",
                            "    - PCI: Allow PCI bridges to go to D3Hot on all non-x86",
                            "    - PCI/ACPI: Fix runtime PM ref imbalance on Hot-Plug Capable ports",
                            "    - ata: libata-sata: Add link_power_management_supported sysfs attribute",
                            "    - io_uring/rw: cast rw->flags assignment to rwf_t",
                            "    - PCI: Honor Max Link Speed when determining supported speeds",
                            "    - ACPI: Return -ENODEV from acpi_parse_spcr() when SPCR support is",
                            "      disabled",
                            "    - crypto: octeontx2 - Fix address alignment issue on ucode loading",
                            "    - crypto: octeontx2 - Fix address alignment on CN10K A0/A1 and OcteonTX2",
                            "    - crypto: octeontx2 - Fix address alignment on CN10KB and CN10KA-B0",
                            "    - btrfs: fix incorrect log message for nobarrier mount option",
                            "    - btrfs: restore mount option info messages during mount",
                            "    - btrfs: fix printing of mount info messages for NODATACOW/NODATASUM",
                            "    - apparmor: Fix 8-byte alignment for initial dfa blob streams",
                            "    - PCI/portdrv: Use is_pciehp instead of is_hotplug_bridge",
                            "    - PCI: imx6: Remove apps_reset toggling from",
                            "      imx_pcie_{assert/deassert}_core_reset",
                            "    - amdgpu/amdgpu_discovery: increase timeout limit for IFWI init",
                            "    - ASoC: SOF: amd: acp-loader: Use GFP_KERNEL for DMA allocations in resume",
                            "      context",
                            "    - drm/amdgpu/discovery: fix fw based ip discovery",
                            "    - lib/string_choices: Add str_true_false()/str_false_true() helper",
                            "    - USB: typec: Use str_enable_disable-like helpers",
                            "    - btrfs: qgroup: drop unused parameter fs_info from __del_qgroup_rb()",
                            "    - btrfs: explicitly ref count block_group on new_bgs list",
                            "    - btrfs: codify pattern for adding block_group to bg_list",
                            "    - btrfs: zoned: requeue to unused block group list if zone finish failed",
                            "    - drm/vblank: Introduce drm_crtc_vblank_crtc()",
                            "    - drm/vblank: add dynamic per-crtc vblank configuration support",
                            "    - drm/amd/display: Fix Xorg desktop unresponsive on Replay panel",
                            "    - arch: consolidate existing CONFIG_PAGE_SIZE_*KB definitions",
                            "    - arch: simplify architecture specific page size configuration",
                            "    - [Config] update page size configuration",
                            "    - arch: define CONFIG_PAGE_SIZE_*KB on all architectures",
                            "    - [Config] update page size on all architectures",
                            "    - Mark xe driver as BROKEN if kernel page size is not 4kB",
                            "    - [Config] disable xe driver where page size is not 4kB",
                            "    - arm64: dts: ti: k3-am6*: Add boot phase flag to support MMC boot",
                            "    - arm64: dts: ti: k3-am62*: Add non-removable flag for eMMC",
                            "    - arm64: dts: ti: k3-am6*: Add bootph-all property in MMC node",
                            "    - arm64: dts: ti: k3-am6*: Remove DLL properties for soft PHYs",
                            "    - arm64: dts: ti: k3-am6*: Remove disable-wp for eMMC",
                            "    - arm64: dts: ti: k3-am62*: Move eMMC pinmux to top level board file",
                            "    - kcov, usb: Don't disable interrupts in kcov_remote_start_usb_softirq()",
                            "    - drm/i915/icl+/tc: Convert AUX powered WARN to a debug message",
                            "    - drm/i915/display: add intel_encoder_is_*() and _to_*() functions",
                            "    - drm/i915/icl+/tc: Cache the max lane count value",
                            "    - ovl: use I_MUTEX_PARENT when locking parent in ovl_create_temp()",
                            "    - cgroup/cpuset: Fix a partition error with CPU hotplug",
                            "    - drm/tests: Fix endian warning",
                            "    - RDMA/bnxt_re: Fix a possible memory leak in the driver",
                            "    - RDMA/hns: Fix dip entries leak on devices newer than hip09",
                            "    - net: xilinx: axienet: Fix RX skb ring management in DMAengine mode",
                            "    - drm/hisilicon/hibmc: refactored struct hibmc_drm_private",
                            "    - drm/hisilicon/hibmc: fix the i2c device resource leak when vdac init",
                            "      failed",
                            "    - drm/amd/display: Don't print errors for nonexistent connectors",
                            "    - net: dsa: microchip: Fix KSZ9477 HSR port setup issue",
                            "    - net/mlx5: Relocate function declarations from port.h to mlx5_core.h",
                            "    - net/mlx5e: Extract checking of FEC support for a link mode",
                            "    - net/mlx5e: Support FEC settings for 100G/lane modes",
                            "    - net/mlx5: Add IFC bits and enums for buf_ownership",
                            "    - net/mlx5e: Query FW for buffer ownership",
                            "    - Upstream stable to v6.6.103, v6.12.43, v6.12.44",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39779",
                            "    - btrfs: subpage: keep TOWRITE tag until folio is cleaned",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39759",
                            "    - btrfs: qgroup: fix race between quota disable and quota rescan ioctl",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39705",
                            "    - drm/amd/display: fix a Null pointer dereference vulnerability",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39707",
                            "    - drm/amdgpu: check if hubbub is NULL in debugfs/amdgpu_dm_capabilities",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39712",
                            "    - media: mt9m114: Fix deadlock in get_frame_interval/set_frame_interval",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38686",
                            "    - userfaultfd: fix a crash in UFFDIO_MOVE when PMD is a migration entry",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38703",
                            "    - drm/xe: Make dma-fences compliant with the safe access rules",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39746",
                            "    - wifi: ath10k: shutdown driver when hardware is unreliable",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39747",
                            "    - drm/msm: Add error handling for krealloc in metadata setup",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38704",
                            "    - rcu/nocb: Fix possible invalid rdp's->nocb_cb_kthread pointer access",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39748",
                            "    - bpf: Forget ranges when refining tnum after JSET",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38705",
                            "    - drm/amd/pm: fix null pointer access",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38710",
                            "    - gfs2: Validate i_depth for exhash directories",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38722",
                            "    - habanalabs: fix UAF in export_dmabuf()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38732",
                            "    - netfilter: nf_reject: don't leak dst refcount for loopback packets",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39766",
                            "    - net/sched: Make cake_enqueue return NET_XMIT_CN when past buffer_limit",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38734",
                            "    - net/smc: fix UAF on smcsk after smc_listen_out()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38735",
                            "    - gve: prevent ethtool ops after shutdown",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39673",
                            "    - ppp: fix race conditions in ppp_fill_forward_path",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39770",
                            "    - net: gso: Forbid IPv6 TSO with extensions on devices with only IPV6_CSUM",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39675",
                            "    - drm/amd/display: Add null pointer check in",
                            "      mod_hdcp_hdcp1_create_session()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39772",
                            "    - drm/hisilicon/hibmc: fix the hibmc loaded failed bug",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38676",
                            "    - iommu/amd: Avoid stack buffer overflow from kernel cmdline",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39676",
                            "    - scsi: qla4xxx: Prevent a potential error pointer dereference",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39773",
                            "    - net: bridge: fix soft lockup in br_multicast_query_expired()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39679",
                            "    - drm/nouveau/nvif: Fix potential memory leak in nvif_vmm_ctor().",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39681",
                            "    - x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39687",
                            "    - iio: light: as73211: Ensure buffer holes are zeroed",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39683",
                            "    - tracing: Limit access to parser->buffer when trace_get_user failed",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39801",
                            "    - usb: dwc3: Remove WARN_ON for device endpoint command timeouts",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39684",
                            "    - comedi: Fix use of uninitialized memory in do_insn_ioctl() and",
                            "      do_insnlist_ioctl()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39685",
                            "    - comedi: pcl726: Prevent invalid irq number",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39686",
                            "    - comedi: Make insn_rw_emulate_bits() do insn->n samples",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39689",
                            "    - ftrace: Also allocate and copy hash for reading of filter files",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39691",
                            "    - fs/buffer: fix use-after-free when call bh_read() helper",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39692",
                            "    - smb: server: split ksmbd_rdma_stop_listening() out of",
                            "      ksmbd_rdma_destroy()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39788",
                            "    - scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39693",
                            "    - drm/amd/display: Avoid a NULL pointer dereference",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39694",
                            "    - s390/sclp: Fix SCCB present check",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39776",
                            "    - mm/debug_vm_pgtable: clear page table entries at destroy_args()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38681",
                            "    - mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39800",
                            "    - btrfs: abort transaction on unexpected eb generation at",
                            "      btrfs_copy_root()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38684",
                            "    - net/sched: ets: use old 'nbands' while purging unused classes",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-21884",
                            "    - net: better track kernel sockets lifetime",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39701",
                            "    - ACPI: pfr_update: Fix the driver update version check",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39702",
                            "    - ipv6: sr: Fix MAC comparison to be constant-time",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39703",
                            "    - net, hsr: reject HSR frame if skb can't hold tag",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39706",
                            "    - drm/amdkfd: Destroy KFD debugfs after destroy KFD wq",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39709",
                            "    - media: venus: protect against spurious interrupts during probe",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39710",
                            "    - media: venus: Add a check for packet size after reading from shared",
                            "      memory",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39711",
                            "    - media: ivsc: Fix crash at shutdown due to missing mei_cldev_disable()",
                            "      calls",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39713",
                            "    - media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39714",
                            "    - media: usbtv: Lock resolution while streaming",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39715",
                            "    - parisc: Revise gateway LWS calls to probe user read access",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39716",
                            "    - parisc: Revise __get_user() to probe user read access",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39781",
                            "    - parisc: Drop WARN_ON_ONCE() from flush_cache_vmap",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39782",
                            "    - jbd2: prevent softlockup in jbd2_log_do_checkpoint()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38677",
                            "    - f2fs: fix to avoid out-of-boundary access in dnode page",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39718",
                            "    - vsock/virtio: Validate length in packet header before skb_put()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39783",
                            "    - PCI: endpoint: Fix configfs group list head handling",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39719",
                            "    - iio: imu: bno055: fix OOB access of hw_xlate array",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39787",
                            "    - soc: qcom: mdt_loader: Ensure we don't read past the ELF header",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39720",
                            "    - ksmbd: fix refcount leak causing resource not released",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39721",
                            "    - crypto: qat - flush misc workqueue during device shutdown",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39790",
                            "    - bus: mhi: host: Detect events pointing to unexpected TREs",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39724",
                            "    - serial: 8250: fix panic due to PSLVERR",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39758",
                            "    - RDMA/siw: Fix the sendmsg byte count in siw_tcp_sendpages",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38679",
                            "    - media: venus: Fix OOB read due to missing payload bound check",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38680",
                            "    - media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39736",
                            "    - mm/kmemleak: avoid deadlock by moving pr_warn() outside kmemleak_lock",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39737",
                            "    - mm/kmemleak: avoid soft lockup in __kmemleak_do_cleanup()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38683",
                            "    - hv_netvsc: Fix panic during namespace deletion with VF",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38685",
                            "    - fbdev: Fix vmalloc out-of-bounds write in fast_imageblit",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39738",
                            "    - btrfs: do not allow relocation of partially dropped subvolumes",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38687",
                            "    - comedi: fix race between polling and detaching",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39760",
                            "    - usb: core: config: Prevent OOB read in SS endpoint companion parsing",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38688",
                            "    - iommufd: Prevent ALIGN() overflow",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39739",
                            "    - iommu/arm-smmu-qcom: Add SM6115 MDSS compatible",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38691",
                            "    - pNFS: Fix uninited ptr deref in block/scsi layout",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39795",
                            "    - block: avoid possible overflow for chunk_sectors check in",
                            "      blk_stack_limits()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38692",
                            "    - exfat: add cluster chain loop check for dir",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38693",
                            "    - media: dvb-frontends: w7090p: fix null-ptr-deref in",
                            "      w7090p_tuner_write_serpar and w7090p_tuner_read_serpar",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38694",
                            "    - media: dvb-frontends: dib7090p: fix null-ptr-deref in",
                            "      dib7090p_rw_on_apb()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38695",
                            "    - scsi: lpfc: Check for hdwq null ptr when cleaning up lpfc_vport",
                            "      structure",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39742",
                            "    - RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38696",
                            "    - MIPS: Don't crash in stack_top() for tasks without ABI or vDSO",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38697",
                            "    - jfs: upper bound check of tree index in dbAllocAG",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38698",
                            "    - jfs: Regular file corruption check",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39743",
                            "    - jfs: truncate good inode pages when hard link is 0",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38699",
                            "    - scsi: bfa: Double-free fix",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38700",
                            "    - scsi: libiscsi: Initialize iscsi_conn->dd_data only if memory is",
                            "      allocated",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38701",
                            "    - ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38702",
                            "    - fbdev: fix potential buffer overflow in do_register_framebuffer()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39744",
                            "    - rcu: Fix rcu_read_unlock() deadloop due to IRQ work",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39761",
                            "    - wifi: ath12k: Decrement TID on RX peer frag setup error handling",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39797",
                            "    - xfrm: Duplicate SPI Handling",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39749",
                            "    - rcu: Protect ->defer_qs_iw_pending from data race",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39750",
                            "    - wifi: ath12k: Correct tid cleanup when tid setup fails",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38706",
                            "    - ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39794",
                            "    - ARM: tegra: Use I/O memcpy to write to IRAM",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39752",
                            "    - ARM: rockchip: fix kernel hang during smp initialization",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39763",
                            "    - ACPI: APEI: send SIGBUS to current task if synchronous memory error not",
                            "      recovered",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38707",
                            "    - fs/ntfs3: Add sanity check for file name",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38708",
                            "    - drbd: add missing kref_get in handle_write_conflicts",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39753",
                            "    - gfs2: Set .migrate_folio in gfs2_{rgrp,meta}_aops",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38711",
                            "    - smb/server: avoid deadlock when linking with ReplaceIfExists",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38712",
                            "    - hfsplus: don't use BUG_ON() in hfsplus_create_attributes_file()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38713",
                            "    - hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38714",
                            "    - hfsplus: fix slab-out-of-bounds in hfsplus_bnode_read()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38715",
                            "    - hfs: fix slab-out-of-bounds in hfs_bnode_read()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38716",
                            "    - hfs: fix general protection fault in hfs_find_init()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38718",
                            "    - sctp: linearize cloned gso packets in sctp_rcv",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38721",
                            "    - netfilter: ctnetlink: fix refcount leak on table dump",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38614",
                            "    - eventpoll: Fix semi-unbounded recursion",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39756",
                            "    - fs: Prevent file descriptor table allocations exceeding INT_MAX",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39798",
                            "    - NFS: Fix the setting of capabilities when automounting a new filesystem",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38724",
                            "    - nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38730",
                            "    - io_uring/net: commit partial buffers on retry",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38725",
                            "    - net: usb: asix_devices: add phy_mask for ax88772 mdio bus",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38728",
                            "    - smb3: fix for slab out of bounds on mount to ksmbd",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-39757",
                            "    - ALSA: usb-audio: Validate UAC3 cluster segment descriptors",
                            "",
                            "  * Noble update: upstream stable patchset 2026-01-06 (LP: #2137586) //",
                            "    CVE-2025-38729",
                            "    - ALSA: usb-audio: Validate UAC3 power domain descriptors, too",
                            "",
                            "  * CVE-2025-40297",
                            "    - net: bridge: fix use-after-free due to MST port state bypass",
                            "",
                            "  * CVE-2025-40256",
                            "    - xfrm: also call xfrm_state_delete_tunnel at destroy time for states that",
                            "      were never added",
                            "",
                            "  * CVE-2025-40215",
                            "    - xfrm: delete x->tunnel as we delete x",
                            "",
                            "  * CVE-2025-40214",
                            "    - af_unix: Initialise scc_index in unix_add_edge().",
                            "",
                            "  * CVE-2025-38248",
                            "    - bridge: mcast: Fix use-after-free during router port configuration",
                            "",
                            "  * Enabling crypto selftests causes boot stall on 6.8 (LP: #2135716)",
                            "    - SAUCE: Revert \"crypto: api - Fix boot-up self-test race\"",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261)",
                            "    - ASoC: fsl_asrc: use internal measured ratio for non-ideal ratio mode",
                            "    - perf/core: Fix the WARN_ON_ONCE is out of lock protected region",
                            "    - ASoC: cs35l56: probe() should fail if the device ID is not recognized",
                            "    - Bluetooth: hci_sync: Fix not disabling advertising instance",
                            "    - Bluetooth: hci_event: Fix not marking Broadcast Sink BIS as connected",
                            "    - pinctrl: amd: Clear GPIO debounce for suspend",
                            "    - fix proc_sys_compare() handling of in-lookup dentries",
                            "    - vsock: fix `vsock_proto` declaration",
                            "    - vsock: Fix IOCTL_VM_SOCKETS_GET_LOCAL_CID to check also",
                            "      `transport_local`",
                            "    - net: stmmac: Fix interrupt handling for level-triggered mode in",
                            "      DWC_XGMAC2",
                            "    - net: phy: smsc: Fix Auto-MDIX configuration when disabled by strap",
                            "    - net: phy: smsc: Force predictable MDI-X state on LAN87xx",
                            "    - net: phy: smsc: Fix link failure in forced mode with Auto-MDIX",
                            "    - perf: build: Setup PKG_CONFIG_LIBDIR for cross compilation",
                            "    - x86/mce/amd: Add default names for MCA banks and blocks",
                            "    - x86/mce/amd: Fix threshold limit reset",
                            "    - x86/mce: Don't remove sysfs if thresholding sysfs init fails",
                            "    - x86/mce: Make sure CMCI banks are cleared during shutdown on Intel",
                            "    - KVM: x86/xen: Allow 'out of range' event channel ports in IRQ routing",
                            "      table.",
                            "    - gre: Fix IPv6 multicast route creation.",
                            "    - md/md-bitmap: fix GPF in bitmap_get_stats()",
                            "    - drm/ttm: fix error handling in ttm_buffer_object_transfer",
                            "    - drm/gem: Fix race in drm_gem_handle_create_tail()",
                            "    - Revert \"usb: gadget: u_serial: Add null pointer check in gs_start_io\"",
                            "    - drm/framebuffer: Acquire internal references on GEM handles",
                            "    - kallsyms: fix build without execinfo",
                            "    - maple_tree: fix mt_destroy_walk() on root leaf node",
                            "    - mm: fix the inaccurate memory statistics issue for users",
                            "    - scripts/gdb: fix interrupts display after MCP on x86",
                            "    - scripts/gdb: de-reference per-CPU MCE interrupts",
                            "    - scripts/gdb: fix interrupts.py after maple tree conversion",
                            "    - mm/vmalloc: leave lazy MMU mode on PTE mapping error",
                            "    - pwm: mediatek: Ensure to disable clocks in error path",
                            "    - x86/rdrand: Disable RDSEED on AMD Cyan Skillfish",
                            "    - x86/mm: Disable hugetlb page table sharing on 32-bit",
                            "    - smb: server: make use of rdma_destroy_qp()",
                            "    - ksmbd: fix a mount write count leak in ksmbd_vfs_kern_path_locked()",
                            "    - erofs: fix to add missing tracepoint in erofs_read_folio()",
                            "    - netlink: Fix rmem check in netlink_broadcast_deliver().",
                            "    - netlink: make sure we allow at least one dump skb",
                            "    - smb: client: avoid unnecessary reconnects when refreshing referrals",
                            "    - smb: client: fix DFS interlink failover",
                            "    - cifs: all initializations for tcon should happen in tcon_info_alloc",
                            "    - ibmvnic: Fix hardcoded NUM_RX_STATS/NUM_TX_STATS with dynamic sizeof",
                            "    - net: phy: microchip: limit 100M workaround to link-down events on",
                            "      LAN88xx",
                            "    - can: m_can: m_can_handle_lost_msg(): downgrade msg lost in rx message to",
                            "      debug level",
                            "    - net: ll_temac: Fix missing tx_pending check in ethtools_set_ringparam()",
                            "    - bnxt_en: Fix DCB ETS validation",
                            "    - ublk: sanity check add_dev input for underflow",
                            "    - atm: idt77252: Add missing `dma_map_error()`",
                            "    - um: vector: Reduce stack usage in vector_eth_configure()",
                            "    - io_uring: make fallocate be hashed work",
                            "    - ASoC: amd: yc: add quirk for Acer Nitro ANV15-41 internal mic",
                            "    - ALSA: hda/realtek - Enable mute LED on HP Pavilion Laptop 15-eg100",
                            "    - net: usb: qmi_wwan: add SIMCom 8230C composition",
                            "    - HID: lenovo: Add support for ThinkPad X1 Tablet Thin Keyboard Gen2",
                            "    - net: mana: Record doorbell physical address in PF mode",
                            "    - vt: add missing notification when switching back to text mode",
                            "    - bpf: Adjust free target to avoid global starvation of LRU map",
                            "    - HID: Add IGNORE quirk for SMARTLINKTECHNOLOGY",
                            "    - selftests/bpf: adapt one more case in test_lru_map to the new",
                            "      target_free",
                            "    - smb: client: fix potential race in cifs_put_tcon()",
                            "    - drm/amdgpu/discovery: use specific ip_discovery.bin for legacy asics",
                            "    - drm/amdgpu/ip_discovery: add missing ip_discovery fw",
                            "    - x86/mce: Ensure user polling settings are honored when restarting timer",
                            "    - ASoC: fsl_sai: Force a software reset when starting in consumer mode",
                            "    - wifi: mt76: mt7921: prevent decap offload config before STA",
                            "      initialization",
                            "    - wifi: mt76: mt7925: fix the wrong config for tx interrupt",
                            "    - wifi: mt76: mt7925: fix invalid array index in ssid assignment during hw",
                            "      scan",
                            "    - drm/xe: Allocate PF queue size on pow2 boundary",
                            "    - clk: scmi: Handle case where child clocks are initialized before their",
                            "      parents",
                            "    - erofs: address D-cache aliasing",
                            "    - wifi: cfg80211/mac80211: correctly parse S1G beacon optional elements",
                            "    - wifi: cfg80211: fix S1G beacon head validation in nl80211",
                            "    - wifi: mac80211: correctly identify S1G short beacon",
                            "    - wifi: mac80211: fix non-transmitted BSSID profile search",
                            "    - drm/nouveau/gsp: fix potential leak of memory used during acpi init",
                            "    - erofs: free pclusters if no cached folio is attached",
                            "    - erofs: get rid of `z_erofs_next_pcluster_t`",
                            "    - erofs: tidy up zdata.c",
                            "    - erofs: refine readahead tracepoint",
                            "    - erofs: fix to add missing tracepoint in erofs_readahead()",
                            "    - net: phy: microchip: Use genphy_soft_reset() to purge stale LPA bits",
                            "    - selftests: net: lib: Move logging from forwarding/lib.sh here",
                            "    - selftests: net: lib: fix shift count out of range",
                            "    - net/mlx5e: Add new prio for promiscuous mode",
                            "    - ALSA: hda/realtek: Add mic-mute LED setup for ASUS UM5606",
                            "    - ALSA: hda/realtek: Add quirks for some Clevo laptops",
                            "    - riscv: vdso: Exclude .rodata from the PT_DYNAMIC segment",
                            "    - erofs: fix rare pcluster memory leak after unmounting",
                            "    - net: libwx: fix alloc msix vectors failed",
                            "    - net: wangxun: revert the adjustment of the IRQ vector sequence",
                            "    - arm64: Filter out SME hwcaps when FEAT_SME isn't implemented",
                            "    - KVM: SVM: Set synthesized TSA CPUID flags",
                            "    - Upstream stable to v6.6.98, v6.6.99, v6.12.38, v6.12.39",
                            "    - SAUCE: selftests: net: altnames.sh fix following upstream updates",
                            "",
                            "  * vrf_route_leaking.sh in net from ubuntu_kernel_selftests linux ADT test",
                            "    failure with linux/5.11.0-18.19 (Ping received ICMP Packet too big)",
                            "    (LP: #1928890)",
                            "    - selftests: net: use slowwait to stabilize vrf_route_leaking test",
                            "",
                            "  * ubuntu_bpf failed to build on Noble ( error: ‘struct prog_test_def’ has no",
                            "    member named ‘should_tmon’) (LP: #2112357)",
                            "    - selftests/bpf: Factor out get_xlated_program() helper",
                            "    - selftests/bpf: extract utility function for BPF disassembly",
                            "    - selftests/bpf: Add traffic monitor functions.",
                            "    - selftests/bpf: Add the traffic monitor option to test_progs.",
                            "",
                            "  * ipsec_offload in rtnetlink.sh from ubunsu_kselftests_net fails on O/J",
                            "    (LP: #2096976)",
                            "    - netdevsim: fix rtnetlink.sh selftest",
                            "    - [SAUCE] Fix selftest/net/rtnetlink.sh for Big Endian",
                            "",
                            "  * fib_tests.sh in ubuntu_kernel_selftests failed with IPv4 mangling tests",
                            "    Connection check - server side (LP: #2012859)",
                            "    - selftests: rtnetlink: correct error message in rtnetlink.sh fou test",
                            "",
                            "  * net:rtnetlink.sh in ubuntu_kernel_selftests failed with FAIL: address",
                            "    proto IPv4 / IPv6 (LP: #2031531)",
                            "    - selftests: rtnetlink: skip tests if tools or feats are missing",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740)",
                            "    - ASoC: amd: yc: Add DMI quirk for HP Laptop 17 cp-2033dx",
                            "    - ethernet: intel: fix building with large NR_CPUS",
                            "    - ASoC: amd: yc: Add DMI entries to support HP 15-fb1xxx",
                            "    - ASoC: Intel: fix SND_SOC_SOF dependencies",
                            "    - ASoC: amd: yc: add DMI quirk for ASUS M6501RM",
                            "    - audit,module: restore audit logging in load failure case",
                            "    - fs_context: fix parameter name in infofc() macro",
                            "    - ublk: use vmalloc for ublk_device's __queues",
                            "    - hfsplus: make splice write available again",
                            "    - hfs: make splice write available again",
                            "    - ASoC: soc-dai: tidyup return value of snd_soc_xlate_tdm_slot_mask()",
                            "    - ASoC: ops: dynamically allocate struct snd_ctl_elem_value",
                            "    - ASoC: mediatek: use reserved memory or enable buffer pre-allocation",
                            "    - selftests: Fix errno checking in syscall_user_dispatch test",
                            "    - soc: qcom: QMI encoding/decoding for big endian",
                            "    - arm64: dts: qcom: sdm845: Expand IMEM region",
                            "    - arm64: dts: qcom: sc7180: Expand IMEM region",
                            "    - arm64: dts: qcom: msm8976: Make blsp_dma controlled-remotely",
                            "    - ARM: dts: vfxxx: Correctly use two tuples for timer address",
                            "    - usb: host: xhci-plat: fix incorrect type for of_match variable in",
                            "      xhci_plat_probe()",
                            "    - usb: misc: apple-mfi-fastcharge: Make power supply names unique",
                            "    - vmci: Prevent the dispatching of uninitialized payloads",
                            "    - pps: fix poll support",
                            "    - Revert \"vmci: Prevent the dispatching of uninitialized payloads\"",
                            "    - usb: early: xhci-dbc: Fix early_ioremap leak",
                            "    - arm: dts: ti: omap: Fixup pinheader typo",
                            "    - soc/tegra: cbb: Clear ERR_FORCE register with ERR_STATUS",
                            "    - ARM: dts: imx6ul-kontron-bl-common: Fix RTS polarity for RS485 interface",
                            "    - arm64: dts: imx8mm-beacon: Fix HS400 USDHC clock speed",
                            "    - arm64: dts: imx8mn-beacon: Fix HS400 USDHC clock speed",
                            "    - cpufreq: intel_pstate: Always use HWP_DESIRED_PERF in passive mode",
                            "    - cpufreq: Initialize cpufreq-based frequency-invariance later",
                            "    - cpufreq: Init policy->rwsem before it may be possibly used",
                            "    - samples: mei: Fix building on musl libc",
                            "    - soc: qcom: pmic_glink: fix OF node leak",
                            "    - interconnect: qcom: sc8280xp: specify num_links for qnm_a1noc_cfg",
                            "    - interconnect: qcom: sc8180x: specify num_nodes",
                            "    - staging: nvec: Fix incorrect null termination of battery manufacturer",
                            "    - drm/rockchip: cleanup fb when drm_gem_fb_afbc_init failed",
                            "    - bpf, sockmap: Fix psock incorrectly pointing to sk",
                            "    - selftests/bpf: fix signedness bug in redir_partial()",
                            "    - net: ipv6: ip6mr: Fix in/out netdev to pass to the FORWARD chain",
                            "    - drm/vmwgfx: Fix Host-Backed userspace on Guest-Backed kernel",
                            "    - bpftool: Fix memory leak in dump_xx_nlmsg on realloc failure",
                            "    - caif: reduce stack size, again",
                            "    - wifi: iwlwifi: Fix memory leak in iwl_mvm_init()",
                            "    - tcp: fix tcp_ofo_queue() to avoid including too much DUP SACK range",
                            "    - net: dst: annotate data-races around dst->input",
                            "    - net: dst: annotate data-races around dst->output",
                            "    - kselftest/arm64: Fix check for setting new VLs in sve-ptrace",
                            "    - drm/msm/dpu: Fill in min_prefill_lines for SC8180X",
                            "    - m68k: Don't unregister boot console needlessly",
                            "    - drm/amd/pm/powerplay/hwmgr/smu_helper: fix order of mask and value",
                            "    - sched/psi: Optimize psi_group_change() cpu_clock() usage",
                            "    - fbcon: Fix outdated registered_fb reference in comment",
                            "    - netfilter: nf_tables: Drop dead code from fill_*_info routines",
                            "    - netfilter: nf_tables: adjust lockdep assertions handling",
                            "    - arch: powerpc: defconfig: Drop obsolete CONFIG_NET_CLS_TCINDEX",
                            "    - um: rtc: Avoid shadowing err in uml_rtc_start()",
                            "    - net_sched: act_ctinfo: use atomic64_t for three counters",
                            "    - xen/gntdev: remove struct gntdev_copy_batch from stack",
                            "    - tcp: call tcp_measure_rcv_mss() for ooo packets",
                            "    - wifi: rtl8xxxu: Fix RX skb size for aggregation disabled",
                            "    - mwl8k: Add missing check after DMA map",
                            "    - iommu/amd: Fix geometry.aperture_end for V2 tables",
                            "    - wifi: plfxlc: Fix error handling in usb driver probe",
                            "    - wifi: mac80211: Do not schedule stopped TXQs",
                            "    - wifi: mac80211: Don't call fq_flow_idx() for management frames",
                            "    - wifi: mac80211: Check 802.11 encaps offloading in",
                            "      ieee80211_tx_h_select_key()",
                            "    - Reapply \"wifi: mac80211: Update skb's control block key in",
                            "      ieee80211_tx_dequeue()\"",
                            "    - wifi: ath12k: fix endianness handling while accessing wmi service bit",
                            "    - wifi: brcmfmac: fix P2P discovery failure in P2P peer due to missing P2P",
                            "      IE",
                            "    - wifi: mac80211: Write cnt before copying in ieee80211_copy_rnr_beacon()",
                            "    - kcsan: test: Initialize dummy variable",
                            "    - Bluetooth: hci_event: Mask data status from LE ext adv reports",
                            "    - tools/rv: Do not skip idle in trace",
                            "    - can: peak_usb: fix USB FD devices potential malfunction",
                            "    - can: kvaser_pciefd: Store device channel index",
                            "    - can: kvaser_usb: Assign netdev.dev_port based on device channel index",
                            "    - net/mlx5e: Clear Read-Only port buffer size in PBMC before update",
                            "    - selftests: rtnetlink.sh: remove esp4_offload after test",
                            "    - vrf: Drop existing dst reference in vrf_ip6_input_dst",
                            "    - ipv6: annotate data-races around rt->fib6_nsiblings",
                            "    - bpf/preload: Don't select USERMODE_DRIVER",
                            "    - PCI: rockchip-host: Fix \"Unexpected Completion\" log message",
                            "    - crypto: sun8i-ce - fix nents passed to dma_unmap_sg()",
                            "    - crypto: qat - use unmanaged allocation for dc_data",
                            "    - crypto: marvell/cesa - Fix engine load inaccuracy",
                            "    - mtd: fix possible integer overflow in erase_xfer()",
                            "    - media: v4l2-ctrls: Fix H264 SEPARATE_COLOUR_PLANE check",
                            "    - power: supply: max14577: Handle NULL pdata when CONFIG_OF is not set",
                            "    - crypto: arm/aes-neonbs - work around gcc-15 warning",
                            "    - PCI: endpoint: pci-epf-vntb: Return -ENOENT if",
                            "      pci_epc_get_next_free_bar() fails",
                            "    - pinctrl: sunxi: Fix memory leak on krealloc failure",
                            "    - fanotify: sanitize handle_type values when reporting fid",
                            "    - clk: clk-axi-clkgen: fix fpfd_max frequency for zynq",
                            "    - Fix dma_unmap_sg() nents value",
                            "    - perf tools: Fix use-after-free in help_unknown_cmd()",
                            "    - perf sched: Free thread->priv using priv_destructor",
                            "    - perf sched: Fix memory leaks for evsel->priv in timehist",
                            "    - perf sched: Fix memory leaks in 'perf sched latency'",
                            "    - crypto: inside-secure - Fix `dma_unmap_sg()` nents value",
                            "    - RDMA/hns: Fix -Wframe-larger-than issue",
                            "    - kernel: trace: preemptirq_delay_test: use offstack cpu mask",
                            "    - perf tests bp_account: Fix leaked file descriptor",
                            "    - clk: sunxi-ng: v3s: Fix de clock definition",
                            "    - scsi: ibmvscsi_tgt: Fix dma_unmap_sg() nents value",
                            "    - scsi: elx: efct: Fix dma_unmap_sg() nents value",
                            "    - scsi: mvsas: Fix dma_unmap_sg() nents value",
                            "    - scsi: isci: Fix dma_unmap_sg() nents value",
                            "    - watchdog: ziirave_wdt: check record length in ziirave_firm_verify()",
                            "    - hwrng: mtk - handle devm_pm_runtime_enable errors",
                            "    - crypto: keembay - Fix dma_unmap_sg() nents value",
                            "    - crypto: img-hash - Fix dma_unmap_sg() nents value",
                            "    - soundwire: stream: restore params when prepare ports fail",
                            "    - PCI: endpoint: pci-epf-vntb: Fix the incorrect usage of __iomem",
                            "      attribute",
                            "    - fs/orangefs: Allow 2 more characters in do_c_string()",
                            "    - dmaengine: mv_xor: Fix missing check after DMA map and missing unmap",
                            "    - dmaengine: nbpfaxi: Add missing check after DMA map",
                            "    - ASoC: fsl_xcvr: get channel status data when PHY is not exists",
                            "    - sh: Do not use hyphen in exported variable name",
                            "    - perf tools: Remove libtraceevent in .gitignore",
                            "    - crypto: qat - fix DMA direction for compression on GEN2 devices",
                            "    - crypto: qat - fix seq_file position update in adf_ring_next()",
                            "    - jfs: fix metapage reference count leak in dbAllocCtl",
                            "    - mtd: rawnand: atmel: Fix dma_mapping_error() address",
                            "    - mtd: rawnand: rockchip: Add missing check after DMA map",
                            "    - mtd: rawnand: atmel: set pmecc data setup time",
                            "    - vhost-scsi: Fix log flooding with target does not exist errors",
                            "    - bpf: Check flow_dissector ctx accesses are aligned",
                            "    - bpf: Check netfilter ctx accesses are aligned",
                            "    - apparmor: ensure WB_HISTORY_SIZE value is a power of 2",
                            "    - apparmor: fix loop detection used in conflicting attachment resolution",
                            "    - module: Restore the moduleparam prefix length check",
                            "    - ucount: fix atomic_long_inc_below() argument type",
                            "    - rtc: ds1307: fix incorrect maximum clock rate handling",
                            "    - rtc: hym8563: fix incorrect maximum clock rate handling",
                            "    - rtc: nct3018y: fix incorrect maximum clock rate handling",
                            "    - rtc: pcf85063: fix incorrect maximum clock rate handling",
                            "    - rtc: pcf8563: fix incorrect maximum clock rate handling",
                            "    - rtc: rv3028: fix incorrect maximum clock rate handling",
                            "    - f2fs: doc: fix wrong quota mount option description",
                            "    - f2fs: fix to update upper_p in __get_secs_required() correctly",
                            "    - f2fs: fix to calculate dirty data during has_not_enough_free_secs()",
                            "    - vfio: Fix unbalanced vfio_df_close call in no-iommu mode",
                            "    - vfio: Prevent open_count decrement to negative",
                            "    - vfio/pci: Separate SR-IOV VF dev_set",
                            "    - scsi: mpt3sas: Fix a fw_event memory leak",
                            "    - scsi: Revert \"scsi: iscsi: Fix HW conn removal use after free\"",
                            "    - scsi: ufs: core: Use link recovery when h8 exit fails during runtime",
                            "      resume",
                            "    - scsi: sd: Make sd shutdown issue START STOP UNIT appropriately",
                            "    - kconfig: qconf: fix ConfigList::updateListAllforAll()",
                            "    - sched/psi: Fix psi_seq initialization",
                            "    - PCI: pnv_php: Work around switches with broken presence detection",
                            "    - powerpc/eeh: Export eeh_unfreeze_pe()",
                            "    - pNFS/flexfiles: don't attempt pnfs on fatal DS errors",
                            "    - sched: Add test_and_clear_wake_up_bit() and atomic_dec_and_wake_up()",
                            "    - NFS: Fix wakeup of __nfs_lookup_revalidate() in unblock_revalidate()",
                            "    - NFSv4.2: another fix for listxattr",
                            "    - NFS: Fixup allocation flags for nfsiod's __GFP_NORETRY",
                            "    - md/md-cluster: handle REMOVE message earlier",
                            "    - netpoll: prevent hanging NAPI when netcons gets enabled",
                            "    - phy: mscc: Fix parsing of unicast frames",
                            "    - net: ipa: add IPA v5.1 and v5.5 to ipa_version_string()",
                            "    - netlink: specs: ethtool: fix module EEPROM input/output arguments",
                            "    - net/mlx5: Correctly set gso_segs when LRO is used",
                            "    - net/sched: taprio: enforce minimum value for picos_per_byte",
                            "    - benet: fix BUG when creating VFs",
                            "    - irqchip: Build IMX_MU_MSI only on ARM",
                            "    - ALSA: hda/ca0132: Fix missing error handling in ca0132_alt_select_out()",
                            "    - smb: server: remove separate empty_recvmsg_queue",
                            "    - smb: server: make sure we call ib_dma_unmap_single() only if we called",
                            "      ib_dma_map_single already",
                            "    - smb: server: let recv_done() consistently call",
                            "      put_recvmsg/smb_direct_disconnect_rdma_connection",
                            "    - smb: server: let recv_done() avoid touching data_transfer after",
                            "      cleanup/move",
                            "    - smb: client: Use min() macro",
                            "    - smb: client: Correct typos in multiple comments across various files",
                            "    - smb: smbdirect: add smbdirect_socket.h",
                            "    - smb: client: make use of common smbdirect_socket",
                            "    - smb: client: make sure we call ib_dma_unmap_single() only if we called",
                            "      ib_dma_map_single already",
                            "    - smb: client: let recv_done() cleanup before notifying the callers.",
                            "    - pptp: fix pptp_xmit() error path",
                            "    - smb: client: return an error if rdma_connect does not return within 5",
                            "      seconds",
                            "    - selftests/perf_events: Add a mmap() correctness test",
                            "    - ksmbd: fix corrupted mtime and ctime in smb2_open",
                            "    - smb: server: Fix extension string in ksmbd_extract_shortname()",
                            "    - USB: serial: option: add Foxconn T99W709",
                            "    - Bluetooth: btusb: Add USB ID 3625:010b for TP-LINK Archer TX10UB Nano",
                            "    - net: usbnet: Avoid potential RCU stall on LINK_CHANGE event",
                            "    - net: usbnet: Fix the wrong netif_carrier_on() call",
                            "    - ALSA: intel_hdmi: Fix off-by-one error in __hdmi_lpe_audio_probe()",
                            "    - ALSA: scarlett2: Add retry on -EPROTO from scarlett2_usb_tx()",
                            "    - x86/fpu: Delay instruction pointer fixup until after warning",
                            "    - MIPS: mm: tlb-r4k: Uniquify TLB entries on init",
                            "    - mm/hmm: move pmd_to_hmm_pfn_flags() to the respective #ifdeffery",
                            "    - ALSA: hda/cs35l56: Workaround bad dev-index on Lenovo Yoga Book 9i GenX",
                            "    - arm64: dts: exynos: gs101: Add 'local-timer-stop' to cpuidle nodes",
                            "    - arm64: dts: ti: k3-am62p-j722s: fix pinctrl-single size",
                            "    - mei: vsc: Destroy mutex after freeing the IRQ",
                            "    - mei: vsc: Event notifier fixes",
                            "    - mei: vsc: Unset the event callback on remove and probe errors",
                            "    - arm64: dts: st: fix timer used for ticks",
                            "    - selftests: breakpoints: use suspend_stats to reliably check suspend",
                            "      success",
                            "    - PM / devfreq: Fix a index typo in trans_stat",
                            "    - drm/panfrost: Fix panfrost device variable name in devfreq",
                            "    - selftests/bpf: Fix unintentional switch case fall through",
                            "    - drm/amdgpu: Remove nbiov7.9 replay count reporting",
                            "    - bpf: Ensure RCU lock is held around bpf_prog_ksym_find",
                            "    - refscale: Check that nreaders and loops multiplication doesn't overflow",
                            "    - iommu/amd: Enable PASID and ATS capabilities in the correct order",
                            "    - file: add take_fd() cleanup helper",
                            "    - file: fix typo in take_fd() comment",
                            "    - rcu: Fix delayed execution of hurry callbacks",
                            "    - ring-buffer: Remove ring_buffer_read_prepare_sync()",
                            "    - net: dsa: microchip: Fix wrong rx drop MIB counter for KSZ8863",
                            "    - stmmac: xsk: fix negative overflow of budget in zerocopy mode",
                            "    - pinctrl: berlin: fix memory leak in berlin_pinctrl_build_state()",
                            "    - dmaengine: mmp: Fix again Wvoid-pointer-to-enum-cast warning",
                            "    - phy: qualcomm: phy-qcom-eusb2-repeater: Don't zero-out registers",
                            "    - perf dso: Add missed dso__put to dso__load_kcore",
                            "    - mtd: spi-nor: spansion: Fixup params->set_4byte_addr_mode for SEMPER",
                            "    - perf sched: Make sure it frees the usage string",
                            "    - perf sched: Fix memory leaks in 'perf sched map'",
                            "    - perf sched: Use RC_CHK_EQUAL() to compare pointers",
                            "    - RDMA/hns: Fix HW configurations not cleared in error flow",
                            "    - RDMA/hns: Get message length of ack_req from FW",
                            "    - RDMA/hns: Add mutex_destroy()",
                            "    - RDMA/hns: Fix accessing uninitialized resources",
                            "    - RDMA/hns: Drop GFP_NOWARN",
                            "    - crypto: qat - disable ZUC-256 capability for QAT GEN5",
                            "    - remoteproc: xlnx: Disable unsupported features",
                            "    - perf record: Cache build-ID of hit DSOs only",
                            "    - vdpa: Fix IDR memory leak in VDUSE module exit",
                            "    - vhost: Reintroduce kthread API and add mode selection",
                            "    - [Config] enable VHOST_ENABLE_FORK_OWNER_CONTROL",
                            "    - apparmor: Fix unaligned memory accesses in KUnit test",
                            "    - f2fs: turn off one_time when forcibly set to foreground GC",
                            "    - exfat: fdatasync flag should be same like generic_write_sync()",
                            "    - s390/ap: Unmask SLCF bit in card and queue ap functions sysfs",
                            "    - block: Fix default IO priority if there is no IO context",
                            "    - ASoC: tas2781: Fix the wrong step for TLV on tas2781",
                            "    - s390/mm: Allocate page table with PAGE_SIZE granularity",
                            "    - smb: client: remove separate empty_packet_queue",
                            "    - smb: client: let recv_done() avoid touching data_transfer after",
                            "      cleanup/move",
                            "    - drm/i915/ddi: change intel_ddi_init_{dp, hdmi}_connector() return type",
                            "    - drm/i915/hdmi: propagate errors from intel_hdmi_init_connector()",
                            "    - drm/i915/hdmi: add error handling in g4x_hdmi_init()",
                            "    - drm/i915/ddi: gracefully handle errors from",
                            "      intel_ddi_init_hdmi_connector()",
                            "    - drm/i915/display: add intel_encoder_is_hdmi()",
                            "    - drm/i915/ddi: only call shutdown hooks for valid encoders",
                            "    - PCI/ASPM: Save parent L1SS config in pci_save_aspm_l1ss_state()",
                            "    - PCI/ASPM: Fix L1SS saving",
                            "    - ALSA: hda/realtek - Fix mute LED for HP Victus 16-r1xxx",
                            "    - ALSA: hda/realtek - Fix mute LED for HP Victus 16-s0xxx",
                            "    - ALSA: hda/realtek - Fix mute LED for HP Victus 16-d1xxx (MB 8A26)",
                            "    - s390/mm: Remove possible false-positive warning in pte_free_defer()",
                            "    - Upstream stable to v6.6.102, v6.12.42",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38619",
                            "    - media: ti: j721e-csi2rx: fix list_del corruption",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38582",
                            "    - RDMA/hns: Fix double destruction of rsv_qp",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38585",
                            "    - staging: media: atomisp: Fix stack buffer overflow in gmin_get_var_int()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38593",
                            "    - Bluetooth: hci_sync: fix double free in 'hci_discovery_filter_clear()'",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-39732",
                            "    - wifi: ath11k: fix sleeping-in-atomic in ath11k_mac_op_set_bitrate_mask()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38595",
                            "    - xen: fix UAF in dmabuf_exp_from_pages()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38660",
                            "    - parse_longname(): strrchr() expects NUL-terminated string",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38555",
                            "    - usb: gadget : fix use-after-free in composite_dev_cleanup()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2024-36331 // CVE-2025-38560",
                            "    - x86/sev: Evict cache lines during SNP memory validation",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38501",
                            "    - ksmbd: limit repeated connections from clients with the same IP",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38562",
                            "    - ksmbd: fix null pointer dereference error in generate_encryptionkey",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38566",
                            "    - sunrpc: fix handling of server side tls alerts",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38568",
                            "    - net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38571",
                            "    - sunrpc: fix client side handling of tls alerts",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38622",
                            "    - net: drop UFO packets in udp_rcv_segment()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38572",
                            "    - ipv6: reject malicious packets in ipv6_gso_segment()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38574",
                            "    - pptp: ensure minimal skb length in pptp_xmit()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-39730",
                            "    - NFS: Fix filehandle bounds checking in nfs_fh_to_dentry()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38623",
                            "    - PCI: pnv_php: Fix surprise plug detection and recovery",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38576",
                            "    - powerpc/eeh: Make EEH driver device hotplug safe",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38624",
                            "    - PCI: pnv_php: Clean up allocated IRQs on unplug",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38625",
                            "    - vfio/pds: Fix missing detach_ioas op",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38626",
                            "    - f2fs: fix to trigger foreground gc during f2fs_map_blocks() in lfs mode",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-39731",
                            "    - f2fs: vm_unmap_ram() may be called from an invalid context",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38652",
                            "    - f2fs: fix to avoid out-of-boundary access in devs.path",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38577",
                            "    - f2fs: fix to avoid panic in f2fs_evict_inode",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38578",
                            "    - f2fs: fix to avoid UAF in f2fs_sync_inode_meta()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38579",
                            "    - f2fs: fix KMSAN uninit-value in extent_info usage",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38630",
                            "    - fbdev: imxfb: Check fb_add_videomode to prevent null-ptr-deref",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38632",
                            "    - pinmux: fix race causing mux_owner NULL with active mux_usecount",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38653",
                            "    - proc: use the same treatment to check proc_lseek as ones for",
                            "      proc_read_iter et.al",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38581",
                            "    - crypto: ccp - Fix crash when rebind ccp device for ccp.ko",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38634",
                            "    - power: supply: cpcap-charger: Fix null check for",
                            "      power_supply_get_by_name",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38583",
                            "    - clk: xilinx: vcu: unregister pll_post only if registered correctly",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38635",
                            "    - clk: davinci: Add NULL check in davinci_lpsc_clk_register()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38587",
                            "    - ipv6: fix possible infinite loop in fib6_info_uses_dev()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38588",
                            "    - ipv6: prevent infinite loop in rt6_nlmsg_size()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38590",
                            "    - net/mlx5e: Remove skb secpath if xfrm state is not found",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38639",
                            "    - netfilter: xt_nfacct: don't assume acct name is null-terminated",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38640",
                            "    - bpf: Disable migration in nf_hook_run_bpf().",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38644",
                            "    - wifi: mac80211: reject TDLS operations when station is not associated",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38553",
                            "    - net/sched: Restrict conditions for adding duplicating netems to qdisc",
                            "      tree",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38645",
                            "    - net/mlx5: Check device memory pointer before usage",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38601",
                            "    - wifi: ath11k: clear initialized flag for deinit-ed srng lists",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38602",
                            "    - iwlwifi: Add missing check for alloc_ordered_workqueue",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38604",
                            "    - wifi: rtl818x: Kill URBs before clearing tx status queue",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38646",
                            "    - wifi: rtw89: avoid NULL dereference when RX problematic packet on",
                            "      unsupported 6 GHz band",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38608",
                            "    - bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38609",
                            "    - PM / devfreq: Check governor before using governor->name",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38610",
                            "    - powercap: dtpm_cpu: Fix NULL pointer dereference in get_pd_power_uw()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38612",
                            "    - staging: fbtft: fix potential memory leak in fbtft_framebuffer_alloc()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38648",
                            "    - spi: stm32: Check for cfg availability in stm32_spi_probe",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38659",
                            "    - gfs2: No more self recovery",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-39734",
                            "    - Revert \"fs/ntfs3: Replace inode_trylock with inode_lock\"",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38650",
                            "    - hfsplus: remove mutex_lock check in hfsplus_free_extents",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-17 (LP: #2136740) //",
                            "    CVE-2025-38615",
                            "    - fs/ntfs3: cancle set bad inode after removing name fails",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-16 (LP: #2136361)",
                            "    - virtio_ring: Fix error reporting in virtqueue_resize",
                            "    - RDMA/core: Rate limit GID cache warning messages",
                            "    - interconnect: qcom: sc7280: Add missing num_links to xm_pcie3_1 node",
                            "    - iio: adc: ad7949: use spi_is_bpw_supported()",
                            "    - regmap: fix potential memory leak of regmap_bus",
                            "    - x86/hyperv: Fix usage of cpu_online_mask to get valid cpu",
                            "    - platform/x86: Fix initialization order for firmware_attributes_class",
                            "    - staging: vchiq_arm: Make vchiq_shutdown never fail",
                            "    - net/mlx5: Fix memory leak in cmd_exec()",
                            "    - net/mlx5: E-Switch, Fix peer miss rules to use peer eswitch",
                            "    - i40e: report VF tx_dropped with tx_errors instead of tx_discards",
                            "    - i40e: When removing VF MAC filters, only check PF-set MAC",
                            "    - drm/bridge: ti-sn65dsi86: Remove extra semicolon in ti_sn_bridge_probe()",
                            "    - net: hns3: fix concurrent setting vlan filter issue",
                            "    - net: hns3: disable interrupt when ptp init failed",
                            "    - net: hns3: fixed vf get max channels bug",
                            "    - net: hns3: default enable tx bounce buffer when smmu enabled",
                            "    - platform/x86: ideapad-laptop: Fix kbd backlight not remembered among",
                            "      boots",
                            "    - i2c: tegra: Fix reset error handling with ACPI",
                            "    - i2c: virtio: Avoid hang by using interruptible completion wait",
                            "    - bus: fsl-mc: Fix potential double device reference in",
                            "      fsl_mc_get_endpoint()",
                            "    - sprintf.h requires stdarg.h",
                            "    - ALSA: hda/realtek - Add mute LED support for HP Pavilion 15-eg0xxx",
                            "    - dpaa2-eth: Fix device reference count leak in MAC endpoint handling",
                            "    - dpaa2-switch: Fix device reference count leak in MAC endpoint handling",
                            "    - e1000e: disregard NVM checksum on tgp when valid checksum bit is not set",
                            "    - e1000e: ignore uninitialized checksum word on tgp",
                            "    - gve: Fix stuck TX queue for DQ queue format",
                            "    - kasan: use vmalloc_dump_obj() for vmalloc error reports",
                            "    - resource: fix false warning in __request_region()",
                            "    - selftests: mptcp: connect: also cover alt modes",
                            "    - selftests: mptcp: connect: also cover checksum",
                            "    - mm/zsmalloc: do not pass __GFP_MOVABLE if CONFIG_COMPACTION=n",
                            "    - usb: typec: tcpm: allow to use sink in accessory mode",
                            "    - usb: typec: tcpm: allow switching to mode accessory to mux properly",
                            "    - usb: typec: tcpm: apply vbus before data bringup in tcpm_src_attach",
                            "    - comedi: comedi_test: Fix possible deletion of uninitialized timers",
                            "    - ALSA: hda/tegra: Add Tegra264 support",
                            "    - ALSA: hda: Add missing NVIDIA HDA codec IDs",
                            "    - drm/i915/dp: Fix 2.7 Gbps DP_LINK_BW value on g4x",
                            "    - mm: khugepaged: fix call hpage_collapse_scan_file() for anonymous vma",
                            "    - crypto: powerpc/poly1305 - add depends on BROKEN for now",
                            "    - [Config] disable CRYPTO_POLY1305_P10",
                            "    - iio: hid-sensor-prox: Fix incorrect OFFSET calculation",
                            "    - iio: hid-sensor-prox: Restore lost scale assignments",
                            "    - mtd: rawnand: qcom: Fix last codeword read in",
                            "      qcom_param_page_type_exec()",
                            "    - ksmbd: add free_transport ops in ksmbd connection",
                            "    - arm64/cpufeatures/kvm: Add ARMv8.9 FEAT_ECBHB bits in ID_AA64MMFR1",
                            "      register",
                            "    - ARM: 9448/1: Use an absolute path to unified.h in KBUILD_AFLAGS",
                            "    - Revert \"selftests/bpf: Add a cgroup prog bpf_get_ns_current_pid_tgid()",
                            "      test\"",
                            "    - x86/traps: Initialize DR7 by writing its architectural reset value",
                            "    - virtio_net: Enforce minimum TX ring size for reliability",
                            "    - platform/x86: asus-nb-wmi: add DMI quirk for ASUS Zenbook Duo UX8406CA",
                            "    - platform/mellanox: mlxbf-pmc: Remove newline char from event name input",
                            "    - platform/mellanox: mlxbf-pmc: Validate event/enable input",
                            "    - platform/mellanox: mlxbf-pmc: Use kstrtobool() to check 0/1 input",
                            "    - xfrm: state: use a consistent pcpu_id in xfrm_state_find",
                            "    - xfrm: Set transport header to fix UDP GRO handling",
                            "    - ALSA: hda/realtek: Fix mute LED mask on HP OMEN 16 laptop",
                            "    - drm/sched: Remove optimization that causes hang when killing dependent",
                            "      jobs",
                            "    - mm/ksm: fix -Wsometimes-uninitialized from clang-21 in",
                            "      advisor_mode_show()",
                            "    - ALSA: hda/realtek - Add mute LED support for HP Victus 15-fa0xxx",
                            "    - rust: give Clippy the minimum supported Rust version",
                            "    - selftests/bpf: Add tests with stack ptr register in conditional jmp",
                            "    - spi: cadence-quadspi: fix cleanup of rx_chan on failure paths",
                            "    - ext4: don't explicit update times in ext4_fallocate()",
                            "    - ext4: refactor ext4_punch_hole()",
                            "    - ext4: refactor ext4_zero_range()",
                            "    - ext4: refactor ext4_collapse_range()",
                            "    - ext4: refactor ext4_insert_range()",
                            "    - ext4: factor out ext4_do_fallocate()",
                            "    - ext4: move out inode_lock into ext4_fallocate()",
                            "    - fs: sort out the fallocate mode vs flag mess",
                            "    - ext4: move out common parts into ext4_fallocate()",
                            "    - ext4: fix incorrect punch max_end",
                            "    - ext4: correct the error handle in ext4_fallocate()",
                            "    - ext4: fix out of bounds punch offset",
                            "    - KVM: x86: drop x86.h include from cpuid.h",
                            "    - KVM: x86: Route non-canonical checks in emulator through emulate_ops",
                            "    - KVM: x86: Add X86EMUL_F_MSR and X86EMUL_F_DT_LOAD to aid canonical",
                            "      checks",
                            "    - KVM: x86: model canonical checks more precisely",
                            "    - x86/hyperv: Fix APIC ID and VP index confusion in hv_snp_boot_ap()",
                            "    - arm64: dts: qcom: x1-crd: Fix vreg_l2j_1p2 voltage",
                            "    - Drivers: hv: Make the sysfs node size for the ring buffer dynamic",
                            "    - Upstream stable to v6.6.101, v6.12.41",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-16 (LP: #2136361) //",
                            "    CVE-2025-38351",
                            "    - KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-16 (LP: #2136361) //",
                            "    CVE-2025-38675",
                            "    - xfrm: state: initialize state_ptrs earlier in xfrm_state_find",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-16 (LP: #2136361) //",
                            "    CVE-2025-38322",
                            "    - perf/x86/intel: Fix crash in icl_update_topdown_event()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-16 (LP: #2136361) //",
                            "    CVE-2025-37777",
                            "    - ksmbd: fix use-after-free in __smb2_lease_break_noti()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-16 (LP: #2136361) //",
                            "    CVE-2025-37925",
                            "    - jfs: reject on-disk inodes of an unsupported type",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-16 (LP: #2136361) //",
                            "    CVE-2025-38663",
                            "    - nilfs2: reject invalid file types when reading inodes",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-16 (LP: #2136361) //",
                            "    CVE-2025-38664",
                            "    - ice: Fix a null pointer dereference in ice_copy_and_init_pkg()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-16 (LP: #2136361) //",
                            "    CVE-2025-38670",
                            "    - arm64/entry: Mask DAIF in cpu_switch_to(), call_on_irq_stack()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-16 (LP: #2136361) //",
                            "    CVE-2025-38671",
                            "    - i2c: qup: jump out of the loop in case of timeout",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-16 (LP: #2136361) //",
                            "    CVE-2025-39726",
                            "    - s390/ism: fix concurrency management in ism_cmd()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-16 (LP: #2136361) //",
                            "    CVE-2025-38665",
                            "    - can: netlink: can_changelink(): fix NULL pointer deref of struct",
                            "      can_priv::do_set_mode",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-16 (LP: #2136361) //",
                            "    CVE-2025-38668",
                            "    - regulator: core: fix NULL dereference on unbind due to stale coupling",
                            "      data",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-16 (LP: #2136361) //",
                            "    CVE-2025-38335",
                            "    - Input: gpio-keys - fix a sleep while atomic with PREEMPT_RT",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221)",
                            "    - phy: tegra: xusb: Decouple CYA_TRK_CODE_UPDATE_ON_IDLE from trk_hw_mode",
                            "    - phy: tegra: xusb: Disable periodic tracking on Tegra234",
                            "    - USB: serial: option: add Telit Cinterion FE910C04 (ECM) composition",
                            "    - USB: serial: option: add Foxconn T99W640",
                            "    - USB: serial: ftdi_sio: add support for NDI EMGUIDE GEMINI",
                            "    - usb: musb: fix gadget state on disconnect",
                            "    - i2c: stm32: fix the device used for the DMA map",
                            "    - thunderbolt: Fix wake on connect at runtime",
                            "    - thunderbolt: Fix bit masking in tb_dp_port_set_hops()",
                            "    - nvmem: imx-ocotp: fix MAC address byte length",
                            "    - Input: xpad - set correct controller type for Acer NGR200",
                            "    - pch_uart: Fix dma_sync_sg_for_device() nents value",
                            "    - spi: Add check for 8-bit transfer with 8 IO mode support",
                            "    - HID: core: ensure __hid_request reserves the report ID as the first byte",
                            "    - tracing/probes: Avoid using params uninitialized in parse_btf_arg()",
                            "    - drm/amdgpu/gfx8: reset compute ring wptr on the GPU on resume",
                            "    - ALSA: hda/realtek: Add quirk for ASUS ROG Strix G712LWS",
                            "    - io_uring/poll: fix POLLERR handling",
                            "    - phonet/pep: Move call to pn_skb_get_dst_sockaddr() earlier in",
                            "      pep_sock_accept()",
                            "    - net/mlx5: Update the list of the PCI supported devices",
                            "    - arm64: dts: imx8mp-venice-gw74xx: fix TPM SPI frequency",
                            "    - arm64: dts: freescale: imx8mm-verdin: Keep LDO5 always on",
                            "    - arm64: dts: rockchip: use cs-gpios for spi1 on ringneck",
                            "    - af_packet: fix the SO_SNDTIMEO constraint not effective on tpacked_snd()",
                            "    - af_packet: fix soft lockup issue caused by tpacket_snd()",
                            "    - isofs: Verify inode mode when loading from disk",
                            "    - memstick: core: Zero initialize id_reg in h_memstick_read_dev_id()",
                            "    - mmc: bcm2835: Fix dma_unmap_sg() nents value",
                            "    - mmc: sdhci-pci: Quirk for broken command queuing on Intel GLK-based",
                            "      Positivo models",
                            "    - mmc: sdhci_am654: Workaround for Errata i2312",
                            "    - pmdomain: governor: Consider CPU latency tolerance from",
                            "      pm_domain_cpu_gov",
                            "    - soc: aspeed: lpc-snoop: Cleanup resources in stack-order",
                            "    - iio: adc: max1363: Fix MAX1363_4X_CHANS/MAX1363_8X_CHANS[]",
                            "    - iio: adc: max1363: Reorder mode_list[] entries",
                            "    - iio: adc: stm32-adc: Fix race in installing chained IRQ handler",
                            "    - comedi: Fix some signed shift left operations",
                            "    - soundwire: amd: fix for handling slave alerts after link is down",
                            "    - soundwire: amd: fix for clearing command status register",
                            "    - cachefiles: Fix the incorrect return value in __cachefiles_write()",
                            "    - net: emaclite: Fix missing pointer increment in aligned_read()",
                            "    - block: fix kobject leak in blk_unregister_queue",
                            "    - nvme: fix inconsistent RCU list manipulation in",
                            "      nvme_ns_add_to_ctrl_list()",
                            "    - nvme: fix misaccounting of nvme-mpath inflight I/O",
                            "    - wifi: cfg80211: remove scan request n_channels counted_by",
                            "    - selftests: net: increase inter-packet timeout in udpgro.sh",
                            "    - Bluetooth: hci_sync: fix connectable extended advertising when using",
                            "      static random address",
                            "    - Bluetooth: SMP: If an unallowed command is received consider it a",
                            "      failure",
                            "    - Bluetooth: SMP: Fix using HCI_ERROR_REMOTE_USER_TERM on timeout",
                            "    - Bluetooth: btusb: QCA: Fix downloading wrong NVM for WCN6855 GF variant",
                            "      without board ID",
                            "    - net/mlx5: Correctly set gso_size when LRO is used",
                            "    - Bluetooth: L2CAP: Fix attempting to adjust outgoing MTU",
                            "    - hv_netvsc: Set VF priv_flags to IFF_NO_ADDRCONF before open to prevent",
                            "      IPv6 addrconf",
                            "    - net: bridge: Do not offload IGMP/MLD messages",
                            "    - rxrpc: Fix transmission of an abort in response to an abort",
                            "    - Revert \"cgroup_freezer: cgroup_freezing: Check if not frozen\"",
                            "    - sched: Change nr_uninterruptible type to unsigned long",
                            "    - ipv6: make addrconf_wq single threaded",
                            "    - usb: hub: fix detection of high tier USB3 devices behind suspended hubs",
                            "    - usb: hub: Fix flushing and scheduling of delayed work that tunes runtime",
                            "      pm",
                            "    - usb: hub: Fix flushing of delayed work used for post resume purposes",
                            "    - usb: hub: Don't try to recover devices lost during warm reset.",
                            "    - usb: dwc3: qcom: Don't leave BCR asserted",
                            "    - i2c: omap: Add support for setting mux",
                            "    - [Config] make mux support built-in on arm",
                            "    - i2c: omap: Fix an error handling path in omap_i2c_probe()",
                            "    - i2c: omap: Handle omap_i2c_init() errors in omap_i2c_probe()",
                            "    - Revert \"selftests/bpf: adjust dummy_st_ops_success to detect additional",
                            "      error\"",
                            "    - Revert \"selftests/bpf: dummy_st_ops should reject 0 for non-nullable",
                            "      params\"",
                            "    - i2c: omap: fix deprecated of_property_read_bool() use",
                            "    - nvmem: layouts: u-boot-env: remove crc32 endianness conversion",
                            "    - i2c: stm32f7: unmap DMA mapped buffer",
                            "    - drm/amdgpu: Increase reset counter only on success",
                            "    - ALSA: hda/realtek - Fix mute LED for HP Victus 16-r0xxx",
                            "    - mptcp: reset fallback status gracefully at disconnect() time",
                            "    - arm64: dts: imx8mp-venice-gw72xx: fix TPM SPI frequency",
                            "    - arm64: dts: imx8mp-venice-gw73xx: fix TPM SPI frequency",
                            "    - arm64: dts: rockchip: Add cd-gpios for sdcard detect on Cool Pi CM5",
                            "    - arm64: dts: rockchip: Add cd-gpios for sdcard detect on Cool Pi 4B",
                            "    - nvme: fix endianness of command word prints in nvme_log_err_passthru()",
                            "    - nvmet-tcp: fix callback lock for TLS handshake",
                            "    - can: tcan4x5x: add option for selecting nWKRQ voltage",
                            "    - can: tcan4x5x: fix reset gpio usage during probe",
                            "    - ice: check correct pointer in fwlog debugfs",
                            "    - riscv: Enable interrupt during exception handling",
                            "    - riscv: traps_misaligned: properly sign extend value in misaligned load",
                            "      handler",
                            "    - Bluetooth: hci_core: add missing braces when using macro parameters",
                            "    - drm/mediatek: Add wait_event_timeout when disabling plane",
                            "    - drm/mediatek: only announce AFBC if really supported",
                            "    - net: libwx: fix multicast packets received count",
                            "    - sched,freezer: Remove unnecessary warning in __thaw_task",
                            "    - drm/xe/mocs: Initialize MOCS index early",
                            "    - drm/xe: Move page fault init after topology init",
                            "    - smb: client: let smbd_post_send_iter() respect the peers max_send_size",
                            "      and transmit all data",
                            "    - Upstream stable to v6.6.100, v6.12.40",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-22115",
                            "    - btrfs: fix block group refcount race in",
                            "      btrfs_create_pending_block_groups()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38549",
                            "    - efivarfs: Fix memory leak of efivarfs_fs_info in fs_context error paths",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38551",
                            "    - virtio-net: fix recursived rtnl_lock() during probe()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38531",
                            "    - iio: common: st_sensors: Fix use of uninitialize device structs",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38552",
                            "    - mptcp: plug races between subflow fail and subflow creation",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38491",
                            "    - mptcp: make fallback action and fallback decision atomic",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38469",
                            "    - KVM: x86/xen: Fix cleanup logic in emulation of Xen schedop poll",
                            "      hypercalls",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38499",
                            "    - clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the",
                            "      right userns",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38524",
                            "    - rxrpc: Fix recv-recv race of completed call",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38468",
                            "    - net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38470",
                            "    - net: vlan: fix VLAN 0 refcount imbalance of toggling filtering during",
                            "      runtime",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38471",
                            "    - tls: always refresh the queue when reading sock",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38472",
                            "    - netfilter: nf_conntrack: fix crash due to removal of uninitialised entry",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38550",
                            "    - ipv6: mcast: Delay put pmc->idev in mld_del_delrec()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38473",
                            "    - Bluetooth: Fix null-ptr-deref in l2cap_sock_resume_cb()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38474",
                            "    - usb: net: sierra: check for no status endpoint",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38526",
                            "    - ice: add NULL check in eswitch lag check",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38548",
                            "    - hwmon: (corsair-cpro) Validate the size of the received input buffer",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38537",
                            "    - net: phy: Don't register LEDs for genphy",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38527",
                            "    - smb: client: fix use-after-free in cifs_oplock_break",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38476",
                            "    - rpl: Fix use-after-free in rpl_do_srh_inline().",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38528",
                            "    - bpf: Reject %p% format string in bprintf-like helpers",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38478",
                            "    - comedi: Fix initialization of data for instructions that write to",
                            "      subdevice",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38480",
                            "    - comedi: Fix use of uninitialized data in insn_rw_emulate_bits()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38481",
                            "    - comedi: Fail COMEDI_INSNLIST ioctl if n_insns is too large",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38482",
                            "    - comedi: das6402: Fix bit shift out of bounds",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38483",
                            "    - comedi: das16m1: Fix bit shift out of bounds",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38529",
                            "    - comedi: aio_iiro_16: Fix bit shift out of bounds",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38530",
                            "    - comedi: pcl812: Fix bit shift out of bounds",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38485",
                            "    - iio: accel: fxls8962af: Fix use after free in fxls8962af_fifo_flush",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38487",
                            "    - soc: aspeed: lpc-snoop: Don't disable channels that aren't enabled",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2024-50047 fix. // CVE-2025-38488",
                            "    - smb: client: fix use-after-free in crypt_message when using async crypto",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38489",
                            "    - s390/bpf: Fix bpf_arch_text_poke() with new_addr == NULL again",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38532",
                            "    - net: libwx: properly reset Rx ring descriptor",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38533",
                            "    - net: libwx: fix the using of Rx buffer DMA",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38490",
                            "    - net: libwx: remove duplicate page_pool_put_full_page()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38538",
                            "    - dmaengine: nbpfaxi: Fix memory corruption in probe()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38493",
                            "    - tracing/osnoise: Fix crash in timerlat_dump_stack()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38539",
                            "    - tracing: Add down_write(trace_event_sem) when adding trace event",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38494",
                            "    - HID: core: do not bypass hid_hw_raw_request",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38495",
                            "    - HID: core: ensure the allocated report buffer can contain the reserved",
                            "      report ID",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38496",
                            "    - dm-bufio: fix sched in atomic context",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38497",
                            "    - usb: gadget: configfs: Fix OOB read on empty string write",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-15 (LP: #2136221) //",
                            "    CVE-2025-38535",
                            "    - phy: tegra: xusb: Fix unbalanced regulator disable in UTMI PHY mode",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382)",
                            "    - configfs: Do not override creating attribute file failure in",
                            "      populate_attrs()",
                            "    - crypto: marvell/cesa - Do not chain submitted requests",
                            "    - gfs2: move msleep to sleepable context",
                            "    - ASoC: qcom: sdm845: Add error handling in sdm845_slim_snd_hw_params()",
                            "    - ASoC: meson: meson-card-utils: use of_property_present() for DT parsing",
                            "    - io_uring: account drain memory to cgroup",
                            "    - io_uring/kbuf: account ring io_buffer_list memory",
                            "    - powerpc/pseries/msi: Avoid reading PCI device registers in reduced power",
                            "      states",
                            "    - regulator: max20086: Fix MAX200086 chip id",
                            "    - regulator: max20086: Change enable gpio to optional",
                            "    - net/mlx5_core: Add error handling",
                            "      inmlx5_query_nic_vport_qkey_viol_cntr()",
                            "    - net/mlx5: Add error handling in mlx5_query_nic_vport_node_guid()",
                            "    - wifi: ath11k: fix rx completion meta data corruption",
                            "    - wifi: ath11k: fix ring-buffer corruption",
                            "    - SUNRPC: Prevent hang on NFS mount with xprtsec=[m]tls",
                            "    - wifi: ath12k: fix ring-buffer corruption",
                            "    - wifi: rtw88: usb: Reduce control message timeout to 500 ms",
                            "    - wifi: rtlwifi: disable ASPM for RTL8723BE with subsystem ID 11ad:1723",
                            "    - media: ov8856: suppress probe deferral errors",
                            "    - media: ov5675: suppress probe deferral errors",
                            "    - media: nxp: imx8-isi: better handle the m2m usage_count",
                            "    - media: i2c: ds90ub913: Fix returned fmt from .set_fmt()",
                            "    - media: ccs-pll: Start VT pre-PLL multiplier search from correct value",
                            "    - media: ccs-pll: Start OP pre-PLL multiplier search from correct value",
                            "    - media: ccs-pll: Correct the upper limit of maximum op_pre_pll_clk_div",
                            "    - media: ccs-pll: Check for too high VT PLL multiplier in dual PLL case",
                            "    - media: davinci: vpif: Fix memory leak in probe error path",
                            "    - media: gspca: Add error handling for stv06xx_read_sensor()",
                            "    - media: mediatek: vcodec: Correct vsi_core framebuffer size",
                            "    - media: omap3isp: use sgtable-based scatterlist wrappers",
                            "    - media: v4l2-dev: fix error handling in __video_register_device()",
                            "    - media: venus: Fix probe error handling",
                            "    - media: videobuf2: use sgtable-based scatterlist wrappers",
                            "    - media: imx-jpeg: Drop the first error frames",
                            "    - media: imx-jpeg: Move mxc_jpeg_free_slot_data() ahead",
                            "    - media: imx-jpeg: Reset slot data pointers when freed",
                            "    - media: uvcvideo: Return the number of processed controls",
                            "    - media: uvcvideo: Send control events for partial succeeds",
                            "    - media: uvcvideo: Fix deferred probing error",
                            "    - arm64/mm: Close theoretical race where stale TLB entry remains valid",
                            "    - ARM: 9447/1: arm/memremap: fix arch_memremap_can_ram_remap()",
                            "    - ARM: omap: pmic-cpcap: do not mess around without CPCAP or OMAP4",
                            "    - bus: mhi: host: Fix conflict between power_up and SYSERR",
                            "    - can: tcan4x5x: fix power regulator retrieval during probe",
                            "    - ceph: set superblock s_magic for IMA fsmagic matching",
                            "    - cgroup,freezer: fix incomplete freezing when attaching tasks",
                            "    - bus: fsl-mc: do not add a device-link for the UAPI used DPMCP device",
                            "    - bus: fsl-mc: fix GET/SET_TAILDROP command ids",
                            "    - ext4: fix calculation of credits for extent tree modification",
                            "    - ext4: factor out ext4_get_maxbytes()",
                            "    - ext4: ensure i_size is smaller than maxbytes",
                            "    - Input: gpio-keys - fix possible concurrent access in",
                            "      gpio_keys_irq_timer()",
                            "    - net: ftgmac100: select FIXED_PHY",
                            "    - EDAC/altera: Use correct write width with the INTTEST register",
                            "    - parisc/unaligned: Fix hex output to show 8 hex chars",
                            "    - parisc: fix building with gcc-15",
                            "    - clk: meson-g12a: add missing fclk_div2 to spicc",
                            "    - watchdog: fix watchdog may detect false positive of softlockup",
                            "    - mm: fix ratelimit_pages update error in dirty_ratio_handler()",
                            "    - mtd: rawnand: sunxi: Add randomizer configuration in",
                            "      sunxi_nfc_hw_ecc_write_chunk",
                            "    - mtd: nand: sunxi: Add randomizer configuration before randomizer enable",
                            "    - KVM: SVM: Clear current_vmcb during vCPU free for all *possible* CPUs",
                            "    - KVM: VMX: Flush shadow VMCS on emergency reboot",
                            "    - dm-mirror: fix a tiny race condition",
                            "    - dm-verity: fix a memory leak if some arguments are specified multiple",
                            "      times",
                            "    - mtd: rawnand: qcom: Fix read len for onfi param page",
                            "    - phy: fsl-imx8mq-usb: fix phy_tx_vboost_level_from_property()",
                            "    - KVM: s390: rename PROT_NONE to PROT_TYPE_DUMMY",
                            "    - staging: iio: ad5933: Correct settling cycles encoding per datasheet",
                            "    - mips: Add -std= flag specified in KBUILD_CFLAGS to vdso CFLAGS",
                            "    - regulator: max14577: Add error check for max14577_read_reg()",
                            "    - cifs: reset connections for all channels when reconnect requested",
                            "    - cifs: update dstaddr whenever channel iface is updated",
                            "    - cifs: dns resolution is needed only for primary channel",
                            "    - Drivers: hv: Allocate interrupt and monitor pages aligned to system page",
                            "      boundary",
                            "    - uio_hv_generic: Use correct size for interrupt and monitor pages",
                            "    - PCI: cadence-ep: Correct PBA offset in .set_msix() callback",
                            "    - PCI: Add ACS quirk for Loongson PCIe",
                            "    - PCI: Fix lock symmetry in pci_slot_unlock()",
                            "    - PCI: dw-rockchip: Fix PHY function call sequence in",
                            "      rockchip_pcie_phy_deinit()",
                            "    - iio: accel: fxls8962af: Fix temperature scan element sign",
                            "    - iio: imu: inv_icm42600: Fix temperature calculation",
                            "    - iio: adc: ad7606_spi: fix reg write value mask",
                            "    - ASoC: amd: yc: Add quirk for Lenovo Yoga Pro 7 14ASP9",
                            "    - clocksource: Fix the CPUs' choice in the watchdog per CPU verification",
                            "    - power: supply: collie: Fix wakeup source leaks on device unbind",
                            "    - mmc: Add quirk to disable DDR50 tuning",
                            "    - ACPICA: Avoid sequence overread in call to strncmp()",
                            "    - ASoC: tas2770: Power cycle amp on ISENSE/VSENSE change",
                            "    - ACPI: bus: Bail out if acpi_kobj registration fails",
                            "    - ACPI: Add missing prototype for non CONFIG_SUSPEND/CONFIG_X86 case",
                            "    - power: supply: bq27xxx: Retrieve again when busy",
                            "    - ACPICA: utilities: Fix overflow check in vsnprintf()",
                            "    - ASoC: tegra210_ahub: Add check to of_device_get_match_data()",
                            "    - gpiolib: of: Add polarity quirk for s5m8767",
                            "    - PM: runtime: fix denying of auto suspend in pm_suspend_timer_fn()",
                            "    - net: macb: Check return value of dma_set_mask_and_coherent()",
                            "    - tipc: use kfree_sensitive() for aead cleanup",
                            "    - f2fs: use vmalloc instead of kvmalloc in .init_{,de}compress_ctx",
                            "    - i2c: designware: Invoke runtime suspend on quick slave re-registration",
                            "    - emulex/benet: correct command version selection in be_cmd_get_stats()",
                            "    - wifi: mt76: mt76x2: Add support for LiteOn WN4516R,WN4519R",
                            "    - wifi: mt76: mt7921: add 160 MHz AP for mt7922 device",
                            "    - sctp: Do not wake readers in __sctp_write_space()",
                            "    - cpufreq: scmi: Skip SCMI devices that aren't used by the CPUs",
                            "    - i2c: npcm: Add clock toggle recovery",
                            "    - net: dlink: add synchronization for stats update",
                            "    - wifi: ath12k: fix macro definition HAL_RX_MSDU_PKT_LENGTH_GET",
                            "    - wifi: ath12k: fix a possible dead lock caused by ab->base_lock",
                            "    - wifi: ath11k: Fix QMI memory reuse logic",
                            "    - wifi: rtw89: leave idle mode when setting WEP encryption for AP mode",
                            "    - tcp: always seek for minimal rtt in tcp_rcv_rtt_update()",
                            "    - tcp: fix initial tp->rcvq_space.space value for passive TS enabled flows",
                            "    - ipv4/route: Use this_cpu_inc() for stats on PREEMPT_RT",
                            "    - net: atlantic: generate software timestamp just before the doorbell",
                            "    - pinctrl: armada-37xx: propagate error from armada_37xx_pmx_set_by_name()",
                            "    - pinctrl: armada-37xx: propagate error from",
                            "      armada_37xx_gpio_get_direction()",
                            "    - pinctrl: armada-37xx: propagate error from",
                            "      armada_37xx_pmx_gpio_set_direction()",
                            "    - pinctrl: armada-37xx: propagate error from armada_37xx_gpio_get()",
                            "    - net: mlx4: add SOF_TIMESTAMPING_TX_SOFTWARE flag when getting ts info",
                            "    - net: vertexcom: mse102x: Return code for mse102x_rx_pkt_spi",
                            "    - wireless: purelifi: plfxlc: fix memory leak in plfxlc_usb_wreq_asyn()",
                            "    - wifi: mac80211: do not offer a mesh path if forwarding is disabled",
                            "    - clk: rockchip: rk3036: mark ddrphy as critical",
                            "    - libbpf: Add identical pointer detection to btf_dedup_is_equiv()",
                            "    - scsi: lpfc: Fix lpfc_check_sli_ndlp() handling for GEN_REQUEST64",
                            "      commands",
                            "    - iommu/amd: Ensure GA log notifier callbacks finish running before module",
                            "      unload",
                            "    - wifi: iwlwifi: pcie: make sure to lock rxq->read",
                            "    - wifi: mac80211_hwsim: Prevent tsf from setting if beacon is disabled",
                            "    - wifi: mac80211: VLAN traffic in multicast path",
                            "    - wifi: iwlwifi: Add missing MODULE_FIRMWARE for Qu-c0-jf-b0",
                            "    - net: bridge: mcast: update multicast contex when vlan state is changed",
                            "    - net: bridge: mcast: re-implement br_multicast_{enable, disable}_port",
                            "      functions",
                            "    - vxlan: Do not treat dst cache initialization errors as fatal",
                            "    - net: ethernet: ti: am65-cpsw: handle -EPROBE_DEFER",
                            "    - pinctrl: mcp23s08: Reset all pins to input at probe",
                            "    - wifi: ath12k: fix failed to set mhi state error during reboot with",
                            "      hardware grouping",
                            "    - sock: Correct error checking condition for (assign|release)_proto_idx()",
                            "    - ice: fix check for existing switch rule",
                            "    - usbnet: asix AX88772: leave the carrier control to phylink",
                            "    - f2fs: fix to set atomic write status more clear",
                            "    - bpf, sockmap: Fix data lost during EAGAIN retries",
                            "    - octeontx2-pf: Add error log forcn10k_map_unmap_rq_policer()",
                            "    - wifi: ath11k: determine PM policy based on machine model",
                            "    - wifi: ath12k: fix link valid field initialization in the monitor Rx",
                            "    - wifi: ath12k: fix incorrect CE addresses",
                            "    - wifi: ath12k: Pass correct values of center freq1 and center freq2 for",
                            "      160 MHz",
                            "    - watchdog: da9052_wdt: respect TWDMIN",
                            "    - bus: fsl-mc: increase MC_CMD_COMPLETION_TIMEOUT_MS value",
                            "    - ARM: OMAP2+: Fix l4ls clk domain handling in STANDBY",
                            "    - tee: Prevent size calculation wraparound on 32-bit kernels",
                            "    - Revert \"bus: ti-sysc: Probe for l4_wkup and l4_cfg interconnect devices",
                            "      first\"",
                            "    - fs/xattr.c: fix simple_xattr_list()",
                            "    - platform/x86/amd: pmc: Clear metrics table at start of cycle",
                            "    - platform/x86: dell_rbu: Stop overwriting data buffer",
                            "    - powerpc/vdso: Fix build of VDSO32 with pcrel",
                            "    - powerpc/eeh: Fix missing PE bridge reconfiguration during VFIO EEH",
                            "      recovery",
                            "    - io_uring: fix task leak issue in io_wq_create()",
                            "    - platform/loongarch: laptop: Get brightness setting from EC on probe",
                            "    - platform/loongarch: laptop: Unregister generic_sub_drivers on exit",
                            "    - LoongArch: Avoid using $r0/$r1 as \"mask\" for csrxchg",
                            "    - cifs: deal with the channel loading lag while picking channels",
                            "    - cifs: serialize other channels when query server interfaces is pending",
                            "    - cifs: do not disable interface polling on failure",
                            "    - smb: improve directory cache reuse for readdir operations",
                            "    - scsi: storvsc: Increase the timeouts to storvsc_timeout",
                            "    - scsi: s390: zfcp: Ensure synchronous unit_add",
                            "    - udmabuf: use sgtable-based scatterlist wrappers",
                            "    - selftests/x86: Add a test to detect infinite SIGTRAP handler loop",
                            "    - selinux: fix selinux_xfrm_alloc_user() to set correct ctx_len",
                            "    - platform/x86/intel-uncore-freq: Fail module load when plat_info is NULL",
                            "    - Input: sparcspkr - avoid unannotated fall-through",
                            "    - wifi: rtw89: pci: use DBI function for 8852AE/8852BE/8851BE",
                            "    - arm64: Restrict pagetable teardown to avoid false warning",
                            "    - ALSA: usb-audio: Rename ALSA kcontrol PCM and PCM1 for the KTMicro sound",
                            "      card",
                            "    - ALSA: hda/intel: Add Thinkpad E15 to PM deny list",
                            "    - ALSA: hda/realtek: enable headset mic on Latitude 5420 Rugged",
                            "    - iio: accel: fxls8962af: Fix temperature calculation",
                            "    - net: Fix checksum update for ILA adj-transport",
                            "    - bpf: Fix L4 csum update on IPv6 in CHECKSUM_COMPLETE",
                            "    - erofs: remove unused trace event erofs_destroy_inode",
                            "    - smb: fix secondary channel creation issue with kerberos by populating",
                            "      hostname when adding channels",
                            "    - drm/msm/disp: Correct porch timing for SDM845",
                            "    - drm/msm/dsi/dsi_phy_10nm: Fix missing initial VCO rate",
                            "    - ionic: Prevent driver/fw getting out of sync on devcmd(s)",
                            "    - drm/nouveau/bl: increase buffer size to avoid truncate warning",
                            "    - drm/i915/pmu: Fix build error with GCOV and AutoFDO enabled",
                            "    - hwmon: (occ) Rework attribute registration for stack usage",
                            "    - hwmon: (occ) fix unaligned accesses",
                            "    - pldmfw: Select CRC32 when PLDMFW is selected",
                            "    - net: ice: Perform accurate aRFS flow match",
                            "    - ptp: fix breakage after ptp_vclock_in_use() rework",
                            "    - ptp: allow reading of currently dialed frequency to succeed on free-",
                            "      running clocks",
                            "    - tcp: fix tcp_packet_delayed() for tcp_is_non_sack_preventing_reopen()",
                            "      behavior",
                            "    - tcp: fix passive TFO socket having invalid NAPI ID",
                            "    - net: microchip: lan743x: Reduce PTP timeout on HW failure",
                            "    - EDAC/amd64: Correct number of UMCs for family 19h models 70h-7fh",
                            "    - dt-bindings: i2c: nvidia,tegra20-i2c: Specify the required properties",
                            "    - net: make for_each_netdev_dump() a little more bug-proof",
                            "    - serial: sh-sci: Increment the runtime usage counter for the earlycon",
                            "      device",
                            "    - ARM: dts: am335x-bone-common: Increase MDIO reset deassert time",
                            "    - ARM: dts: am335x-bone-common: Increase MDIO reset deassert delay to 50ms",
                            "    - smb: client: fix first command failure during re-negotiation",
                            "    - platform/loongarch: laptop: Add backlight power control support",
                            "    - s390/pci: Fix __pcilg_mio_inuser() inline assembly",
                            "    - perf: Fix cgroup state vs ERROR",
                            "    - perf/core: Fix WARN in perf_cgroup_switch()",
                            "    - scsi: elx: efct: Fix memory leak in efct_hw_parse_filter()",
                            "    - RISC-V: KVM: Fix the size parameter check in SBI SFENCE calls",
                            "    - RISC-V: KVM: Don't treat SBI HFENCE calls as NOPs",
                            "    - perf evsel: Missed close() when probing hybrid core PMUs",
                            "    - crypto: qat - add shutdown handler to qat_c3xxx",
                            "    - crypto: qat - add shutdown handler to qat_420xx",
                            "    - crypto: qat - add shutdown handler to qat_4xxx",
                            "    - crypto: qat - add shutdown handler to qat_c62x",
                            "    - crypto: qat - add shutdown handler to qat_dh895xcc",
                            "    - wifi: mt76: mt7925: fix host interrupt register initialization",
                            "    - wifi: rtw88: usb: Upload the firmware in bigger chunks",
                            "    - NFSD: unregister filesystem in case genl_register_family() fails",
                            "    - NFSD: Implement FATTR4_CLONE_BLKSIZE attribute",
                            "    - media: ov2740: Move pm-runtime cleanup on probe-errors to proper place",
                            "    - media: i2c: imx335: Fix frame size enumeration",
                            "    - soc: qcom: pmic_glink_altmode: fix spurious DP hotplug events",
                            "    - sysfb: Fix screen_info type check for VGA",
                            "    - ovl: Fix nested backing file paths",
                            "    - Drivers: hv: vmbus: Add utility function for querying ring size",
                            "    - uio_hv_generic: Query the ringbuffer size for device",
                            "    - uio_hv_generic: Align ring size to system page",
                            "    - PCI: dwc: ep: Correct PBA offset in .set_msix() callback",
                            "    - PCI: dw-rockchip: Remove PCIE_L0S_ENTRY check from",
                            "      rockchip_pcie_link_up()",
                            "    - accel/ivpu: Improve buffer object logging",
                            "    - accel/ivpu: Fix warning in ivpu_gem_bo_free()",
                            "    - tty: vt: make init parameter of consw::con_init() a bool",
                            "    - tty: vt: sanitize arguments of consw::con_clear()",
                            "    - tty: vt: make consw::con_switch() return a bool",
                            "    - dummycon: Trigger redraw when switching consoles with deferred takeover",
                            "    - ACPICA: Apply pack(1) to union aml_resource",
                            "    - ALSA: hda: cs35l41: Fix swapped l/r audio channels for Acer Helios",
                            "      laptops",
                            "    - pmdomain: core: Reset genpd->states to avoid freeing invalid data",
                            "    - power: supply: max17040: adjust thermal channel scaling",
                            "    - Bluetooth: btusb: Add new VID/PID 13d3/3584 for MT7922",
                            "    - Bluetooth: btusb: Add new VID/PID 13d3/3630 for MT7925",
                            "    - wifi: mt76: mt7925: introduce thermal protection",
                            "    - libbpf/btf: Fix string handling to support multi-split BTF",
                            "    - clk: qcom: gcc-x1e80100: Set FORCE MEM CORE for UFS clocks",
                            "    - iommu/amd: Allow matching ACPI HID devices without matching UIDs",
                            "    - tcp: remove zero TCP TS samples for autotuning",
                            "    - tcp: add receive queue awareness in tcp_rcv_space_adjust()",
                            "    - bpf: Pass the same orig_call value to trampoline functions",
                            "    - net: stmmac: generate software timestamp just before the doorbell",
                            "    - hid-asus: check ROG Ally MCU version and warn",
                            "    - wifi: iwlwifi: mvm: fix beacon CCK flag",
                            "    - scsi: smartpqi: Add new PCI IDs",
                            "    - Revert \"mac80211: Dynamically set CoDel parameters per station\"",
                            "    - bnxt_en: Remove unused field \"ref_count\" in struct bnxt_ulp",
                            "    - wifi: ath12k: using msdu end descriptor to check for rx multicast",
                            "      packets",
                            "    - isofs: fix Y2038 and Y2156 issues in Rock Ridge TF entry",
                            "    - ixgbe: Fix unreachable retry logic in combined and byte I2C write",
                            "      functions",
                            "    - RDMA/hns: initialize db in update_srq_db()",
                            "    - platform/x86/amd: pmf: Prevent amd_pmf_tee_deinit() from running twice",
                            "    - LoongArch: vDSO: Correctly use asm parameters in syscall wrappers",
                            "    - nvme: always punt polled uring_cmd end_io work to task_work",
                            "    - mm: close theoretical race where stale TLB entries could linger",
                            "    - x86/virt/tdx: Avoid indirect calls to TDX assembly functions",
                            "    - wifi: rtw89: phy: add dummy C2H event handler for report of TAS power",
                            "    - ALSA: hda/realtek - Add mute LED support for HP Victus 16-s1xxx and HP",
                            "      Victus 15-fa1xxx",
                            "    - ALSA: hda/realtek: Fix built-in mic on ASUS VivoBook X513EA",
                            "    - drm/amdgpu: read back register after written for VCN v4.0.5",
                            "    - Kunit to check the longest symbol length",
                            "    - x86/tools: Drop duplicate unlikely() definition in insn_decoder_test.c",
                            "    - ipv6: remove leftover ip6 cookie initializer",
                            "    - ipv6: replace ipcm6_init calls with ipcm6_init_sk",
                            "    - drm/ssd130x: fix ssd132x_clear_screen() columns",
                            "    - workqueue: Initialize wq_isolated_cpumask in workqueue_init_early()",
                            "    - mlxbf_gige: return EPROBE_DEFER if PHY IRQ is not available",
                            "    - gpio: pca953x: fix wrong error probe return value",
                            "    - bpftool: Fix cgroup command to only show cgroup bpf programs",
                            "    - Upstream stable to v6.6.95, v6.12.35",
                            "    - bpftool: Query only cgroup-related attach types",
                            "    - bpftool: Fix regression of \"bpftool cgroup tree\" EINVAL on older kernels",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38507",
                            "    - HID: nintendo: avoid bluetooth suspend/resume stalls",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38511",
                            "    - drm/xe/pf: Clear all LMTT pages on alloc",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38520",
                            "    - drm/amdkfd: Don't call mmput from MMU notifier callback",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38521",
                            "    - drm/imagination: Fix kernel crash when hard resetting the GPU",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38506",
                            "    - KVM: Allow CPU to reschedule while setting per-page memory attributes",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38104",
                            "    - drm/amdgpu: Replace Mutex with Spinlock for RLCG register access to",
                            "      avoid Priority Inversion in SRIOV",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38067",
                            "    - rseq: Fix segfault on registration when rseq_cs is non-zero",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-37984",
                            "    - crypto: ecdsa - Harden against integer overflows in DIV_ROUND_UP()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38437",
                            "    - ksmbd: fix potential use-after-free in oplock/lease break ack",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38510",
                            "    - kasan: remove kasan_find_vm_area() to prevent possible deadlock",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38503",
                            "    - btrfs: fix assertion when building free space tree",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38439",
                            "    - bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38542",
                            "    - net: appletalk: Fix device refcount leak in atrtr_create()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38441",
                            "    - netfilter: flowtable: account for Ethernet header in",
                            "      nf_flow_pppoe_proto()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38443",
                            "    - nbd: fix uaf in nbd_genl_connect() error path",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38444",
                            "    - raid10: cleanup memleak at raid10_make_request",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38445",
                            "    - md/raid1: Fix stack memory use after return in raid1_reshape",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38543",
                            "    - drm/tegra: nvdec: Fix dma_alloc_coherent error check",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38513",
                            "    - wifi: zd1211rw: Fix potential NULL pointer dereference in",
                            "      zd_mac_tx_to_dev()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38448",
                            "    - usb: gadget: u_serial: Fix race condition in TTY wakeup",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38515",
                            "    - drm/sched: Increment job count before swapping tail spsc queue",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38449",
                            "    - drm/gem: Acquire references on GEM handles for framebuffers",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38512",
                            "    - wifi: prevent A-MSDU attacks in mesh networks",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38516",
                            "    - pinctrl: qcom: msm: mark certain pins as invalid for interrupts",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38455",
                            "    - KVM: SVM: Reject SEV{-ES} intra host migration if vCPU creation is in-",
                            "      flight",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38456",
                            "    - ipmi:msghandler: Fix potential memory corruption in ipmi_create_user()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38514",
                            "    - rxrpc: Fix oops due to non-existence of prealloc backlog struct",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38544",
                            "    - rxrpc: Fix bug due to prealloc collision",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38457",
                            "    - net/sched: Abort __tc_modify_qdisc if parent class does not exist",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38458",
                            "    - atm: clip: Fix NULL pointer dereference in vcc_sendmsg()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38459",
                            "    - atm: clip: Fix infinite recursive call of clip_push().",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38546",
                            "    - atm: clip: Fix memory leak of struct clip_vcc.",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38460",
                            "    - atm: clip: Fix potential null-ptr-deref in to_atmarpd().",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38461",
                            "    - vsock: Fix transport_* TOCTOU",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38462",
                            "    - vsock: Fix transport_{g2h,h2g} TOCTOU",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38463",
                            "    - tcp: Correct signedness in skb remaining space calculation",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38464",
                            "    - tipc: Fix use-after-free in tipc_conn_close().",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38465",
                            "    - netlink: Fix wraparounds of sk->sk_rmem_alloc.",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38466",
                            "    - perf: Revert to requiring CAP_SYS_ADMIN for uprobes",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38467",
                            "    - drm/exynos: exynos7_drm_decon: add vblank check in IRQ handling",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-12 (LP: #2135261) //",
                            "    CVE-2025-38349",
                            "    - eventpoll: don't decrement ep refcount while still holding the ep mutex",
                            "",
                            "  * [UBUNTU 24.04] KVM: s390: improve interrupt cpu for wakeup (LP: #2132317)",
                            "    - KVM: s390: improve interrupt cpu for wakeup",
                            "",
                            "  * veth.sh from ubuntu_kselftests_net failed on J-5.15 / N-6.8 (with xdp",
                            "    attached - gro flag) (LP: #2065369)",
                            "    - selftests: net: veth: test the ability to independently manipulate GRO",
                            "      and XDP",
                            "",
                            "  * ftrace:test.d--event--subsystem-enable.tc fails on some instances",
                            "    (LP: #2071861)",
                            "    - selftests/tracing: Fix false failure of subsystem event test",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640)",
                            "    - rtc: pcf2127: add missing semicolon after statement",
                            "    - rtc: pcf2127: fix SPI command byte for PCF2131",
                            "    - rtc: cmos: use spin_lock_irqsave in cmos_interrupt",
                            "    - mmc: sdhci: Add a helper function for dump register in dynamic debug",
                            "      mode",
                            "    - mmc: core: sd: Apply BROKEN_SD_DISCARD quirk earlier",
                            "    - Bluetooth: hci_sync: revert some mesh modifications",
                            "    - Bluetooth: MGMT: set_mesh: update LE scan interval and window",
                            "    - Bluetooth: MGMT: mesh_send: check instances prior disabling advertising",
                            "    - mtk-sd: Fix a pagefault in dma_unmap_sg() for not prepared data",
                            "    - mtk-sd: reset host->mrq on prepare_data() error",
                            "    - arm64: dts: apple: t8103: Fix PCIe BCM4377 nodename",
                            "    - platform/mellanox: mlxbf-tmfifo: fix vring_desc.len assignment",
                            "    - scsi: qla2xxx: Fix DMA mapping test in qla24xx_get_port_database()",
                            "    - scsi: qla4xxx: Fix missing DMA mapping error in qla4xxx_alloc_pdu()",
                            "    - scsi: ufs: core: Fix spelling of a sysfs attribute name",
                            "    - RDMA/mlx5: Fix HW counters query for non-representor devices",
                            "    - RDMA/mlx5: Fix CC counters query for MPV",
                            "    - RDMA/mlx5: Fix vport loopback for MPV device",
                            "    - platform/mellanox: nvsw-sn2201: Fix bus number in adapter error message",
                            "    - Bluetooth: Prevent unintended pause by checking if advertising is active",
                            "    - btrfs: fix missing error handling when searching for inode refs during",
                            "      log replay",
                            "    - btrfs: rename err to ret in btrfs_rmdir()",
                            "    - btrfs: propagate last_unlink_trans earlier when doing a rmdir",
                            "    - btrfs: use btrfs_record_snapshot_destroy() during rmdir",
                            "    - ethernet: atl1: Add missing DMA mapping error checks and count errors",
                            "    - dpaa2-eth: fix xdp_rxq_info leak",
                            "    - drm/exynos: fimd: Guard display clock control with runtime PM calls",
                            "    - spi: spi-fsl-dspi: Clear completion counter before initiating transfer",
                            "    - drm/i915/selftests: Change mock_request() to return error pointers",
                            "    - platform/x86: make fw_attr_class constant",
                            "    - platform/x86: firmware_attributes_class: Move include",
                            "      linux/device/class.h",
                            "    - platform/x86: firmware_attributes_class: Simplify API",
                            "    - platform/x86: think-lmi: Directly use firmware_attributes_class",
                            "    - platform/x86: think-lmi: Fix class device unregistration",
                            "    - platform/x86: dell-sysman: Directly use firmware_attributes_class",
                            "    - platform/x86: dell-wmi-sysman: Fix class device unregistration",
                            "    - platform/mellanox: mlxreg-lc: Fix logic error in power state check",
                            "    - smb: client: fix warning when reconnecting channel",
                            "    - drm/i915/gsc: mei interrupt top half should be in irq disabled context",
                            "    - igc: disable L1.2 PCI-E link substate to avoid performance issue",
                            "    - lib: test_objagg: Set error message in check_expect_hints_stats()",
                            "    - amd-xgbe: align CL37 AN sequence as per databook",
                            "    - enic: fix incorrect MTU comparison in enic_change_mtu()",
                            "    - nui: Fix dma_mapping_error() check",
                            "    - amd-xgbe: do not double read link status",
                            "    - smb: client: fix race condition in negotiate timeout by using more",
                            "      precise timing",
                            "    - wifi: mac80211: chan: chandef is non-NULL for reserved",
                            "    - f2fs: prevent writing without fallocate() for pinned files",
                            "    - f2fs: convert f2fs_vm_page_mkwrite() to use folio",
                            "    - f2fs: fix to zero post-eof page",
                            "    - drm/simpledrm: Do not upcast in release helpers",
                            "    - ALSA: sb: Don't allow changing the DMA mode during operations",
                            "    - ALSA: sb: Force to disable DMAs once when DMA mode is changed",
                            "    - ata: libata-acpi: Do not assume 40 wire cable if no devices are enabled",
                            "    - ata: pata_cs5536: fix build on 32-bit UML",
                            "    - ASoC: amd: yc: Add quirk for MSI Bravo 17 D7VF internal mic",
                            "    - platform/x86/amd/pmc: Add PCSpecialist Lafite Pro V 14M to 8042 quirks",
                            "      list",
                            "    - powerpc: Fix struct termio related ioctl macros",
                            "    - ASoC: amd: yc: update quirk data for HP Victus",
                            "    - regulator: fan53555: add enable_time support and soft-start times",
                            "    - aoe: defer rexmit timer downdev work to workqueue",
                            "    - wifi: mac80211: drop invalid source address OCB frames",
                            "    - rcu: Return early if callback is not specified",
                            "    - platform/x86: hp-bioscfg: Directly use firmware_attributes_class",
                            "    - platform/x86: hp-bioscfg: Fix class device unregistration",
                            "    - module: Provide EXPORT_SYMBOL_GPL_FOR_MODULES() helper",
                            "    - NFSv4/flexfiles: Fix handling of NFS level errors in I/O",
                            "    - usb: xhci: quirk for data loss in ISOC transfers",
                            "    - xhci: dbctty: disable ECHO flag by default",
                            "    - xhci: dbc: Flush queued requests before stopping dbc",
                            "    - xhci: Disable stream for xHC controller with XHCI_BROKEN_STREAMS",
                            "    - Input: xpad - support Acer NGR 200 Controller",
                            "    - Input: iqs7222 - explicitly define number of external channels",
                            "    - usb: cdnsp: do not disable slot for disabled slot",
                            "    - dma-buf: fix timeout handling in dma_resv_wait_timeout v2",
                            "    - i2c/designware: Fix an initialization issue",
                            "    - Logitech C-270 even more broken",
                            "    - iommu/rockchip: prevent iommus dead loop when two masters share one",
                            "      IOMMU",
                            "    - powercap: intel_rapl: Do not change CLAMPING bit if ENABLE bit cannot be",
                            "      changed",
                            "    - platform/x86: think-lmi: Create ksets consecutively",
                            "    - platform/x86: think-lmi: Fix kobject cleanup",
                            "    - platform/x86: think-lmi: Fix sysfs group cleanup",
                            "    - usb: typec: displayport: Fix potential deadlock",
                            "    - powerpc/kernel: Fix ppc_save_regs inclusion in build",
                            "    - [Config] enable Transient Scheduler Attacks mitigation",
                            "    - x86/CPU/AMD: Properly check the TSA microcode",
                            "    - x86/bugs: Fix use of possibly uninit value in amd_check_tsa_microcode()",
                            "    - net: txgbe: request MISC IRQ in ndo_open",
                            "    - Bluetooth: HCI: Set extended advertising data synchronously",
                            "    - iommufd/selftest: Fix iommufd_dirty_tracking with large hugepage sizes",
                            "    - firmware: arm_ffa: Move memory allocation outside the mutex locking",
                            "    - platform/mellanox: mlxbf-pmc: Fix duplicate event ID for CACHE_DATA1",
                            "    - btrfs: return a btrfs_inode from btrfs_iget_logging()",
                            "    - btrfs: return a btrfs_inode from read_one_inode()",
                            "    - btrfs: fix invalid inode pointer dereferences during log replay",
                            "    - btrfs: fix inode lookup error handling during log replay",
                            "    - nvme: Fix incorrect cdw15 value in passthru error logging",
                            "    - drm/bridge: aux-hpd-bridge: fix assignment of the of_node",
                            "    - netfs: Fix i_size updating",
                            "    - arm64: dts: rockchip: fix internal USB hub instability on RK3399 Puma",
                            "    - crypto: iaa - Remove dst_null support",
                            "    - crypto: iaa - Do not clobber req->base.data",
                            "    - spinlock: extend guard with spinlock_bh variants",
                            "    - crypto: zynqmp-sha - Add locking",
                            "    - kunit: qemu_configs: sparc: use Zilog console",
                            "    - kunit: qemu_configs: sparc: Explicitly enable CONFIG_SPARC32=y",
                            "    - kunit: qemu_configs: Disable faulting tests on 32-bit SPARC",
                            "    - gfs2: Initialize gl_no_formal_ino earlier",
                            "    - gfs2: Rename GIF_{DEFERRED -> DEFER}_DELETE",
                            "    - gfs2: Rename dinode_demise to evict_behavior",
                            "    - gfs2: Prevent inode creation race",
                            "    - gfs2: Rename GLF_FREEING to GLF_UNLOCKED",
                            "    - gfs2: Decode missing glock flags in tracepoints",
                            "    - gfs2: Add GLF_PENDING_REPLY flag",
                            "    - gfs2: Replace GIF_DEFER_DELETE with GLF_DEFER_DELETE",
                            "    - gfs2: Move gfs2_dinode_dealloc",
                            "    - gfs2: Move GIF_ALLOC_FAILED check out of gfs2_ea_dealloc",
                            "    - gfs2: deallocate inodes in gfs2_create_inode",
                            "    - btrfs: fix wrong start offset for delalloc space release during mmap",
                            "      write",
                            "    - ASoC: tas2764: Extend driver to SN012776",
                            "    - ASoC: tas2764: Reinit cache on part reset",
                            "    - ACPI: thermal: Fix stale comment regarding trip points",
                            "    - ACPI: thermal: Execute _SCP before reading trip points",
                            "    - bonding: Mark active offloaded xfrm_states",
                            "    - wifi: ath12k: Handle error cases during extended skb allocation",
                            "    - wifi: ath12k: fix wrong handling of CCMP256 and GCMP ciphers",
                            "    - RDMA/rxe: Fix \"trying to register non-static key in rxe_qp_do_cleanup\"",
                            "      bug",
                            "    - iommu: ipmmu-vmsa: avoid Wformat-security warning",
                            "    - f2fs: decrease spare area for pinned files for zoned devices",
                            "    - f2fs: zone: introduce first_zoned_segno in f2fs_sb_info",
                            "    - f2fs: introduce SEGS_TO_BLKS/BLKS_TO_SEGS for cleanup",
                            "    - f2fs: zone: fix to calculate first_zoned_segno correctly",
                            "    - scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure",
                            "    - scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask",
                            "    - hisi_acc_vfio_pci: bugfix cache write-back issue",
                            "    - hisi_acc_vfio_pci: bugfix the problem of uninstalling driver",
                            "    - bpf: use common instruction history across all states",
                            "    - arm64: dts: qcom: sm8650: change labels to lower-case",
                            "    - arm64: dts: qcom: sm8650: Fix domain-idle-state for CPU2",
                            "    - arm64: dts: qcom: sm8650: add the missing l2 cache node",
                            "    - remoteproc: k3: Call of_node_put(rmem_np) only once in three functions",
                            "    - remoteproc: k3-r5: Add devm action to release reserved memory",
                            "    - remoteproc: k3-r5: Use devm_kcalloc() helper",
                            "    - remoteproc: k3-r5: Use devm_ioremap_wc() helper",
                            "    - remoteproc: k3-r5: Use devm_rproc_alloc() helper",
                            "    - remoteproc: k3-r5: Use devm_rproc_add() helper",
                            "    - remoteproc: k3-r5: Refactor sequential core power up/down operations",
                            "    - mfd: exynos-lpass: Fix another error handling path in",
                            "      exynos_lpass_probe()",
                            "    - selinux: change security_compute_sid to return the ssid or tsid on match",
                            "    - drm/amdgpu: VCN v5_0_1 to prevent FW checking RB during DPG pause",
                            "    - drm/xe/bmg: Add BMG platform definition",
                            "    - drm/i915/bmg: Define IS_BATTLEMAGE macro",
                            "    - drm/i915/dp_mst: Work around Thunderbolt sink disconnect after",
                            "      SINK_COUNT_ESI read",
                            "    - arm64: dts: qcom: x1e80100-crd: mark l12b and l15b always-on",
                            "    - scsi: lpfc: Restore clearing of NLP_UNREG_INP in ndlp->nlp_flag",
                            "    - RDMA/mlx5: Fix cache entry update on dereg error",
                            "    - drm/xe: Allow dropping kunit dependency as built-in",
                            "    - usb: xhci: Skip xhci_reset in xhci_resume if xhci is being removed",
                            "    - Revert \"usb: xhci: Implement xhci_handshake_check_state() helper\"",
                            "    - usb: cdnsp: Fix issue with CV Bad Descriptor test",
                            "    - usb: dwc3: Abort suspend on soft disconnect failure",
                            "    - Upstream stable to v6.6.97, v6.12.37",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38407",
                            "    - riscv: cpu_ops_sbi: Use static array for boot_data",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38374",
                            "    - optee: ffa: fix sleep in atomic context",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38373",
                            "    - IB/mlx5: Fix potential deadlock in MR deregistration",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38408",
                            "    - genirq/irq_sim: Initialize work context pointers properly",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38279",
                            "    - bpf: Do not include stack ptr register in precision backtracking",
                            "      bookkeeping",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38289",
                            "    - scsi: lpfc: Avoid potential ndlp use-after-free in dev_loss_tmo_callbk",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38392",
                            "    - idpf: convert control queue mutex to a spinlock",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38402",
                            "    - idpf: return 0 size for RSS key if not supported",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38405",
                            "    - nvmet: fix memory leak of bio integrity",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38388",
                            "    - firmware: arm_ffa: Replace mutex with rwlock to avoid sleep in atomic",
                            "      context",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38390",
                            "    - firmware: arm_ffa: Fix memory leak by freeing notifier callback node",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2024-36350 // CVE-2024-36357",
                            "    - x86/bugs: Rename MDS machinery to something more generic",
                            "    - x86/bugs: Add a Transient Scheduler Attacks mitigation",
                            "    - KVM: SVM: Advertise TSA CPUID bits to guests",
                            "    - x86/microcode/AMD: Add TSA microcode SHAs",
                            "    - x86/process: Move the buffer clearing before MONITOR",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38376",
                            "    - usb: chipidea: udc: disconnect/reconnect from host when do",
                            "      suspend/resume",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38396",
                            "    - fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38371",
                            "    - drm/v3d: Disable interrupts before resetting the GPU",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38384",
                            "    - mtd: spinand: fix memory leak of ECC engine conf",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38386",
                            "    - ACPICA: Refuse to evaluate a method if arguments are missing",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38406",
                            "    - wifi: ath6kl: remove WARN on bad firmware input",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38399",
                            "    - scsi: target: Fix NULL pointer dereference in",
                            "      core_scsi3_decode_spec_i_port()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38409",
                            "    - drm/msm: Fix another leak in the submit error path",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38410",
                            "    - drm/msm: Fix a fence leak in submit error path",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38377",
                            "    - rose: fix dangling neighbour pointers in rose_rt_device_down()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38389",
                            "    - drm/i915/gt: Fix timeline left held on VMA alloc error",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38385",
                            "    - net: usb: lan78xx: fix WARN in __netif_napi_del_locked on disconnect",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38412",
                            "    - platform/x86: dell-wmi-sysman: Fix WMI data block retrieval in sysfs",
                            "      callbacks",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38382",
                            "    - btrfs: fix iteration of extrefs during log replay",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38393",
                            "    - NFSv4/pNFS: Fix a race to wake on NFS_LAYOUT_DRAIN",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38400",
                            "    - nfs: Clean up /proc/net/rpc/nfs when nfs_fs_proc_net_init() fails.",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38387",
                            "    - RDMA/mlx5: Initialize obj_event->obj_sub_list before xa_insert",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38401",
                            "    - mtk-sd: Prevent memory corruption from DMA map failure",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38391",
                            "    - usb: typec: altmodes/displayport: do not index invalid pin_assignments",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38395",
                            "    - regulator: gpio: Fix the out-of-bounds access to drvdata::gpiods",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38403",
                            "    - vsock/vmci: Clear the vmci transport packet properly when initializing",
                            "      it",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-11 (LP: #2134640) //",
                            "    CVE-2025-38375",
                            "    - virtio-net: ensure the received length does not exceed allocated size",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499)",
                            "    - cifs: Correctly set SMB1 SessionKey field in Session Setup Request",
                            "    - cifs: Fix cifs_query_path_info() for Windows NT servers",
                            "    - cifs: Fix encoding of SMB1 Session Setup NTLMSSP Request in non-UNICODE",
                            "      mode",
                            "    - NFSv4: Always set NLINK even if the server doesn't support it",
                            "    - NFSv4.2: fix listxattr to return selinux security label",
                            "    - mailbox: Not protect module_put with spin_lock_irqsave",
                            "    - mfd: max14577: Fix wakeup source leaks on device unbind",
                            "    - sunrpc: don't immediately retransmit on seqno miss",
                            "    - leds: multicolor: Fix intensity setting while SW blinking",
                            "    - fuse: fix race between concurrent setattrs from multiple nodes",
                            "    - cxl/region: Add a dev_err() on missing target list entries",
                            "    - NFSv4: xattr handlers should check for absent nfs filehandles",
                            "    - hwmon: (pmbus/max34440) Fix support for max34451",
                            "    - ksmbd: allow a filename to contain special characters on SMB3.1.1 posix",
                            "      extension",
                            "    - ksmbd: provide zero as a unique ID to the Mac client",
                            "    - rust: module: place cleanup_module() in .exit.text section",
                            "    - dmaengine: xilinx_dma: Set dma_device directions",
                            "    - PCI: dwc: Make link training more robust by setting",
                            "      PORT_LOGIC_LINK_WIDTH to one lane",
                            "    - PCI: apple: Fix missing OF node reference in apple_pcie_setup_port",
                            "    - md/md-bitmap: fix dm-raid max_write_behind setting",
                            "    - amd/amdkfd: fix a kfd_process ref leak",
                            "    - iio: pressure: zpa2326: Use aligned_s64 for the timestamp",
                            "    - um: Add cmpxchg8b_emu and checksum functions to asm-prototypes.h",
                            "    - um: use proper care when taking mmap lock during segfault",
                            "    - coresight: Only check bottom two claim bits",
                            "    - usb: dwc2: also exit clock_gating when stopping udc while suspended",
                            "    - iio: adc: ad_sigma_delta: Fix use of uninitialized status_pos",
                            "    - usb: potential integer overflow in usbg_make_tpg()",
                            "    - usb: common: usb-conn-gpio: use a unique name for usb connector device",
                            "    - usb: Add checks for snprintf() calls in usb_alloc_dev()",
                            "    - usb: cdc-wdm: avoid setting WDM_READ for ZLP-s",
                            "    - usb: typec: displayport: Receive DP Status Update NAK request exit dp",
                            "      altmode",
                            "    - usb: typec: mux: do not return on EOPNOTSUPP in {mux, switch}_set",
                            "    - ALSA: hda: Ignore unsol events for cards being shut down",
                            "    - ALSA: hda: Add new pci id for AMD GPU display HD audio controller",
                            "    - ALSA: usb-audio: Add a quirk for Lenovo Thinkpad Thunderbolt 3 dock",
                            "    - ceph: fix possible integer overflow in ceph_zero_objects()",
                            "    - scsi: ufs: core: Don't perform UFS clkscaling during host async scan",
                            "    - ovl: Check for NULL d_inode() in ovl_dentry_upper()",
                            "    - fs/jfs: consolidate sanity checking in dbMount",
                            "    - ASoC: codecs: wcd9335: Handle nicer probe deferral and simplify with",
                            "      dev_err_probe()",
                            "    - ASoC: codec: wcd9335: Convert to GPIO descriptors",
                            "    - f2fs: don't over-report free space or inodes in statvfs",
                            "    - PCI: apple: Use helper function for_each_child_of_node_scoped()",
                            "    - PCI: apple: Set only available ports up",
                            "    - platform/x86: ideapad-laptop: move ACPI helpers from header to source",
                            "      file",
                            "    - platform/x86: ideapad-laptop: use usleep_range() for EC polling",
                            "    - i2c: tiny-usb: disable zero-length read messages",
                            "    - i2c: robotfuzz-osif: disable zero-length read messages",
                            "    - ASoC: amd: yc: Add DMI quirk for Lenovo IdeaPad Slim 5 15",
                            "    - attach_recursive_mnt(): do not lock the covering tree when sliding",
                            "      something under it",
                            "    - libbpf: Fix null pointer dereference in btf_dump__free on allocation",
                            "      failure",
                            "    - wifi: mac80211: fix beacon interval calculation overflow",
                            "    - af_unix: Don't set -ECONNRESET for consumed OOB skb.",
                            "    - vsock/uapi: fix linux/vm_sockets.h userspace compilation errors",
                            "    - um: ubd: Add missing error check in start_io_thread()",
                            "    - libbpf: Fix possible use-after-free for externs",
                            "    - net: enetc: Correct endianness handling in _enetc_rd_reg64",
                            "    - ALSA: hda/realtek: Fix built-in mic on ASUS VivoBook X507UAR",
                            "    - net: selftests: fix TCP packet checksum",
                            "    - drm/i915: fix build error some more",
                            "    - drm/bridge: ti-sn65dsi86: make use of debugfs_init callback",
                            "    - drm/bridge: ti-sn65dsi86: Add HPD for DisplayPort connector type",
                            "    - EDAC/amd64: Fix size calculation for Non-Power-of-Two DIMMs",
                            "    - staging: rtl8723bs: Avoid memset() in aes_cipher() and aes_decipher()",
                            "    - dt-bindings: serial: 8250: Make clocks and clock-frequency exclusive",
                            "    - serial: imx: Restore original RXTL for console to fix data loss",
                            "    - Bluetooth: L2CAP: Fix L2CAP MTU negotiation",
                            "    - dm-raid: fix variable in journal device check",
                            "    - btrfs: update superblock's device bytes_used when dropping chunk",
                            "    - net: libwx: fix the creation of page_pool",
                            "    - HID: lenovo: Restrict F7/9/11 mode to compact keyboards only",
                            "    - HID: wacom: fix memory leak on kobject creation failure",
                            "    - HID: wacom: fix memory leak on sysfs attribute creation failure",
                            "    - HID: wacom: fix kobject reference count leak",
                            "    - drm/ast: Fix comment on modeset lock",
                            "    - drm/cirrus-qemu: Fix pitch programming",
                            "    - drm/etnaviv: Protect the scheduler's pending list with its lock",
                            "    - drm/tegra: Assign plane type before registration",
                            "    - drm/udl: Unregister device before cleaning up on disconnect",
                            "    - drm/amdkfd: Fix race in GWS queue scheduling",
                            "    - drm/bridge: cdns-dsi: Fix the clock variable for mode_valid()",
                            "    - drm/bridge: cdns-dsi: Fix phy de-init and flag it so",
                            "    - drm/bridge: cdns-dsi: Fix connecting to next bridge",
                            "    - drm/bridge: cdns-dsi: Check return value when getting default PHY config",
                            "    - drm/bridge: cdns-dsi: Wait for Clk and Data Lanes to be ready",
                            "    - drm/amdgpu: amdgpu_vram_mgr_new(): Clamp lpfn to total vram",
                            "    - drm/amdgpu: Add kicker device detection",
                            "    - drm/amdgpu: switch job hw_fence to amdgpu_fence",
                            "    - ksmbd: Use unsafe_memcpy() for ntlm_negotiate",
                            "    - ksmbd: remove unsafe_memcpy use in session setup",
                            "    - media: uvcvideo: Rollback non processed entities on error",
                            "    - firmware: arm_scmi: Add a common helper to check if a message is",
                            "      supported",
                            "    - firmware: arm_scmi: Ensure that the message-id supports fastchannel",
                            "    - ARM: 9354/1: ptrace: Use bitfield helpers",
                            "    - nvme-tcp: fix I/O stalls on congested sockets",
                            "    - drm/amdgpu: seq64 memory unmap uses uninterruptible lock",
                            "    - 8250: microchip: pci1xxxx: Add PCIe Hot reset disable support for Rev C0",
                            "      and later devices",
                            "    - usb: gadget: f_hid: wake up readers on disable/unbind",
                            "    - drm/i915/gem: Allow EXEC_CAPTURE on recoverable contexts on DG1",
                            "    - Revert \"drm/i915/gem: Allow EXEC_CAPTURE on recoverable contexts on DG1\"",
                            "    - btrfs: fix qgroup reservation leak on failure to allocate ordered extent",
                            "    - smb: client: remove \\t from TP_printk statements",
                            "    - fs/proc/task_mmu: fix PAGE_IS_PFNZERO detection for the huge zero folio",
                            "    - drm/xe/display: Add check for alloc_ordered_workqueue()",
                            "    - ethernet: ionic: Fix DMA mapping tests",
                            "    - wifi: mac80211: Add link iteration macro for link data",
                            "    - wifi: mac80211: Create separate links for VLAN interfaces",
                            "    - wifi: mac80211: finish link init before RCU publish",
                            "    - netlink: specs: tc: replace underscores with dashes in names",
                            "    - drm/amdgpu/discovery: optionally use fw based ip discovery",
                            "    - drm/amd: Adjust output for discovery error handling",
                            "    - x86/traps: Initialize DR6 by writing its architectural reset value",
                            "    - serial: core: restore of_node information in sysfs",
                            "    - spi: spi-cadence-quadspi: Fix pm runtime unbalance",
                            "    - mm/gup: revert \"mm: gup: fix infinite loop within __get_longterm_locked\"",
                            "    - scsi: ufs: core: Fix clk scaling to be conditional in reset and restore",
                            "    - drm/amd/display: Correct non-OLED pre_T11_delay.",
                            "    - drm/xe/vm: move rebind_work init earlier",
                            "    - drm/xe/sched: stop re-submitting signalled jobs",
                            "    - drm/xe: Fix memset on iomem",
                            "    - drm/i915/dsi: Fix off by one in BXT_MIPI_TRANS_VTOTAL",
                            "    - drm/amdgpu: Fix SDMA UTC_L1 handling during start/stop sequences",
                            "    - drm/amd/display: Fix mpv playback corruption on weston",
                            "    - x86/fpu: Refactor xfeature bitmask update code for sigframe XSAVE",
                            "    - io_uring: fix potential page leak in io_sqe_buffer_register()",
                            "    - iio: dac: ad3552r: changes to use FIELD_PREP",
                            "    - drm/xe: Carve out wopcm portion from the stolen memory",
                            "    - usb: typec: tcpm: PSSourceOffTimer timeout in PR_Swap enters",
                            "      ERROR_RECOVERY",
                            "    - drm/msm/dp: account for widebus and yuv420 during mode validation",
                            "    - arm64: dts: rockchip: Add avdd HDMI supplies to RockPro64 board dtsi",
                            "    - ALSA: hda/realtek: Bass speaker fixup for ASUS UM5606KA",
                            "    - spi: fsl-qspi: Fix double cleanup in probe error path",
                            "    - Upstream stable to v6.6.96, v6.12.36",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-37842",
                            "    - spi: fsl-qspi: use devm function instead of driver remove",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-23155",
                            "    - net: stmmac: Fix accessing freed irq affinity_hint",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-22101",
                            "    - net: libwx: fix Tx L4 checksum",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38361",
                            "    - drm/amd/display: Check dce_hwseq before dereferencing it",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38364",
                            "    - maple_tree: fix MA_STATE_PREALLOC flag in mas_preallocate()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38246",
                            "    - bnxt: properly flush XDP redirect lists",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38250",
                            "    - Bluetooth: hci_core: Fix use-after-free in vhci_flush()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38253",
                            "    - HID: wacom: fix crash in wacom_aes_battery_handler()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38264",
                            "    - nvme-tcp: sanitize request list handling",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38362",
                            "    - drm/amd/display: Add null pointer check for get_first_active_display()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38354",
                            "    - drm/msm/gpu: Fix crash when throttling GPU immediately during boot",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38363",
                            "    - drm/tegra: Fix a possible null pointer dereference",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38239",
                            "    - scsi: megaraid_sas: Fix invalid node index",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38365",
                            "    - btrfs: fix a race between renames and directory logging",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38244",
                            "    - smb: client: fix potential deadlock when reconnecting channels",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38245",
                            "    - atm: Release atm_dev_mutex after removing procfs in",
                            "      atm_dev_deregister().",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38249",
                            "    - ALSA: usb-audio: Fix out-of-bounds read in",
                            "      snd_usb_get_audioformat_uac3()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38251",
                            "    - atm: clip: prevent NULL deref in clip_push()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38255",
                            "    - lib/group_cpus: fix NULL pointer dereference from group_cpus_evenly()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38257",
                            "    - s390/pkey: Prevent overflow in size calculation for memdup_user()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38258",
                            "    - mm/damon/sysfs-schemes: free old damon_sysfs_scheme_filter->memcg_path",
                            "      on write",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38259",
                            "    - ASoC: codecs: wcd9335: Fix missing free of regulator supplies",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38230",
                            "    - jfs: validate AG parameters in dbMount() to prevent crashes",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38260",
                            "    - btrfs: handle csum tree error with rescue=ibadroots correctly",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38262",
                            "    - tty: serial: uartlite: register uart driver in init",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38368",
                            "    - misc: tps6594-pfsm: Add NULL pointer check in tps6594_pfsm_probe()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38436",
                            "    - drm/scheduler: signal scheduled fence when kill job",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38263",
                            "    - bcache: fix NULL pointer in cache_set_flush()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-09 (LP: #2134499) //",
                            "    CVE-2025-38369",
                            "    - dmaengine: idxd: Check availability of workqueue allocated by idxd wq",
                            "      driver before using",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-22128",
                            "    - wifi: ath12k: Clear affinity hint before calling ath12k_pci_free_irq()",
                            "      in error path",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38333",
                            "    - f2fs: fix to bail out in get_new_segment()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38210",
                            "    - configfs-tsm-report: Fix NULL dereference of tsm_ops",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38232",
                            "    - NFSD: fix race between nfsd registration and exports_proc",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38320",
                            "    - arm64/ptrace: Fix stack-out-of-bounds read in",
                            "      regs_get_kernel_stack_nth()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38424",
                            "    - perf: Fix sample vs do_exit()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38321",
                            "    - smb: Log an error when close_all_cached_dirs fails",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38180",
                            "    - net: atm: fix /proc/net/atm/lec handling",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38323",
                            "    - net: atm: add lec_mutex",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38181",
                            "    - calipso: Fix null-ptr-deref in calipso_req_{set,del}attr().",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38182",
                            "    - ublk: santizize the arguments from userspace when adding a device",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38183",
                            "    - net: lan743x: fix potential out-of-bounds write in",
                            "      lan743x_ptp_io_event_clock_get()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38184",
                            "    - tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38185",
                            "    - atm: atmtcp: Free invalid length skb in atmtcp_c_send().",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38324",
                            "    - mpls: Use rcu_dereference_rtnl() in mpls_route_input_rcu().",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38420",
                            "    - wifi: carl9170: do not ping device which has failed to load firmware",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38326",
                            "    - aoe: clean device rq_list in aoedev_downdev()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38089",
                            "    - sunrpc: handle SVC_GARBAGE during svc auth processing as auth error",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38084",
                            "    - mm/hugetlb: unshare page tables during VMA split, not before",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38190",
                            "    - atm: Revert atm_account_tx() if copy_from_iter_full() fails.",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38191",
                            "    - ksmbd: fix null pointer dereference in destroy_previous_session",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38192",
                            "    - net: clear the dst when changing skb protocol",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38193",
                            "    - net_sched: sch_sfq: reject invalid perturb period",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38328",
                            "    - jffs2: check jffs2_prealloc_raw_node_refs() result in few other places",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38194",
                            "    - jffs2: check that raw node were preallocated before writing summary",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38090",
                            "    - drivers/rapidio/rio_cm.c: prevent possible heap overwrite",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38197",
                            "    - platform/x86: dell_rbu: Fix list usage",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38198",
                            "    - fbcon: Make sure modelist not set on unregistered console",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38331",
                            "    - net: ethernet: cortina: Use TOE/TSO on all TCP",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38200",
                            "    - i40e: fix MMIO write access to an invalid page in i40e_clear_hw",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38332",
                            "    - scsi: lpfc: Use memcpy() for BIOS version",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38342",
                            "    - software node: Correct a OOB check in software_node_get_reference_args()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38334",
                            "    - x86/sgx: Prevent attempts to reclaim poisoned pages",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38425",
                            "    - i2c: tegra: check msg length in SMBUS block read",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38343",
                            "    - wifi: mt76: mt7996: drop fragments with multicast or broadcast RA",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38202",
                            "    - bpf: Check rcu_read_lock_trace_held() in bpf_map_lookup_percpu_elem()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38422",
                            "    - net: lan743x: Modify the EEPROM and OTP size for PCI1xxxx devices",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38344",
                            "    - ACPICA: fix acpi parse and parseext cache leaks",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38345",
                            "    - ACPICA: fix acpi operand cache leak in dswstate.c",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38085",
                            "    - mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38208",
                            "    - smb: client: add NULL check in automount_fullpath",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38418",
                            "    - remoteproc: core: Release rproc->clean_table after rproc_attach() fails",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38419",
                            "    - remoteproc: core: Cleanup acquired resources when",
                            "      rproc_handle_resources() fails in rproc_attach()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38427",
                            "    - video: screen_info: Relocate framebuffers behind PCI bridges",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38086",
                            "    - net: ch9200: fix uninitialised access during mii_nway_restart",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38346",
                            "    - ftrace: Fix UAF when lookup kallsym after ftrace disabled",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38211",
                            "    - RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38212",
                            "    - ipc: fix to protect IPCS lookups using RCU",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38214",
                            "    - fbdev: Fix fb_set_var to prevent null-ptr-deref in fb_videomode_to_var",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38215",
                            "    - fbdev: Fix do_register_framebuffer to prevent null-ptr-deref in",
                            "      fb_videomode_to_var",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38087",
                            "    - net/sched: fix use-after-free in taprio_dev_notifier",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38416",
                            "    - NFC: nci: uart: Set tty->disc_data only in success path",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38217",
                            "    - hwmon: (ftsteutates) Fix TOCTOU race in fts_read()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38218",
                            "    - f2fs: fix to do sanity check on sit_bitmap_size",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38219",
                            "    - f2fs: prevent kernel warning due to negative i_nlink from corrupted",
                            "      image",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38347",
                            "    - f2fs: fix to do sanity check on ino and xnid",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38428",
                            "    - Input: ims-pcu - check record size in ims_pcu_flash_firmware()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38220",
                            "    - ext4: only dirty folios when data journaling regular files",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38222",
                            "    - ext4: inline: fix len overflow in ext4_prepare_inline_data",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38336",
                            "    - ata: pata_via: Force PIO for ATAPI devices on VT6415/VT6330",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38429",
                            "    - bus: mhi: ep: Update read pointer only after buffer is written",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38225",
                            "    - media: imx-jpeg: Cleanup after an allocation error",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38226",
                            "    - media: vivid: Change the siize of the composing",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38229",
                            "    - media: cxusb: no longer judge rbuf when the write fails",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38337",
                            "    - jbd2: fix data-race and null-ptr-deref in jbd2_journal_dirty_metadata()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38338",
                            "    - fs/nfs/read: fix double-unlock bug in nfs_return_empty_folio()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38231",
                            "    - nfsd: Initialize ssc before laundromat_work to prevent NULL dereference",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38430",
                            "    - nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-08 (LP: #2134382) //",
                            "    CVE-2025-38348",
                            "    - wifi: p54: prevent buffer-overflow in p54_rx_eeprom_readback()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786)",
                            "    - tracing: Fix compilation warning on arm32",
                            "    - pinctrl: armada-37xx: use correct OUTPUT_VAL register for GPIOs > 31",
                            "    - pinctrl: armada-37xx: set GPIO output value before setting direction",
                            "    - acpi-cpufreq: Fix nominal_freq units to KHz in get_max_boost_ratio()",
                            "    - rtc: Make rtc_time64_to_tm() support dates before 1970",
                            "    - rtc: Fix offset calculation for .start_secs < 0",
                            "    - usb: quirks: Add NO_LPM quirk for SanDisk Extreme 55AE",
                            "    - usb: storage: Ignore UAS driver for SanDisk 3.2 Gen2 storage device",
                            "    - USB: serial: pl2303: add new chip PL2303GC-Q20 and PL2303GT-2AB",
                            "    - usb: typec: ucsi: fix Clang -Wsign-conversion warning",
                            "    - Bluetooth: hci_qca: move the SoC type check to the right place",
                            "    - usb: usbtmc: Fix timeout value in get_stb",
                            "    - dt-bindings: usb: cypress,hx3: Add support for all variants",
                            "    - dt-bindings: phy: imx8mq-usb: fix fsl,phy-tx-vboost-level-microvolt",
                            "      property",
                            "    - tools/x86/kcpuid: Fix error handling",
                            "    - x86/idle: Remove MFENCEs for X86_BUG_CLFLUSH_MONITOR in",
                            "      mwait_idle_with_hints() and prefer_mwait_c1_over_halt()",
                            "    - crypto: sun8i-ce-hash - fix error handling in sun8i_ce_hash_run()",
                            "    - gfs2: gfs2_create_inode error handling fix",
                            "    - perf/core: Fix broken throttling when max_samples_per_tick=1",
                            "    - crypto: sun8i-ss - do not use sg_dma_len before calling DMA functions",
                            "    - powerpc: do not build ppc_save_regs.o always",
                            "    - powerpc/crash: Fix non-smp kexec preparation",
                            "    - x86/microcode/AMD: Do not return error when microcode update is not",
                            "      necessary",
                            "    - x86/cpu: Sanitize CPUID(0x80000000) output",
                            "    - crypto: marvell/cesa - Avoid empty transfer descriptor",
                            "    - btrfs: scrub: update device stats when an error is detected",
                            "    - btrfs: scrub: fix a wrong error type when metadata bytenr mismatches",
                            "    - rcu/cpu_stall_cputime: fix the hardirq count for x86 architecture",
                            "    - crypto: lrw - Only add ecb if it is not already there",
                            "    - crypto: xts - Only add ecb if it is not already there",
                            "    - crypto: sun8i-ce - move fallback ahash_request to the end of the struct",
                            "    - kunit: Fix wrong parameter to kunit_deactivate_static_stub()",
                            "    - ACPICA: exserial: don't forget to handle FFixedHW opregions for reading",
                            "    - ASoC: tas2764: Enable main IRQs",
                            "    - EDAC/{skx_common,i10nm}: Fix the loss of saved RRL for HBM pseudo",
                            "      channel 0",
                            "    - spi: tegra210-quad: Fix X1_X2_X4 encoding and support x4 transfers",
                            "    - spi: tegra210-quad: remove redundant error handling code",
                            "    - spi: tegra210-quad: modify chip select (CS) deactivation",
                            "    - power: reset: at91-reset: Optimize at91_reset()",
                            "    - ASoC: SOF: ipc4-pcm: Adjust pipeline_list->pipelines allocation type",
                            "    - PM: wakeup: Delete space in the end of string shown by",
                            "      pm_show_wakelocks()",
                            "    - x86/mtrr: Check if fixed-range MTRRs exist in mtrr_save_fixed_ranges()",
                            "    - PM: sleep: Print PM debug messages during hibernation",
                            "    - ACPI: OSI: Stop advertising support for \"3.0 _SCP Extensions\"",
                            "    - spi: sh-msiof: Fix maximum DMA transfer size",
                            "    - ASoC: apple: mca: Constrain channels according to TDM mask",
                            "    - drm/vmwgfx: Add seqno waiter for sync_files",
                            "    - drm/vc4: tests: Use return instead of assert",
                            "    - media: rkvdec: Fix frame size enumeration",
                            "    - arm64/fpsimd: Avoid RES0 bits in the SME trap handler",
                            "    - arm64/fpsimd: Fix merging of FPSIMD state during signal return",
                            "    - drm/bridge: lt9611uxc: Fix an error handling path in lt9611uxc_probe()",
                            "    - watchdog: exar: Shorten identity name to fit correctly",
                            "    - m68k: mac: Fix macintosh_config for Mac II",
                            "    - firmware: psci: Fix refcount leak in psci_dt_init",
                            "    - arm64: Support ARM64_VA_BITS=52 when setting ARCH_MMAP_RND_BITS_MAX",
                            "    - selftests/seccomp: fix syscall_restart test for arm compat",
                            "    - drm: rcar-du: Fix memory leak in rcar_du_vsps_init()",
                            "    - drm/vkms: Adjust vkms_state->active_planes allocation type",
                            "    - drm/tegra: rgb: Fix the unbound reference count",
                            "    - firmware: SDEI: Allow sdei initialization without ACPI_APEI_GHES",
                            "    - arm64/fpsimd: Do not discard modified SVE state",
                            "    - scsi: qedf: Use designated initializer for struct qed_fcoe_cb_ops",
                            "    - drm/mediatek: mtk_drm_drv: Fix kobject put for mtk_mutex device ptr",
                            "    - drm/mediatek: Fix kobject put for component sub-drivers",
                            "    - drm/mediatek: mtk_drm_drv: Unbind secondary mmsys components on err",
                            "    - xen/x86: fix initial memory balloon target",
                            "    - IB/cm: use rwlock for MAD agent lock",
                            "    - selftests/bpf: Fix bpf_nf selftest failure",
                            "    - bpf, sockmap: fix duplicated data transmission",
                            "    - wifi: ath12k: Fix WMI tag for EHT rate in peer assoc",
                            "    - net: ncsi: Fix GCPS 64-bit member variables",
                            "    - libbpf: Fix buffer overflow in bpf_object__init_prog",
                            "    - xfrm: Use xdo.dev instead of xdo.real_dev",
                            "    - wifi: rtw88: sdio: map mgmt frames to queue TX_DESC_QSEL_MGMT",
                            "    - wifi: rtw88: sdio: call rtw_sdio_indicate_tx_status unconditionally",
                            "    - wifi: rtw88: do not ignore hardware read error during DPK",
                            "    - wifi: ath12k: Add MSDU length validation for TKIP MIC error",
                            "    - RDMA/hns: Include hnae3.h in hns_roce_hw_v2.h",
                            "    - scsi: hisi_sas: Call I_T_nexus after soft reset for SATA disk",
                            "    - libbpf: Remove sample_period init in perf_buffer",
                            "    - Use thread-safe function pointer in libbpf_print",
                            "    - iommu: Protect against overflow in iommu_pgsize()",
                            "    - bonding: assign random address if device address is same as bond",
                            "    - f2fs: clean up w/ fscrypt_is_bounce_page()",
                            "    - f2fs: fix to detect gcing page in f2fs_is_cp_guaranteed()",
                            "    - libbpf: Use proper errno value in linker",
                            "    - bpf: Allow XDP dev-bound programs to perform XDP_REDIRECT into maps",
                            "    - netfilter: bridge: Move specific fragmented packet to slow_path instead",
                            "      of dropping it",
                            "    - netfilter: nft_quota: match correctly when the quota just depleted",
                            "    - bpf: Fix uninitialized values in BPF_{CORE,PROBE}_READ",
                            "    - tracing: Move histogram trigger variables from stack to per CPU",
                            "      structure",
                            "    - clk: qcom: camcc-sm6350: Add *_wait_val values for GDSCs",
                            "    - clk: qcom: dispcc-sm6350: Add *_wait_val values for GDSCs",
                            "    - clk: qcom: gcc-sm6350: Add *_wait_val values for GDSCs",
                            "    - clk: qcom: gpucc-sm6350: Add *_wait_val values for GDSCs",
                            "    - efi/libstub: Describe missing 'out' parameter in efi_load_initrd",
                            "    - tracing: Rename event_trigger_alloc() to trigger_data_alloc()",
                            "    - tracing: Fix error handling in event_trigger_parse()",
                            "    - ktls, sockmap: Fix missing uncharge operation",
                            "    - libbpf: Use proper errno value in nlattr",
                            "    - clk: qcom: gcc-msm8939: Fix mclk0 & mclk1 for 24 MHz",
                            "    - s390/bpf: Store backchain even for leaf progs",
                            "    - iommu: remove duplicate selection of DMAR_TABLE",
                            "    - hisi_acc_vfio_pci: add eq and aeq interruption restore",
                            "    - scsi: ufs: mcq: Delete ufshcd_release_scsi_cmd() in ufshcd_mcq_abort()",
                            "    - wifi: mt76: mt7996: set EHT max ampdu length capability",
                            "    - wifi: mt76: mt7996: fix RX buffer size of MCU event",
                            "    - netfilter: nf_tables: nft_fib_ipv6: fix VRF ipv4/ipv6 result discrepancy",
                            "    - vfio/type1: Fix error unwind in migration dirty bitmap allocation",
                            "    - Bluetooth: MGMT: iterate over mesh commands in mgmt_mesh_foreach()",
                            "    - netfilter: nft_tunnel: fix geneve_opt dump",
                            "    - RISC-V: KVM: lock the correct mp_state during reset",
                            "    - RDMA/cma: Fix hang when cma_netevent_callback fails to queue_work",
                            "    - net: lan966x: Fix 1-step timestamping over ipv4 or ipv6",
                            "    - net: phy: fix up const issues in to_mdio_device() and to_phy_device()",
                            "    - net: lan743x: rename lan743x_reset_phy to lan743x_hw_reset_phy",
                            "    - net: phy: mscc: Stop clearing the the UDPv4 checksum for L2 frames",
                            "    - f2fs: use d_inode(dentry) cleanup dentry->d_inode",
                            "    - f2fs: fix to correct check conditions in f2fs_cross_rename",
                            "    - arm64: dts: qcom: sdm845-starqltechn: remove wifi",
                            "    - arm64: dts: qcom: sdm845-starqltechn: fix usb regulator mistake",
                            "    - arm64: dts: qcom: sdm845-starqltechn: refactor node order",
                            "    - arm64: dts: qcom: sdm845-starqltechn: remove excess reserved gpios",
                            "    - arm64: dts: qcom: sm8350: Reenable crypto & cryptobam",
                            "    - arm64: dts: qcom: sm8250: Fix CPU7 opp table",
                            "    - arm64: dts: qcom: sc8280xp-x13s: Drop duplicate DMIC supplies",
                            "    - ARM: dts: at91: usb_a9263: fix GPIO for Dataflash chip select",
                            "    - ARM: dts: at91: at91sam9263: fix NAND chip selects",
                            "    - arm64: dts: mediatek: mt8195: Reparent vdec1/2 and venc1 power domains",
                            "    - arm64: dts: qcom: sdm660-xiaomi-lavender: Add missing SD card detect",
                            "      GPIO",
                            "    - arm64: dts: imx8mm-beacon: Fix RTC capacitive load",
                            "    - arm64: dts: imx8mn-beacon: Fix RTC capacitive load",
                            "    - arm64: dts: imx8mp-beacon: Fix RTC capacitive load",
                            "    - arm64: dts: imx8mm-beacon: Set SAI5 MCLK direction to output for HDMI",
                            "      audio",
                            "    - arm64: dts: imx8mn-beacon: Set SAI5 MCLK direction to output for HDMI",
                            "      audio",
                            "    - arm64: dts: mediatek: mt6357: Drop regulator-fixed compatibles",
                            "    - arm64: dts: mt6359: Add missing 'compatible' property to regulators node",
                            "    - arm64: dts: qcom: sdm660-lavender: Add missing USB phy supply",
                            "    - arm64: dts: qcom: sda660-ifc6560: Fix dt-validate warning",
                            "    - arm64: dts: rockchip: Update eMMC for NanoPi R5 series",
                            "    - arm64: tegra: Drop remaining serial clock-names and reset-names",
                            "    - arm64: dts: ti: k3-j721e-common-proc-board: Enable OSPI1 on J721E",
                            "    - ocfs2: fix possible memory leak in ocfs2_finish_quota_recovery",
                            "    - nilfs2: add pointer check for nilfs_direct_propagate()",
                            "    - nilfs2: do not propagate ENOENT error from nilfs_btree_propagate()",
                            "    - dt-bindings: vendor-prefixes: Add Liontron name",
                            "    - ARM: dts: qcom: apq8064: add missing clocks to the timer node",
                            "    - ARM: dts: qcom: apq8064 merge hw splinlock into corresponding syscon",
                            "      device",
                            "    - arm64: defconfig: mediatek: enable PHY drivers",
                            "    - arm64: dts: rockchip: disable unrouted USB controllers and PHY on RK3399",
                            "      Puma with Haikou",
                            "    - arm64: dts: renesas: white-hawk-ard-audio: Fix TPU0 groups",
                            "    - arm64: dts: mt6359: Rename RTC node to match binding expectations",
                            "    - ARM: aspeed: Don't select SRAM",
                            "    - soc: aspeed: lpc: Fix impossible judgment condition",
                            "    - randstruct: gcc-plugin: Remove bogus void member",
                            "    - randstruct: gcc-plugin: Fix attribute addition",
                            "    - perf build: Warn when libdebuginfod devel files are not available",
                            "    - perf ui browser hists: Set actions->thread before calling",
                            "      do_zoom_thread()",
                            "    - dm: don't change md if dm_table_set_restrictions() fails",
                            "    - dm: free table mempools if not used in __bind",
                            "    - dm-flakey: error all IOs when num_features is absent",
                            "    - dm-flakey: make corrupting read bios work",
                            "    - perf trace: Fix leaks of 'struct thread' in set_filter_loop_pids()",
                            "    - perf intel-pt: Fix PEBS-via-PT data_src",
                            "    - perf scripts python: exported-sql-viewer.py: Fix pattern matching with",
                            "      Python 3",
                            "    - remoteproc: qcom_wcnss_iris: Add missing put_device() on error in probe",
                            "    - remoteproc: k3-r5: Drop check performed in",
                            "      k3_r5_rproc_{mbox_callback/kick}",
                            "    - rpmsg: qcom_smd: Fix uninitialized return variable in __qcom_smd_send()",
                            "    - mfd: exynos-lpass: Avoid calling exynos_lpass_disable() twice in",
                            "      exynos_lpass_remove()",
                            "    - mfd: stmpe-spi: Correct the name used in MODULE_DEVICE_TABLE",
                            "    - perf tests switch-tracking: Fix timestamp comparison",
                            "    - perf record: Fix incorrect --user-regs comments",
                            "    - perf trace: Always print return value for syscalls returning a pid",
                            "    - nfs: clear SB_RDONLY before getting superblock",
                            "    - nfs: ignore SB_RDONLY when remounting nfs",
                            "    - cifs: Fix validation of SMB1 query reparse point response",
                            "    - rtc: sh: assign correct interrupts with DT",
                            "    - PCI: Print the actual delay time in pci_bridge_wait_for_secondary_bus()",
                            "    - PCI: cadence: Fix runtime atomic count underflow",
                            "    - PCI: apple: Use gpiod_set_value_cansleep in probe flow",
                            "    - PCI/DPC: Initialize aer_err_info before using it",
                            "    - rtc: loongson: Add missing alarm notifications for ACPI RTC events",
                            "    - thunderbolt: Fix a logic error in wake on connect",
                            "    - iio: filter: admv8818: fix band 4, state 15",
                            "    - iio: filter: admv8818: fix integer overflow",
                            "    - iio: filter: admv8818: fix range calculation",
                            "    - iio: filter: admv8818: Support frequencies >= 2^32",
                            "    - iio: adc: ad7124: Fix 3dB filter frequency reading",
                            "    - MIPS: Loongson64: Add missing '#interrupt-cells' for loongson64c_ls7a",
                            "    - counter: interrupt-cnt: Protect enable/disable OPs with mutex",
                            "    - vt: remove VT_RESIZE and VT_RESIZEX from vt_compat_ioctl()",
                            "    - net: stmmac: platform: guarantee uniqueness of bus_id",
                            "    - gve: Fix RX_BUFFERS_POSTED stat to report per-queue fill_cnt",
                            "    - net: tipc: fix refcount warning in tipc_aead_encrypt",
                            "    - driver: net: ethernet: mtk_star_emac: fix suspend/resume issue",
                            "    - net/mlx4_en: Prevent potential integer overflow calculating Hz",
                            "    - net: lan966x: Make sure to insert the vlan tags also in host mode",
                            "    - spi: bcm63xx-spi: fix shared reset",
                            "    - spi: bcm63xx-hsspi: fix shared reset",
                            "    - Bluetooth: L2CAP: Fix not responding with L2CAP_CR_LE_ENCRYPTION",
                            "    - ice: create new Tx scheduler nodes for new queues only",
                            "    - ice: fix rebuilding the Tx scheduler tree for large queue counts",
                            "    - net: dsa: tag_brcm: legacy: fix pskb_may_pull length",
                            "    - vmxnet3: correctly report gso type for UDP tunnels",
                            "    - PM: sleep: Fix power.is_suspended cleanup for direct-complete devices",
                            "    - netfilter: nf_nat: also check reverse tuple to obtain clashing entry",
                            "    - net: dsa: b53: do not enable RGMII delay on bcm63xx",
                            "    - net: dsa: b53: allow RGMII for bcm63xx RGMII ports",
                            "    - wireguard: device: enable threaded NAPI",
                            "    - scsi: ufs: qcom: Prevent calling phy_exit() before phy_init()",
                            "    - ASoC: codecs: hda: Fix RPM usage count underflow",
                            "    - ASoC: Intel: avs: Fix deadlock when the failing IPC is SET_D0IX",
                            "    - ASoC: ti: omap-hdmi: Re-add dai_link->platform to fix card init",
                            "    - path_overmount(): avoid false negatives",
                            "    - fix propagation graph breakage by MOVE_MOUNT_SET_GROUP move_mount(2)",
                            "    - Input: synaptics-rmi - fix crash with unsupported versions of F34",
                            "    - arm64: dts: ti: k3-j721e-sk: Add DT nodes for power regulators",
                            "    - serial: sh-sci: Move runtime PM enable to sci_probe_single()",
                            "    - serial: sh-sci: Clean sci_ports[0] after at earlycon exit",
                            "    - Bluetooth: hci_core: fix list_for_each_entry_rcu usage",
                            "    - Bluetooth: MGMT: Remove unused mgmt_pending_find_data",
                            "    - ath10k: snoc: fix unbalanced IRQ enable in crash recovery",
                            "    - wifi: ath11k: fix soc_dp_stats debugfs file permission",
                            "    - wifi: ath11k: convert timeouts to secs_to_jiffies()",
                            "    - wifi: ath11k: avoid burning CPU in ath11k_debugfs_fw_stats_request()",
                            "    - wifi: ath11k: don't use static variables in",
                            "      ath11k_debugfs_fw_stats_process()",
                            "    - wifi: ath11k: don't wait when there is no vdev started",
                            "    - wifi: ath11k: validate ath11k_crypto_mode on top of",
                            "      ath11k_core_qmi_firmware_ready",
                            "    - regulator: max20086: Fix refcount leak in max20086_parse_regulators_dt()",
                            "    - pinctrl: qcom: pinctrl-qcm2290: Add missing pins",
                            "    - scsi: iscsi: Fix incorrect error path labels for flashnode operations",
                            "    - powerpc/vas: Return -EINVAL if the offset is non-zero in mmap()",
                            "    - drm/meson: use unsigned long long / Hz for frequency types",
                            "    - drm/meson: fix debug log statement when setting the HDMI clocks",
                            "    - drm/meson: use vclk_freq instead of pixel_freq in debug print",
                            "    - drm/meson: fix more rounding issues with 59.94Hz modes",
                            "    - i40e: return false from i40e_reset_vf if reset is in progress",
                            "    - i40e: retry VFLR handling if there is ongoing VF reset",
                            "    - macsec: MACsec SCI assignment for ES = 0",
                            "    - Bluetooth: hci_sync: Fix broadcast/PA when using an existing instance",
                            "    - net/mlx5: Ensure fw pages are always allocated on same NUMA",
                            "    - net/mlx5: Fix return value when searching for existing flow group",
                            "    - net/mlx5e: Fix leak of Geneve TLV option object",
                            "    - net_sched: tbf: fix a race in tbf_change()",
                            "    - fs/filesystems: Fix potential unsigned integer underflow in fs_name()",
                            "    - nvmet-fcloop: access fcpreq only when holding reqlock",
                            "    - perf: Ensure bpf_perf_link path is properly serialized",
                            "    - bio: Fix bio_first_folio() for SPARSEMEM without VMEMMAP",
                            "    - block: Fix bvec_set_folio() for very large folios",
                            "    - tools/resolve_btfids: Fix build when cross compiling kernel with clang.",
                            "    - ALSA: usb-audio: Add implicit feedback quirk for RODE AI-1",
                            "    - io_uring: expand main struct io_kiocb flags to 64-bits",
                            "    - io_uring: add io_file_can_poll() helper",
                            "    - io_uring/rw: allow pollable non-blocking attempts for !FMODE_NOWAIT",
                            "    - io_uring/rw: fix wrong NOWAIT check in io_rw_init_file()",
                            "    - usb: usbtmc: Fix read_stb function and get_stb ioctl",
                            "    - usb: cdnsp: Fix issue with detecting command completion event",
                            "    - usb: cdnsp: Fix issue with detecting USB 3.2 speed",
                            "    - usb: Flush altsetting 0 endpoints before reinitializating them after",
                            "      reset.",
                            "    - usb: typec: tcpm/tcpci_maxim: Fix bounds check in process_rx()",
                            "    - xen/arm: call uaccess_ttbr0_enable for dm_op hypercall",
                            "    - calipso: unlock rcu before returning -EAFNOSUPPORT",
                            "    - regulator: dt-bindings: mt6357: Drop fixed compatible requirement",
                            "    - net: usb: aqc111: debug info before sanitation",
                            "    - drm/meson: Use 1000ULL when operating with mode->clock",
                            "    - Documentation: ACPI: Use all-string data node references",
                            "    - PCI/ASPM: Consolidate link state defines",
                            "    - PCI/ASPM: Disable L1 before disabling L1 PM Substates",
                            "    - perf/x86/amd/uncore: Remove unused 'struct amd_uncore_ctx::node' member",
                            "    - perf/x86/amd/uncore: Prevent UMC counters from saturating",
                            "    - crypto: sun8i-ce - undo runtime PM changes during driver removal",
                            "    - erofs: fix file handle encoding for 64-bit NIDs",
                            "    - btrfs: fix invalid data space release when truncating block in NOCOW",
                            "      mode",
                            "    - ACPI: resource: fix a typo for MECHREVO in",
                            "      irq1_edge_low_force_override[]",
                            "    - thermal/drivers/mediatek/lvts: Fix debugfs unregister on failure",
                            "    - drm/vmwgfx: Add error path for xa_store in vmw_bo_add_detached_resource",
                            "    - drm/vmwgfx: Fix dumb buffer leak",
                            "    - drm/xe/d3cold: Set power state to D3Cold during s2idle/s3",
                            "    - drm/panel: samsung-sofef00: Drop s6e3fc2x01 support",
                            "    - kunit/usercopy: Disable u64 test on 32-bit SPARC",
                            "    - drm/msm/dpu: enable SmartDMA on SM8150",
                            "    - drm/msm/dpu: enable SmartDMA on SC8180X",
                            "    - overflow: Fix direct struct member initialization in _DEFINE_FLEX()",
                            "    - drm/msm/a6xx: Disable rgb565_predicator on Adreno 7c3",
                            "    - media: verisilicon: Free post processor buffers on error",
                            "    - wifi: ath12k: Fix memory leak during vdev_id mismatch",
                            "    - wifi: ath12k: Fix invalid memory access while forming 802.11 header",
                            "    - bpf: Check link_create.flags parameter for multi_kprobe",
                            "    - wifi: ath12k: fix cleanup path after mhi init",
                            "    - f2fs: clean up unnecessary indentation",
                            "    - f2fs: prevent the current section from being selected as a victim during",
                            "      GC",
                            "    - net/mlx5: Avoid using xso.real_dev unnecessarily",
                            "    - wifi: ath12k: Fix the QoS control field offset to build QoS header",
                            "    - libbpf: Fix event name too long error",
                            "    - wifi: iwlfiwi: mvm: Fix the rate reporting",
                            "    - selftests/bpf: Fix caps for __xlated/jited_unpriv",
                            "    - wifi: rtw89: pci: enlarge retry times of RX tag to 1000",
                            "    - wifi: mt76: mt7925: prevent multiple scan commands",
                            "    - wifi: mt76: mt7925: refine the sniffer commnad",
                            "    - wifi: mt76: mt7925: ensure all MCU commands wait for response",
                            "    - netfilter: nf_tables: nft_fib: consistent l3mdev handling",
                            "    - vsock/virtio: fix `rx_bytes` accounting for stream sockets",
                            "    - net: xilinx: axienet: Fix Tx skb circular buffer occupancy check in",
                            "      dmaengine xmit",
                            "    - net: lan743x: Fix PHY reset handling during initialization and WOL",
                            "    - octeontx2-af: Sync NIX and NPA contexts from NDC to LLC/DRAM",
                            "    - octeontx2-pf: QOS: Perform cache sync on send queue teardown",
                            "    - arm64: dts: qcom: sm8650: add missing cpu-cfg interconnect path in the",
                            "      mdss node",
                            "    - arm64: dts: qcom: ipq9574: Fix USB vdd info",
                            "    - arm64: dts: rockchip: Move SHMEM memory to reserved memory on rk3588",
                            "    - arm64: dts: mediatek: mt8183-kukui-jacuzzi: Simplify DSI endpoint",
                            "      replacement",
                            "    - arm64: dts: mt8183: Add port node to mt8183.dtsi",
                            "    - soc: qcom: smp2p: Fix fallback to qcom,ipc parse",
                            "    - ARM: dts: qcom: apq8064: move replicator out of soc node",
                            "    - arm64: dts: qcom: qcm2290: fix (some) of QUP interconnects",
                            "    - perf symbol-minimal: Fix double free in filename__read_build_id",
                            "    - mfd: exynos-lpass: Fix an error handling path in exynos_lpass_probe()",
                            "    - mailbox: imx: Fix TXDB_V2 sending",
                            "    - mailbox: mtk-cmdq: Refine GCE_GCTL_VALUE setting",
                            "    - perf symbol: Fix use-after-free in filename__read_build_id",
                            "    - PCI/DPC: Log Error Source ID only when valid",
                            "    - coresight: catu: Introduce refcount and spinlock for enabling/disabling",
                            "    - mei: vsc: Cast tx_buf to (__be32 *) when passed to cpu_to_be32_array()",
                            "    - iio: adc: mcp3911: fix device dependent mappings for conversion result",
                            "      registers",
                            "    - drm/xe: Make xe_gt_freq part of the Documentation",
                            "    - Fix sock_exceed_buf_limit not being triggered in",
                            "      __sk_mem_raise_allocated",
                            "    - idpf: fix netdev Tx queue stop/wake",
                            "    - idpf: fix a race in txq wakeup",
                            "    - nvme: fix command limits status code",
                            "    - drm/panel-simple: fix the warnings for the Evervision VGG644804",
                            "    - net: ti: icssg-prueth: Fix swapped TX stats for MII interfaces.",
                            "    - net: dsa: b53: Introduce b53_adjust_531x5_rgmii()",
                            "    - net: dsa: b53: do not touch DLL_IQQD on bcm53115",
                            "    - ALSA: hda/realtek: fix micmute LEDs on HP Laptops with ALC3315",
                            "    - ALSA: hda/realtek: fix micmute LEDs on HP Laptops with ALC3247",
                            "    - ALSA: hda/realtek: Add support for various HP Laptops using CS35L41 HDA",
                            "    - ALSA: hda/realtek - Support mute led function for HP platform",
                            "    - ALSA: hda/realtek - Add new HP ZBook laptop with micmute led fixup",
                            "    - ALSA: hda/realtek: Add support for HP Agusta using CS35L41 HDA",
                            "    - dt-bindings: pinctrl: samsung: google,gs101-pinctrl needs a clock",
                            "    - pinctrl: samsung: support a bus clock",
                            "    - pinctrl: samsung: refactor drvdata suspend & resume callbacks",
                            "    - pinctrl: samsung: add dedicated SoC eint suspend/resume callbacks",
                            "    - pinctrl: samsung: add gs101 specific eint suspend/resume callbacks",
                            "    - net: dsa: b53: fix untagged traffic sent via cpu tagged with VID 0",
                            "    - wifi: ath11k: move some firmware stats related functions outside of",
                            "      debugfs",
                            "    - wifi: ath12k: refactor ath12k_hw_regs structure",
                            "    - gfs2: pass through holder from the VFS for freeze/thaw",
                            "    - btrfs: exit after state split error at set_extent_bit()",
                            "    - block: use q->elevator with ->elevator_lock held in elv_iosched_show()",
                            "    - 9p: Add a migrate_folio method",
                            "    - overflow: Introduce __DEFINE_FLEX for having no initializer",
                            "    - thermal/drivers/mediatek/lvts: Remove unused lvts_debugfs_exit",
                            "    - Upstream stable to v6.6.94, v6.12.33, v6.12.34",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38101",
                            "    - ring-buffer: Fix buffer locking in ring_buffer_subbuf_order_set()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38269",
                            "    - btrfs: exit after state insertion failure at btrfs_convert_extent_bit()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38303",
                            "    - Bluetooth: eir: Fix possible crashes on eir_create_adv_data",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38414",
                            "    - wifi: ath12k: fix GCC_GCC_PCIE_HOT_RST definition for WCN7850",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38125",
                            "    - net: stmmac: make sure that ptp_rate is not 0 before configuring EST",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38129",
                            "    - page_pool: Fix use-after-free in page_pool_recycle_in_ring",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38156",
                            "    - wifi: mt76: mt7996: Fix null-ptr-deref in mt7996_mmio_wed_init()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38162",
                            "    - netfilter: nft_set_pipapo: prevent overflow in lookup table allocation",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38292",
                            "    - wifi: ath12k: fix invalid access to memory",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38164",
                            "    - f2fs: zone: fix to avoid inconsistence in between SIT and SSA",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38169",
                            "    - arm64/fpsimd: Avoid clobbering kernel FPSIMD state with SMSTOP",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38299",
                            "    - ASoC: mediatek: mt8195: Set ETDM1/2 IN/OUT to COMP_DUMMY()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38100",
                            "    - x86/iopl: Cure TIF_IO_BITMAP inconsistencies",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38102",
                            "    - VMCI: fix race between vmci_host_setup_notify and vmci_ctx_unset_notify",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38103",
                            "    - HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38107",
                            "    - net_sched: ets: fix a race in ets_qdisc_change()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38108",
                            "    - net_sched: red: fix a race in __red_change()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38109",
                            "    - net/mlx5: Fix ECVF vports unload on shutdown flow",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38304",
                            "    - Bluetooth: Fix NULL pointer deference on eir_get_service_data",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38110",
                            "    - net/mdiobus: Fix potential out-of-bounds clause 45 read/write access",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38111",
                            "    - net/mdiobus: Fix potential out-of-bounds read/write access",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38112",
                            "    - net: Fix TOCTOU issue in sk_is_readable()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38113",
                            "    - ACPI: CPPC: Fix NULL pointer dereference when nosmp is used",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38088",
                            "    - powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38115",
                            "    - net_sched: sch_sfq: fix a potential crash on gso_skb handling",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38305",
                            "    - ptp: remove ptp->n_vclocks check logic in ptp_vclock_in_use()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38117",
                            "    - Bluetooth: MGMT: Protect mgmt_pending list with its own lock",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38119",
                            "    - scsi: core: ufs: Fix a hang in the error handler",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38307",
                            "    - ASoC: Intel: avs: Verify content returned by parse_int_array()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38310",
                            "    - seg6: Fix validation of nexthop addresses",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38120",
                            "    - netfilter: nf_set_pipapo_avx2: fix initial map fill",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38122",
                            "    - gve: add missing NULL check for gve_alloc_pending_packet() in TX DQO",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38123",
                            "    - net: wwan: t7xx: Fix napi rx poll issue",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38124",
                            "    - net: fix udp gso skb_segment after pull from frag_list",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38126",
                            "    - net: stmmac: make sure that ptp_rate is not 0 before configuring",
                            "      timestamping",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38127",
                            "    - ice: fix Tx scheduler error handling in XDP callback",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38131",
                            "    - coresight: prevent deactivate active config while enabling the config",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38274",
                            "    - fpga: fix potential null pointer deref in fpga_mgr_test_img_load_sgt()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38135",
                            "    - serial: Fix potential null-ptr-deref in mlb_usio_probe()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38136",
                            "    - usb: renesas_usbhs: Reorder clock handling and power management in probe",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38138",
                            "    - dmaengine: ti: Add NULL check in udma_probe()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38275",
                            "    - phy: qcom-qmp-usb: Fix an NULL vs IS_ERR() bug",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38142",
                            "    - hwmon: (asus-ec-sensors) check sensor index in read_string()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38277",
                            "    - mtd: nand: ecc-mxic: Fix use of uninitialized variable ret",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38143",
                            "    - backlight: pm8941: Add NULL check in wled_configure()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38312",
                            "    - fbdev: core: fbcvt: avoid division by 0 in fb_cvt_hperiod()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38145",
                            "    - soc: aspeed: Add NULL check in aspeed_lpc_enable_snoop()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38313",
                            "    - bus: fsl-mc: fix double-free on mc_dev",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38415",
                            "    - Squashfs: check return result of sb_min_blocksize",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38146",
                            "    - net: openvswitch: Fix the dead loop of MPLS parse",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38147",
                            "    - calipso: Don't call calipso functions for AF_INET sk.",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38278",
                            "    - octeontx2-pf: QOS: Refactor TC_HTB_LEAF_DEL_LAST callback",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38148",
                            "    - net: phy: mscc: Fix memory leak when using one step timestamping",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38149",
                            "    - net: phy: clear phydev->devlink when the link is deleted",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38280",
                            "    - bpf: Avoid __bpf_prog_ret0_warn when jit fails",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38153",
                            "    - net: usb: aqc111: fix error handling of usbnet read calls",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38154",
                            "    - bpf, sockmap: Avoid using sk_socket after free when sending",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38155",
                            "    - wifi: mt76: mt7915: Fix null-ptr-deref in mt7915_mmio_wed_init()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38282",
                            "    - kernfs: Relax constraint in draining guard",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38157",
                            "    - wifi: ath9k_htc: Abort software beacon handling if disabled",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38283",
                            "    - hisi_acc_vfio_pci: bugfix live migration function without VF device",
                            "      driver",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38158",
                            "    - hisi_acc_vfio_pci: fix XQE dma address error",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-39890",
                            "    - wifi: ath12k: fix memory leak in ath12k_service_ready_ext_event",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38159",
                            "    - wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38285",
                            "    - bpf: Fix WARN() in get_bpf_raw_tp_regs",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38286",
                            "    - pinctrl: at91: Fix possible out-of-boundary access",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38160",
                            "    - clk: bcm: rpi: Add NULL check in raspberrypi_clk_register()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38161",
                            "    - RDMA/mlx5: Fix error flow upon firmware failure for RQ destruction",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38290",
                            "    - wifi: ath12k: fix node corruption in ar->arvifs list",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38163",
                            "    - f2fs: fix to do sanity check on sbi->total_valid_block_count",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38165",
                            "    - bpf, sockmap: Fix panic when calling skb_linearize",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38166",
                            "    - bpf: fix ktls panic with sockmap",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38293",
                            "    - wifi: ath11k: fix node corruption in ar->arvifs list",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38295",
                            "    - perf/amlogic: Replace smp_processor_id() with raw_smp_processor_id() in",
                            "      meson_ddr_pmu_create()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38167",
                            "    - fs/ntfs3: handle hdr_first_de() return value",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38170",
                            "    - arm64/fpsimd: Discard stale CPU state when handling SME traps",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38319",
                            "    - drm/amd/pp: Fix potential NULL pointer dereference in",
                            "      atomctrl_initialize_mc_reg_table",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38298",
                            "    - EDAC/skx_common: Fix general protection fault",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38173",
                            "    - crypto: marvell/cesa - Handle zero-length skcipher requests",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38300",
                            "    - crypto: sun8i-ce-cipher - fix error handling in",
                            "      sun8i_ce_cipher_prepare()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38174",
                            "    - thunderbolt: Do not double dequeue a configuration request",
                            "",
                            "  * Noble update: upstream stable patchset 2025-12-03 (LP: #2133786) //",
                            "    CVE-2025-38265",
                            "    - serial: jsm: fix NPE during jsm_uart_port_init",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301)",
                            "    - i2c: designware: Uniform initialization flow for polling mode",
                            "    - i2c: designware: Remove ->disable() callback",
                            "    - i2c: designware: Use temporary variable for struct device",
                            "    - i2c: designware: Fix an error handling path in i2c_dw_pci_probe()",
                            "    - phy: renesas: rcar-gen3-usb2: Add support to initialize the bus",
                            "    - phy: renesas: rcar-gen3-usb2: Move IRQ request in probe",
                            "    - phy: renesas: rcar-gen3-usb2: Lock around hardware registers and driver",
                            "      data",
                            "    - phy: renesas: rcar-gen3-usb2: Assert PLL reset on PHY power off",
                            "    - cpufreq: Add SM8650 to cpufreq-dt-platdev blocklist",
                            "    - nvmem: rockchip-otp: Move read-offset into variant-data",
                            "    - nvmem: rockchip-otp: add rk3576 variant data",
                            "    - nvmem: core: verify cell's raw_len",
                            "    - nvmem: core: update raw_len if the bit reading is required",
                            "    - nvmem: qfprom: switch to 4-byte aligned reads",
                            "    - scsi: ufs: Introduce quirk to extend PA_HIBERN8TIME for UFS devices",
                            "    - intel_th: avoid using deprecated page->mapping, index fields",
                            "    - dma-mapping: avoid potential unused data compilation warning",
                            "    - cgroup: Fix compilation issue due to cgroup_mutex not being exported",
                            "    - scsi: mpi3mr: Add level check to control event logging",
                            "    - net: enetc: refactor bulk flipping of RX buffers to separate function",
                            "    - ima: process_measurement() needlessly takes inode_lock() on MAY_READ",
                            "    - drm/amdgpu: Allow P2P access through XGMI",
                            "    - selftests/bpf: Mitigate sockmap_ktls disconnect_after_delete failure",
                            "    - bpf: fix possible endless loop in BPF map iteration",
                            "    - samples/bpf: Fix compilation failure for samples/bpf on LoongArch Fedora",
                            "    - kconfig: merge_config: use an empty file as initfile",
                            "    - s390/vfio-ap: Fix no AP queue sharing allowed message written to kernel",
                            "      log",
                            "    - cifs: Add fallback for SMB2 CREATE without FILE_READ_ATTRIBUTES",
                            "    - cifs: Fix querying and creating MF symlinks over SMB1",
                            "    - cifs: Fix negotiate retry functionality",
                            "    - smb: client: Store original IO parameters and prevent zero IO sizes",
                            "    - fuse: Return EPERM rather than ENOSYS from link()",
                            "    - NFSv4: Check for delegation validity in",
                            "      nfs_start_delegation_return_locked()",
                            "    - NFS: Don't allow waiting for exiting tasks",
                            "    - arm64: Add support for HIP09 Spectre-BHB mitigation",
                            "    - tracing: Mark binary printing functions with __printf() attribute",
                            "    - ACPI: PNP: Add Intel OC Watchdog IDs to non-PNP device list",
                            "    - mailbox: pcc: Use acpi_os_ioremap() instead of ioremap()",
                            "    - mailbox: use error ret code of of_parse_phandle_with_args()",
                            "    - riscv: Allow NOMMU kernels to access all of RAM",
                            "    - fbdev: fsl-diu-fb: add missing device_remove_file()",
                            "    - fbcon: Use correct erase colour for clearing in fbcon",
                            "    - fbdev: core: tileblit: Implement missing margin clearing for tileblit",
                            "    - cifs: add validation check for the fields in smb_aces",
                            "    - cifs: Fix establishing NetBIOS session for SMB2+ connection",
                            "    - NFSv4: Treat ENETUNREACH errors as fatal for state recovery",
                            "    - SUNRPC: rpc_clnt_set_transport() must not change the autobind setting",
                            "    - SUNRPC: rpcbind should never reset the port to the value '0'",
                            "    - thermal/drivers/qoriq: Power down TMU on system suspend",
                            "    - dql: Fix dql->limit value when reset.",
                            "    - lockdep: Fix wait context check on softirq for PREEMPT_RT",
                            "    - objtool: Properly disable uaccess validation",
                            "    - PCI: dwc: ep: Ensure proper iteration over outbound map windows",
                            "    - tools/build: Don't pass test log files to linker",
                            "    - pNFS/flexfiles: Report ENETDOWN as a connection error",
                            "    - PCI: vmd: Disable MSI remapping bypass under Xen",
                            "    - ext4: on a remount, only log the ro or r/w state when it has changed",
                            "    - mmc: host: Wait for Vdd to settle on card power off",
                            "    - wifi: mt76: only mark tx-status-failed frames as ACKed on mt76x0/2",
                            "    - wifi: mt76: mt7996: revise TXS size",
                            "    - x86/stackprotector/64: Only export __ref_stack_chk_guard on CONFIG_SMP",
                            "    - i2c: qup: Vote for interconnect bandwidth to DRAM",
                            "    - i2c: pxa: fix call balance of i2c->clk handling routines",
                            "    - btrfs: make btrfs_discard_workfn() block_group ref explicit",
                            "    - btrfs: avoid linker error in btrfs_find_create_tree_block()",
                            "    - btrfs: run btrfs_error_commit_super() early",
                            "    - btrfs: fix non-empty delayed iputs list on unmount due to async workers",
                            "    - btrfs: get zone unusable bytes while holding lock at",
                            "      btrfs_reclaim_bgs_work()",
                            "    - btrfs: send: return -ENAMETOOLONG when attempting a path that is too",
                            "      long",
                            "    - drm/amd/display: Guard against setting dispclk low for dcn31x",
                            "    - i3c: master: svc: Fix missing STOP for master request",
                            "    - dlm: make tcp still work in multi-link env",
                            "    - um: Store full CSGSFS and SS register from mcontext",
                            "    - um: Update min_low_pfn to match changes in uml_reserved",
                            "    - ext4: reorder capability check last",
                            "    - hypfs_create_cpu_files(): add missing check for hypfs_mkdir() failure",
                            "    - scsi: st: Tighten the page format heuristics with MODE SELECT",
                            "    - scsi: st: ERASE does not change tape location",
                            "    - vfio/pci: Handle INTx IRQ_NOTCONNECTED",
                            "    - bpf: Return prog btf_id without capable check",
                            "    - jbd2: do not try to recover wiped journal",
                            "    - tcp: reorganize tcp_in_ack_event() and tcp_count_delivered()",
                            "    - rtc: rv3032: fix EERD location",
                            "    - thunderbolt: Do not add non-active NVM if NVM upgrade is disabled for",
                            "      retimer",
                            "    - ASoC: mediatek: mt6359: Add stub for mt6359_accdet_enable_jack_detect",
                            "    - bpf: Allow pre-ordering for bpf cgroup progs",
                            "    - kbuild: fix argument parsing in scripts/config",
                            "    - crypto: octeontx2 - suppress auth failure screaming due to negative",
                            "      tests",
                            "    - dm: restrict dm device size to 2^63-512 bytes",
                            "    - net/smc: use the correct ndev to find pnetid by pnetid table",
                            "    - xen: Add support for XenServer 6.1 platform device",
                            "    - pinctrl-tegra: Restore SFSEL bit when freeing pins",
                            "    - mfd: tps65219: Remove TPS65219_REG_TI_DEV_ID check",
                            "    - drm/amdgpu: Update SRIOV video codec caps",
                            "    - ASoC: sun4i-codec: support hp-det-gpios property",
                            "    - ext4: reject the 'data_err=abort' option in nojournal mode",
                            "    - ext4: do not convert the unwritten extents if data writeback fails",
                            "    - RDMA/uverbs: Propagate errors from rdma_lookup_get_uobject()",
                            "    - posix-timers: Add cond_resched() to posix_timer_add() search loop",
                            "    - timer_list: Don't use %pK through printk()",
                            "    - netfilter: conntrack: Bound nf_conntrack sysctl writes",
                            "    - arm64/mm: Check PUD_TYPE_TABLE in pud_bad()",
                            "    - mmc: dw_mmc: add exynos7870 DW MMC support",
                            "    - usb: xhci: Don't change the status of stalled TDs on failed Stop EP",
                            "    - hwmon: (dell-smm) Increment the number of fans",
                            "    - printk: Check CON_SUSPEND when unblanking a console",
                            "    - drm/amd/display: remove minimum Dispclk and apply oem panel timing.",
                            "    - drm/amd/display: calculate the remain segments for all pipes",
                            "    - drm/amd/display: Fix incorrect DPCD configs while Replay/PSR switch",
                            "    - gfs2: Check for empty queue in run_queue",
                            "    - auxdisplay: charlcd: Partially revert \"Move hwidth and bwidth to struct",
                            "      hd44780_common\"",
                            "    - ASoC: qcom: sm8250: explicitly set format in sm8250_be_hw_params_fixup()",
                            "    - iommu/amd/pgtbl_v2: Improve error handling",
                            "    - watchdog: aspeed: Update bootstatus handling",
                            "    - drm/amdkfd: Set per-process flags only once cik/vi",
                            "    - arm64: tegra: p2597: Fix gpio for vdd-1v8-dis regulator",
                            "    - arm64: tegra: Resize aperture for the IGX PCIe C5 slot",
                            "    - powerpc/prom_init: Fixup missing #size-cells on PowerBook6,7",
                            "    - ALSA: seq: Improve data consistency at polling",
                            "    - tcp: bring back NUMA dispersion in inet_ehash_locks_alloc()",
                            "    - rtc: ds1307: stop disabling alarms on probe",
                            "    - ieee802154: ca8210: Use proper setters and getters for bitwise types",
                            "    - ARM: tegra: Switch DSI-B clock parent to PLLD on Tegra114",
                            "    - media: c8sectpfe: Call of_node_put(i2c_bus) only once in",
                            "      c8sectpfe_probe()",
                            "    - drm/gem: Test for imported GEM buffers with helper",
                            "    - net: phylink: use pl->link_interface in phylink_expects_phy()",
                            "    - remoteproc: qcom_wcnss: Handle platforms with only single power domain",
                            "    - drm/amdgpu: Do not program AGP BAR regs under SRIOV in gfxhub_v1_0.c",
                            "    - drm/amd/display: Skip checking FRL_MODE bit for PCON BW determination",
                            "    - pinctrl: bcm281xx: Use \"unsigned int\" instead of bare \"unsigned\"",
                            "    - net: ethernet: ti: cpsw_new: populate netdev of_node",
                            "    - net: pktgen: fix mpls maximum labels list parsing",
                            "    - perf/hw_breakpoint: Return EOPNOTSUPP for unsupported breakpoint type",
                            "    - ALSA: hda/realtek: Enable PC beep passthrough for HP EliteBook 855 G7",
                            "    - ipv4: fib: Move fib_valid_key_len() to rtm_to_fib_config().",
                            "    - drm/rockchip: vop2: Add uv swap for cluster window",
                            "    - media: uvcvideo: Add sanity check to uvc_ioctl_xu_ctrl_map",
                            "    - media: uvcvideo: Handle uvc menu translation inside uvc_get_le_value",
                            "    - clk: imx8mp: inform CCF of maximum frequency of clocks",
                            "    - hwmon: (gpio-fan) Add missing mutex locks",
                            "    - ARM: at91: pm: fix at91_suspend_finish for ZQ calibration",
                            "    - drm/mediatek: mtk_dpi: Add checks for reg_h_fre_con existence",
                            "    - fpga: altera-cvp: Increase credit timeout",
                            "    - perf: arm_pmuv3: Call kvm_vcpu_pmu_resync_el0() before enabling counters",
                            "    - soc: apple: rtkit: Use high prio work queue",
                            "    - soc: apple: rtkit: Implement OSLog buffers properly",
                            "    - wifi: ath12k: Report proper tx completion status to mac80211",
                            "    - PCI: brcmstb: Expand inbound window size up to 64GB",
                            "    - PCI: brcmstb: Add a softdep to MIP MSI-X driver",
                            "    - net/mlx5: Avoid report two health errors on same syndrome",
                            "    - selftests/net: have `gro.sh -t` return a correct exit code",
                            "    - drm/amdkfd: KFD release_work possible circular locking",
                            "    - leds: pwm-multicolor: Add check for fwnode_property_read_u32",
                            "    - net: ethernet: mtk_ppe_offload: Allow QinQ, double ETH_P_8021Q only",
                            "    - net: xgene-v2: remove incorrect ACPI_PTR annotation",
                            "    - bonding: report duplicate MAC address in all situations",
                            "    - wifi: ath12k: Improve BSS discovery with hidden SSID in 6 GHz band",
                            "    - soc: ti: k3-socinfo: Do not use syscon helper to build regmap",
                            "    - Octeontx2-af: RPM: Register driver with PCI subsys IDs",
                            "    - x86/build: Fix broken copy command in genimage.sh when making isoimage",
                            "    - drm/amd/display: handle max_downscale_src_width fail check",
                            "    - ASoC: mediatek: mt8188: Treat DMIC_GAINx_CUR as non-volatile",
                            "    - ASoC: mediatek: mt8188: Add reference for dmic clocks",
                            "    - x86/nmi: Add an emergency handler in nmi_desc & use it in",
                            "      nmi_shootdown_cpus()",
                            "    - vhost-scsi: Return queue full for page alloc failures during copy",
                            "    - vdpa/mlx5: Fix mlx5_vdpa_get_config() endianness on big-endian machines",
                            "    - media: adv7180: Disable test-pattern control on adv7180",
                            "    - media: tc358746: improve calculation of the D-PHY timing registers",
                            "    - libbpf: Fix out-of-bound read",
                            "    - net/mlx5: Change POOL_NEXT_SIZE define value and make it global",
                            "    - crypto: ahash - Set default reqsize from ahash_alg",
                            "    - crypto: skcipher - Zap type in crypto_alloc_sync_skcipher",
                            "    - MIPS: Use arch specific syscall name match function",
                            "    - MIPS: pm-cps: Use per-CPU variables as per-CPU, not per-core",
                            "    - clocksource: mips-gic-timer: Enable counter when CPUs start",
                            "    - scsi: mpt3sas: Send a diag reset if target reset fails",
                            "    - wifi: rtw88: Fix rtw_init_vht_cap() for RTL8814AU",
                            "    - wifi: rtw88: Fix rtw_init_ht_cap() for RTL8814AU",
                            "    - wifi: rtw88: Fix rtw_desc_to_mcsrate() to handle MCS16-31",
                            "    - wifi: rtw89: fw: propagate error code from rtw89_h2c_tx()",
                            "    - EDAC/ie31200: work around false positive build warning",
                            "    - i3c: master: svc: Flush FIFO before sending Dynamic Address",
                            "      Assignment(DAA)",
                            "    - drm/amd/display: Add support for disconnected eDP streams",
                            "    - RDMA/core: Fix best page size finding when it can cross SG entries",
                            "    - pmdomain: imx: gpcv2: use proper helper for property detection",
                            "    - can: c_can: Use of_property_present() to test existence of DT property",
                            "    - bpf: don't do clean_live_states when state->loop_entry->branches > 0",
                            "    - eth: mlx4: don't try to complete XDP frames in netpoll",
                            "    - PCI: Fix old_size lower bound in calculate_iosize() too",
                            "    - ACPI: HED: Always initialize before evged",
                            "    - vxlan: Join / leave MC group after remote changes",
                            "    - media: test-drivers: vivid: don't call schedule in loop",
                            "    - net/mlx5: Modify LSB bitmask in temperature event to include only the",
                            "      first bit",
                            "    - net/mlx5: Apply rate-limiting to high temperature warning",
                            "    - firmware: arm_ffa: Reject higher major version as incompatible",
                            "    - ASoC: ops: Enforce platform maximum on initial value",
                            "    - ASoC: tas2764: Add reg defaults for TAS2764_INT_CLK_CFG",
                            "    - ASoC: tas2764: Mark SW_RESET as volatile",
                            "    - ASoC: tas2764: Power up/down amp on mute ops",
                            "    - ASoC: soc-dai: check return value at snd_soc_dai_set_tdm_slot()",
                            "    - pinctrl: devicetree: do not goto err when probing hogs in",
                            "      pinctrl_dt_to_map",
                            "    - smack: recognize ipv4 CIPSO w/o categories",
                            "    - smack: Revert \"smackfs: Added check catlen\"",
                            "    - kunit: tool: Use qboot on QEMU x86_64",
                            "    - media: i2c: imx219: Correct the minimum vblanking value",
                            "    - media: v4l: Memset argument to 0 before calling get_mbus_config pad op",
                            "    - net/mlx4_core: Avoid impossible mlx4_db_alloc() order value",
                            "    - clk: qcom: ipq5018: allow it to be bulid on arm32",
                            "    - [Config] clk: qcom: ipq5018: enable module on armhf",
                            "    - clk: qcom: clk-alpha-pll: Do not use random stack value for recalc rate",
                            "    - x86/traps: Cleanup and robustify decode_bug()",
                            "    - sched: Reduce the default slice to avoid tasks getting an extra tick",
                            "    - serial: sh-sci: Update the suspend/resume support",
                            "    - phy: core: don't require set_mode() callback for phy_get_mode() to work",
                            "    - soundwire: amd: change the soundwire wake enable/disable sequence",
                            "    - drm/amdgpu: Set snoop bit for SDMA for MI series",
                            "    - drm/amd/display: Don't try AUX transactions on disconnected link",
                            "    - drm/amdgpu: reset psp->cmd to NULL after releasing the buffer",
                            "    - drm/amd/display: Update CR AUX RD interval interpretation",
                            "    - drm/amd/display: Initial psr_version with correct setting",
                            "    - drm/amdgpu: enlarge the VBIOS binary size limit",
                            "    - drm/amd/display/dm: drop hw_support check in amdgpu_dm_i2c_xfer()",
                            "    - scsi: target: spc: Fix loop traversal in spc_rsoc_get_descr()",
                            "    - net/mlx5: Extend Ethtool loopback selftest to support non-linear SKB",
                            "    - net/mlx5e: set the tx_queue_len for pfifo_fast",
                            "    - net/mlx5e: reduce rep rxq depth to 256 for ECPF",
                            "    - net/mlx5e: reduce the max log mpwrq sz for ECPF and reps",
                            "    - drm/v3d: Add clock handling",
                            "    - wifi: mac80211: don't unconditionally call drv_mgd_complete_tx()",
                            "    - wifi: mac80211: remove misplaced drv_mgd_complete_tx() call",
                            "    - net: fec: Refactor MAC reset to function",
                            "    - powerpc/pseries/iommu: memory notifier incorrectly adds TCEs for pmemory",
                            "    - arch/powerpc/perf: Check the instruction type before creating sample",
                            "      with perf_mem_data_src",
                            "    - ip: fib_rules: Fetch net from fib_rule in fib[46]_rule_configure().",
                            "    - r8152: add vendor/device ID pair for Dell Alienware AW1022z",
                            "    - pstore: Change kmsg_bytes storage size to u32",
                            "    - ext4: don't write back data before punch hole in nojournal mode",
                            "    - ext4: remove writable userspace mappings before truncating page cache",
                            "    - wifi: rtw88: Fix download_firmware_validate() for RTL8814AU",
                            "    - wifi: rtw88: Fix __rtw_download_firmware() for RTL8814AU",
                            "    - clk: qcom: camcc-sm8250: Use clk_rcg2_shared_ops for some RCGs",
                            "    - hwmon: (xgene-hwmon) use appropriate type for the latency value",
                            "    - f2fs: introduce f2fs_base_attr for global sysfs entries",
                            "    - media: qcom: camss: csid: Only add TPG v4l2 ctrl if TPG hardware is",
                            "      available",
                            "    - ipv4: ip_gre: Fix set but not used warning in ipgre_err() if IPv4-only",
                            "    - r8169: don't scan PHY addresses > 0",
                            "    - bridge: mdb: Allow replace of a host-joined group",
                            "    - ice: treat dyn_allowed only as suggestion",
                            "    - rcu: handle quiescent states for PREEMPT_RCU=n, PREEMPT_COUNT=y",
                            "    - rcu: handle unstable rdp in rcu_read_unlock_strict()",
                            "    - rcu: fix header guard for rcu_all_qs()",
                            "    - perf: Avoid the read if the count is already updated",
                            "    - ice: count combined queues using Rx/Tx count",
                            "    - net/mana: fix warning in the writer of client oob",
                            "    - scsi: lpfc: Handle duplicate D_IDs in ndlp search-by D_ID routine",
                            "    - scsi: lpfc: Free phba irq in lpfc_sli4_enable_msi() when",
                            "      pci_irq_vector() fails",
                            "    - scsi: st: Restore some drive settings after reset",
                            "    - wifi: ath12k: Avoid napi_sync() before napi_enable()",
                            "    - HID: usbkbd: Fix the bit shift number for LED_KANA",
                            "    - arm64: zynqmp: add clock-output-names property in clock nodes",
                            "    - ASoC: codecs: pcm3168a: Allow for 24-bit in provider mode",
                            "    - ASoC: rt722-sdca: Add some missing readable registers",
                            "    - drm/ast: Find VBIOS mode from regular display size",
                            "    - bpftool: Fix readlink usage in get_fd_type",
                            "    - firmware: arm_scmi: Relax duplicate name constraint across protocol ids",
                            "    - perf/amd/ibs: Fix perf_ibs_op.cnt_mask for CurCnt",
                            "    - perf/amd/ibs: Fix ->config to sample period calculation for OP PMU",
                            "    - wifi: rtl8xxxu: retry firmware download on error",
                            "    - wifi: rtw88: Don't use static local variable in",
                            "      rtw8822b_set_tx_power_index_by_rate",
                            "    - wifi: rtw89: add wiphy_lock() to work that isn't held wiphy_lock() yet",
                            "    - spi: zynqmp-gqspi: Always acknowledge interrupts",
                            "    - regulator: ad5398: Add device tree support",
                            "    - wifi: ath12k: fix ath12k_hal_tx_cmd_ext_desc_setup() info1 override",
                            "    - accel/qaic: Mask out SR-IOV PCI resources",
                            "    - wifi: ath9k: return by of_get_mac_address",
                            "    - wifi: ath12k: Fix end offset bit definition in monitor ring descriptor",
                            "    - drm: bridge: adv7511: fill stream capabilities",
                            "    - drm/atomic: clarify the rules around drm_atomic_state->allow_modeset",
                            "    - drm/panel-edp: Add Starry 116KHD024006",
                            "    - drm: Add valid clones check",
                            "    - ASoC: imx-card: Adjust over allocation of memory in imx_card_parse_of()",
                            "    - book3s64/radix: Fix compile errors when",
                            "      CONFIG_ARCH_WANT_OPTIMIZE_DAX_VMEMMAP=n",
                            "    - pinctrl: meson: define the pull up/down resistor value as 60 kOhm",
                            "    - ASoC: cs42l43: Disable headphone clamps during type detection",
                            "    - ASoC: Intel: bytcr_rt5640: Add DMI quirk for Acer Aspire SW3-013",
                            "    - ALSA: hda/realtek: Add quirk for HP Spectre x360 15-df1xxx",
                            "    - nvme-pci: add quirks for device 126f:1001",
                            "    - nvme-pci: add quirks for WDC Blue SN550 15b7:5009",
                            "    - io_uring/fdinfo: annotate racy sq/cq head/tail reads",
                            "    - cifs: Fix and improve cifs_query_path_info() and cifs_query_file_info()",
                            "    - cifs: Fix changing times and read-only attr over SMB1",
                            "      smb_set_file_info() function",
                            "    - tools: ynl-gen: validate 0 len strings from kernel",
                            "    - wifi: iwlwifi: add support for Killer on MTL",
                            "    - xenbus: Allow PVH dom0 a non-local xenstore",
                            "    - soundwire: bus: Fix race on the creation of the IRQ domain",
                            "    - dmaengine: idxd: Fix allowing write() from different address spaces",
                            "    - kernel/fork: only call untrack_pfn_clear() on VMAs duplicated for fork()",
                            "    - remoteproc: qcom_wcnss: Fix on platforms without fallback regulators",
                            "    - clk: sunxi-ng: d1: Add missing divider for MMC mod clocks",
                            "    - xfrm: Sanitize marks before insert",
                            "    - dmaengine: idxd: Fix ->poll() return value",
                            "    - dmaengine: fsl-edma: Fix return code for unhandled interrupts",
                            "    - Bluetooth: L2CAP: Fix not checking l2cap_chan security level",
                            "    - Bluetooth: btusb: use skb_pull to avoid unsafe access in QCA dump",
                            "      handling",
                            "    - bridge: netfilter: Fix forwarding of fragmented packets",
                            "    - ice: fix vf->num_mac count with port representors",
                            "    - ice: Fix LACP bonds without SRIOV environment",
                            "    - pinctrl: qcom: switch to devm_register_sys_off_handler()",
                            "    - net: dwmac-sun8i: Use parsed internal PHY address instead of 1",
                            "    - net: lan743x: Restore SGMII CTRL register on resume",
                            "    - io_uring: fix overflow resched cqe reordering",
                            "    - octeontx2-pf: Add AF_XDP non-zero copy support",
                            "    - octeontx2-af: Set LMT_ENA bit for APR table entries",
                            "    - octeontx2-af: Fix APR entry mapping based on APR_LMT_CFG",
                            "    - clk: s2mps11: initialise clk_hw_onecell_data::num before accessing",
                            "      ::hws[] in probe()",
                            "    - can: slcan: allow reception of short error messages",
                            "    - ASoC: SOF: ipc4-control: Use SOF_CTRL_CMD_BINARY as numid for bytes_ext",
                            "    - ASoc: SOF: topology: connect DAI to a single DAI link",
                            "    - ASoC: SOF: ipc4-pcm: Delay reporting is only supported for playback",
                            "      direction",
                            "    - ALSA: hda/realtek: Add quirk for Lenovo Yoga Pro 7 14ASP10",
                            "    - llc: fix data loss when reading from a socket in llc_ui_recvmsg()",
                            "    - can: kvaser_pciefd: Continue parsing DMA buf after dropped RX",
                            "    - thermal: intel: x86_pkg_temp_thermal: Fix bogus trip temperature",
                            "    - drm/edid: fixed the bug that hdr metadata was not reset",
                            "    - arm64: dts: marvell: uDPU: define pinctrl state for alarm LEDs",
                            "    - smb: client: Reset all search buffer pointers when releasing buffer",
                            "    - Input: xpad - add more controllers",
                            "    - memcg: always call cond_resched() after fn()",
                            "    - mm/page_alloc.c: avoid infinite retries caused by cpuset race",
                            "    - Revert \"arm64: dts: allwinner: h6: Use RSB for AXP805 PMIC connection\"",
                            "    - ksmbd: fix stream write failure",
                            "    - spi: spi-fsl-dspi: restrict register range for regmap access",
                            "    - spi: spi-fsl-dspi: Halt the module after a new message transfer",
                            "    - spi: spi-fsl-dspi: Reset SR flags before sending a new message",
                            "    - serial: sh-sci: Save and restore more registers",
                            "    - watchdog: aspeed: fix 64-bit division",
                            "    - pinctrl: tegra: Fix off by one in tegra_pinctrl_get_group()",
                            "    - i3c: master: svc: Fix implicit fallthrough in svc_i3c_master_ibi_work()",
                            "    - drm/gem: Internally test import_attach for imported objects",
                            "    - can: kvaser_pciefd: Force IRQ edge in case of nested IRQ",
                            "    - af_unix: Return struct unix_sock from unix_get_socket().",
                            "    - af_unix: Run GC on only one CPU.",
                            "    - af_unix: Try to run GC async.",
                            "    - af_unix: Replace BUG_ON() with WARN_ON_ONCE().",
                            "    - af_unix: Remove io_uring code for GC.",
                            "    - af_unix: Remove CONFIG_UNIX_SCM.",
                            "    - [Config] af_unix: remove UNIX_SCM config option",
                            "    - af_unix: Allocate struct unix_vertex for each inflight AF_UNIX fd.",
                            "    - af_unix: Allocate struct unix_edge for each inflight AF_UNIX fd.",
                            "    - af_unix: Link struct unix_edge when queuing skb.",
                            "    - af_unix: Bulk update unix_tot_inflight/unix_inflight when queuing skb.",
                            "    - af_unix: Iterate all vertices by DFS.",
                            "    - af_unix: Detect Strongly Connected Components.",
                            "    - af_unix: Save listener for embryo socket.",
                            "    - af_unix: Fix up unix_edge.successor for embryo socket.",
                            "    - af_unix: Save O(n) setup of Tarjan's algo.",
                            "    - af_unix: Skip GC if no cycle exists.",
                            "    - af_unix: Avoid Tarjan's algorithm if unnecessary.",
                            "    - af_unix: Assign a unique index to SCC.",
                            "    - af_unix: Detect dead SCC.",
                            "    - Revert \"UBUNTU: SAUCE: af_unix: Fix GC compatibility with upstream OOB",
                            "      refcount changes\"",
                            "    - af_unix: Replace garbage collection algorithm.",
                            "    - af_unix: Remove lock dance in unix_peek_fds().",
                            "    - af_unix: Try not to hold unix_gc_lock during accept().",
                            "    - af_unix: Don't access successor in unix_del_edges() during GC.",
                            "    - af_unix: Add dead flag to struct scm_fp_list.",
                            "    - af_unix: Fix garbage collection of embryos carrying OOB with SCM_RIGHTS",
                            "    - af_unix: Fix uninit-value in __unix_walk_scc()",
                            "    - SAUCE: Revert \"af_unix: Don't return OOB skb in manage_oob().\"",
                            "    - SAUCE: Revert \"af_unix: Move spin_lock() in manage_oob().\"",
                            "    - SAUCE: Revert \"af_unix: Rename unlinked_skb in manage_oob().\"",
                            "    - SAUCE: Revert \"af_unix: Remove single nest in manage_oob().\"",
                            "    - SAUCE: Revert \"af_unix: Don't call skb_get() for OOB skb.\"",
                            "    - af_unix: Define locking order for unix_table_double_lock().",
                            "    - af_unix: Define locking order for U_LOCK_SECOND in",
                            "      unix_state_double_lock().",
                            "    - af_unix: Define locking order for U_RECVQ_LOCK_EMBRYO in",
                            "      unix_collect_skb().",
                            "    - af_unix: Don't call skb_get() for OOB skb.",
                            "    - af_unix: Don't leave consecutive consumed OOB skbs.",
                            "    - af_unix: Remove single nest in manage_oob().",
                            "    - af_unix: Rename unlinked_skb in manage_oob().",
                            "    - af_unix: Move spin_lock() in manage_oob().",
                            "    - af_unix: Don't return OOB skb in manage_oob().",
                            "    - arm64: dts: qcom: ipq9574: Add missing properties for cryptobam",
                            "    - arm64: dts: qcom: sm8350: Fix typo in pil_camera_mem node",
                            "    - arm64: dts: qcom: sm8450: Add missing properties for cryptobam",
                            "    - arm64: dts: qcom: sm8550: Add missing properties for cryptobam",
                            "    - arm64: dts: ti: k3-am68-sk: Fix regulator hierarchy",
                            "    - perf/arm-cmn: Fix REQ2/SNP2 mixup",
                            "    - perf/arm-cmn: Initialise cmn->cpu earlier",
                            "    - coredump: fix error handling for replace_fd()",
                            "    - dmaengine: idxd: cdev: Fix uninitialized use of sva in idxd_cdev_open",
                            "    - HID: quirks: Add ADATA XPG alpha wireless mouse support",
                            "    - nfs: don't share pNFS DS connections between net namespaces",
                            "    - platform/x86: thinkpad_acpi: Support also NEC Lavie X1475JAS",
                            "    - um: let 'make clean' properly clean underlying SUBARCH as well",
                            "    - drm/amd/display: fix link_set_dpms_off multi-display MST corner case",
                            "    - phy: starfive: jh7110-usb: Fix USB 2.0 host occasional detection failure",
                            "    - spi: spi-sun4i: fix early activation",
                            "    - nvme-pci: add NVME_QUIRK_NO_DEEPEST_PS quirk for SOLIDIGM P44 Pro",
                            "    - NFS: Avoid flushing data while holding directory locks in nfs_rename()",
                            "    - platform/x86: fujitsu-laptop: Support Lifebook S2110 hotkeys",
                            "    - platform/x86: thinkpad_acpi: Ignore battery threshold change event",
                            "      notification",
                            "    - net: ethernet: ti: am65-cpsw: Lower random mac address error print to",
                            "      info",
                            "    - dma/mapping.c: dev_dbg support for dma_addressing_limited",
                            "    - mei: vsc: Use struct vsc_tp_packet as vsc-tp tx_buf and rx_buf type",
                            "    - vhost_task: fix vhost_task_create() documentation",
                            "    - dma-mapping: Fix warning reported for missing prototype",
                            "    - fs/buffer: split locking for pagecache lookups",
                            "    - fs/buffer: introduce sleeping flavors for pagecache lookups",
                            "    - fs/buffer: use sleeping version of __find_get_block()",
                            "    - fs/ocfs2: use sleeping version of __find_get_block()",
                            "    - fs/jbd2: use sleeping version of __find_get_block()",
                            "    - fs/ext4: use sleeping version of sb_find_get_block()",
                            "    - drm/amd/display: Enable urgent latency adjustment on DCN35",
                            "    - iommufd: Extend IOMMU_GET_HW_INFO to report PASID capability",
                            "    - cifs: Set default Netbios RFC1001 server name to hostname in UNC",
                            "    - ASoC: codecs: wsa884x: Correct VI sense channel mask",
                            "    - ASoC: codecs: wsa883x: Correct VI sense channel mask",
                            "    - thermal/drivers/mediatek/lvts: Start sensor interrupts disabled",
                            "    - Bluetooth: btmtksdio: Prevent enabling interrupts after IRQ handler",
                            "      removal",
                            "    - drm/amdgpu/discovery: check ip_discovery fw file available",
                            "    - drm/amdkfd: set precise mem ops caps to disabled for gfx 11 and 12",
                            "    - xen/pci: Do not register devices with segments >= 0x10000",
                            "    - drm/amdgpu: Skip pcie_replay_count sysfs creation for VF",
                            "    - cgroup/rstat: avoid disabling irqs for O(num_cpu)",
                            "    - wifi: mt76: mt7996: fix SER reset trigger on WED reset",
                            "    - wifi: mt76: mt7925: load the appropriate CLC data based on hardware type",
                            "    - wifi: mt76: mt7925: fix fails to enter low power mode in suspend state",
                            "    - x86/headers: Replace __ASSEMBLY__ with __ASSEMBLER__ in UAPI headers",
                            "    - x86/cpu/intel: Replace PAT erratum model/family magic numbers with",
                            "      symbolic IFM references",
                            "    - x86/smpboot: Fix INIT delay assignment for extended Intel Families",
                            "    - x86/microcode/intel: Switch to new Intel CPU model defines",
                            "    - x86/microcode: Update the Intel processor flag scan check",
                            "    - blk-cgroup: improve policy registration error handling",
                            "    - drm/amdgpu: release xcp_mgr on exit",
                            "    - drm/amdgpu: adjust drm_firmware_drivers_only() handling",
                            "    - s390/tlb: Use mm_has_pgste() instead of mm_alloc_pgste()",
                            "    - clocksource/drivers/timer-riscv: Stop stimecmp when cpu hotplug",
                            "    - erofs: initialize decompression early",
                            "    - clk: qcom: lpassaudiocc-sc7280: Add support for LPASS resets for QCM6490",
                            "    - posix-timers: Ensure that timer initialization is fully visible",
                            "    - net: stmmac: dwmac-rk: Validate GRF and peripheral GRF during probe",
                            "    - net: hsr: Fix PRP duplicate detection",
                            "    - PNP: Expand length of fixup id string",
                            "    - arm64/mm: Check pmd_table() in pmd_trans_huge()",
                            "    - wifi: iwlwifi: mark Br device not integrated",
                            "    - wifi: mac80211: fix warning on disconnect during failed ML reconf",
                            "    - wifi: mac80211_hwsim: Fix MLD address translation",
                            "    - badblocks: Fix a nonsense WARN_ON() which checks whether a u64 variable",
                            "      < 0",
                            "    - coresight-etb10: change etb_drvdata spinlock's type to raw_spinlock_t",
                            "    - misc: pci_endpoint_test: Give disabled BARs a distinct error code",
                            "    - drm/amdkfd: Set per-process flags only once for gfx9/10/11/12",
                            "    - drm/xe: Retry BO allocation",
                            "    - soc: samsung: include linux/array_size.h where needed",
                            "    - usb: xhci: set page size to the xHCI-supported size",
                            "    - soc: mediatek: mtk-mutex: Add DPI1 SOF/EOF to MT8188 mutex tables",
                            "    - drm/amd/display: Ensure DMCUB idle before reset on DCN31/DCN35",
                            "    - drm/amd/display: Fix p-state type when p-state is unsupported",
                            "    - perf/core: Clean up perf_try_init_event()",
                            "    - net: phy: nxp-c45-tja11xx: add match_phy_device to TJA1103/TJA1104",
                            "    - dpll: Add an assertion to check freq_supported_num",
                            "    - ublk: enforce ublks_max only for unprivileged devices",
                            "    - scsi: logging: Fix scsi_logging_level bounds",
                            "    - ublk: complete command synchronously on error",
                            "    - drm/xe: xe_gen_wa_oob: replace program_invocation_short_name",
                            "    - bpf: Search and add kfuncs in struct_ops prologue and epilogue",
                            "    - drm/amd/display: fix dcn4x init failed",
                            "    - net/mlx5e: Add correct match to check IPSec syndromes for switchdev mode",
                            "    - scsi: mpi3mr: Update timestamp only for supervisor IOCs",
                            "    - scsi: scsi_debug: First fixes for tapes",
                            "    - net: ipv6: Init tunnel link-netns before registering dev",
                            "    - drm/amdgpu: remove all KFD fences from the BO on release",
                            "    - eeprom: ee1004: Check chip before probing",
                            "    - drm/amd/pm: Fetch current power limit from PMFW",
                            "    - drm/amd/display: DCN35 set min dispclk to 50Mhz",
                            "    - drm/amd/display: Fix DCN35 set min dispclk logic",
                            "    - drm/amd/display: Guard against setting dispclk low when active",
                            "    - drm/amd/display: Fix BT2020 YCbCr limited/full range input",
                            "    - drm/amd/display: Read LTTPR ALPM caps during link cap retrieval",
                            "    - hrtimers: Replace hrtimer_clock_to_base_table with switch-case",
                            "    - firmware: arm_ffa: Handle the presence of host partition in the",
                            "      partition info",
                            "    - firmware: xilinx: Dont send linux address to get fpga config get status",
                            "    - drm/xe: Stop ignoring errors from xe_ttm_stolen_mgr_init()",
                            "    - x86/ibt: Handle FineIBT in handle_cfi_failure()",
                            "    - soundwire: cadence_master: set frame shape and divider based on actual",
                            "      clk freq",
                            "    - net: stmmac: dwmac-loongson: Set correct {tx,rx}_fifo_size",
                            "    - drm/amdkfd: fix missing L2 cache info in topology",
                            "    - drm/amd/display: pass calculated dram_speed_mts to dml2",
                            "    - drm/amd/pm: Skip P2S load for SMU v13.0.12",
                            "    - drm/amd/display: Support multiple options during psr entry.",
                            "    - drm/amdgpu: Use active umc info from discovery",
                            "    - net/mlx5: XDP, Enable TX side XDP multi-buffer support",
                            "    - wifi: ath12k: fix the ampdu id fetch in the HAL_RX_MPDU_START TLV",
                            "    - wifi: iwlwifi: use correct IMR dump variable",
                            "    - wifi: mac80211: set ieee80211_prep_tx_info::link_id upon Auth Rx",
                            "    - powerpc/pseries/iommu: create DDW for devices with DMA mask less than",
                            "      64-bits",
                            "    - wifi: rtw89: coex: Assign value over than 0 to avoid firmware timer hang",
                            "    - wifi: rtw89: fw: validate multi-firmware header before getting its size",
                            "    - wifi: rtw89: fw: validate multi-firmware header before accessing",
                            "    - wifi: rtw89: call power_on ahead before selecting firmware",
                            "    - net: page_pool: avoid false positive warning if NAPI was never added",
                            "    - media: qcom: camss: Add default case in vfe_src_pad_code",
                            "    - drm/rockchip: vop2: Improve display modes handling on RK3588 HDMI0",
                            "    - tools: ynl-gen: don't output external constants",
                            "    - ice: init flow director before RDMA",
                            "    - wifi: ath12k: Fetch regdb.bin file from board-2.bin",
                            "    - drm/nouveau: fix the broken marco GSP_MSG_MAX_SIZE",
                            "    - wifi: ath11k: Use dma_alloc_noncoherent for rx_tid buffer allocation",
                            "    - wifi: rtw89: coex: Separated Wi-Fi connecting event from Wi-Fi scan",
                            "      event",
                            "    - drm/xe/sa: Always call drm_suballoc_manager_fini()",
                            "    - drm/xe: Reject BO eviction if BO is bound to current VM",
                            "    - smb: server: smb2pdu: check return value of xa_store()",
                            "    - ACPI: platform-profile: add platform_profile_cycle()",
                            "    - platform/x86: ideapad-laptop: add support for some new buttons",
                            "    - ALSA: usb-audio: Fix duplicated name in MIDI substream names",
                            "    - btrfs: handle empty eb->folios in num_extent_folios()",
                            "    - xfrm: Fix UDP GRO handling for some corner cases",
                            "    - idpf: fix idpf_vport_splitq_napi_poll()",
                            "    - net: dsa: microchip: update tag_ksz masks for KSZ9477 family",
                            "    - net: dsa: microchip: linearize skb for tail-tagging switches",
                            "    - vmxnet3: update MTU after device quiesce",
                            "    - pmdomain: core: Fix error checking in genpd_dev_pm_attach_by_id()",
                            "    - highmem: add folio_test_partial_kmap()",
                            "    - mm: mmap: map MAP_STACK to VM_NOHUGEPAGE only if THP is enabled",
                            "    - nilfs2: fix deadlock warnings caused by lock dependency in init_nilfs()",
                            "    - Bluetooth: btmtksdio: Check function enabled before doing close",
                            "    - Bluetooth: btmtksdio: Do close if SDIO card removed without close",
                            "    - platform/x86: think-lmi: Fix attribute name usage for non-compliant",
                            "      items",
                            "    - err.h: move IOMEM_ERR_PTR() to err.h",
                            "    - gcc-15: make 'unterminated string initialization' just a warning",
                            "    - gcc-15: disable '-Wunterminated-string-initialization' entirely for now",
                            "    - Fix mis-uses of 'cc-option' for warning disablement",
                            "    - bpf: abort verification if env->cur_state->loop_entry != NULL",
                            "    - drm/amdkfd: Correct F8_MODE for gfx950",
                            "    - arm64: dts: qcom: sm8650: Add missing properties for cryptobam",
                            "    - arm64: dts: qcom: x1e80100-qcp: Fix vreg_l2j_1p2 voltage",
                            "    - arm64: dts: qcom: x1e80100-qcp: mark l12b and l15b always-on",
                            "    - arm64: dts: ti: k3-am62-main: Set eMMC clock parent to default",
                            "    - arm64: dts: ti: k3-am62p-j722s-common-main: Set eMMC clock parent to",
                            "      default",
                            "    - arm64: dts: ti: k3-am62x: Remove clock-names property from IMX219",
                            "      overlay",
                            "    - arm64: dts: ti: k3-am62x: Rename I2C switch to I2C mux in IMX219 overlay",
                            "    - arm64: dts: ti: k3-am62x: Rename I2C switch to I2C mux in OV5640 overlay",
                            "    - arm64: dts: ti: k3-am65-main: Fix sdhci node properties",
                            "    - arm64: dts: ti: k3-am65-main: Add missing taps to sdhci0",
                            "    - arm64: dts: ti: k3-j721e-sk: Model CSI2RX connector mux",
                            "    - arm64: dts: ti: k3-j721e-sk: Add support for multiple CAN instances",
                            "    - arm64: dts: ti: k3-j721e-sk: Add DT nodes for power regulators",
                            "    - drm/xe: Save the gt pointer in lrc and drop the tile",
                            "    - Upstream stable to v6.6.93, v6.12.31, v6.12.32",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38053",
                            "    - idpf: fix null-ptr-deref in idpf_features_check",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38055",
                            "    - perf/x86/intel: Fix segfault with PEBS-via-PT with sample_freq",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38057",
                            "    - espintcp: fix skb leaks",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38060",
                            "    - bpf: copy_verifier_state() should copy 'loop_entry' field",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38098",
                            "    - drm/amd/display: Don't treat wb connector as physical in",
                            "      create_validate_stream_for_sink",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38099",
                            "    - Bluetooth: Disable SCO support if READ_VOICE_SETTING is",
                            "      unsupported/broken",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38073",
                            "    - block: fix race between set_blocksize and read paths",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38051",
                            "    - smb: client: Fix use-after-free in cifs_fill_dirent",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38077",
                            "    - platform/x86: dell-wmi-sysman: Avoid buffer overflow in",
                            "      current_password_store()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38078",
                            "    - ALSA: pcm: Fix race of buffer access at PCM OSS layer",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38003",
                            "    - can: bcm: add missing rcu read protection for procfs content",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38004",
                            "    - can: bcm: add locking for bcm_op runtime updates",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38031",
                            "    - padata: do not leak refcount in reorder_work",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38079",
                            "    - crypto: algif_hash - fix double free in hash_accept",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38052",
                            "    - net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38097",
                            "    - espintcp: remove encap socket caching to avoid reference leak",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38058",
                            "    - __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38059",
                            "    - btrfs: avoid NULL pointer dereference if no valid csum tree",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38034",
                            "    - btrfs: correct the order of prelim_ref arguments in btrfs__prelim_ref",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38035",
                            "    - nvmet-tcp: don't restore null sk_state_change",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38037",
                            "    - vxlan: Annotate FDB data races",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38039",
                            "    - net/mlx5e: Avoid WARN_ON when configuring MQPRIO with HTB offload",
                            "      enabled",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38080",
                            "    - drm/amd/display: Increase block_sequence array size",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38040",
                            "    - serial: mctrl_gpio: split disable_ms into sync and no_sync APIs",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38061",
                            "    - net: pktgen: fix access outside of user given buffer in",
                            "      pktgen_thread_write()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38062",
                            "    - genirq/msi: Store the IOMMU IOVA directly in msi_desc instead of",
                            "      iommu_cookie",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38063",
                            "    - dm: fix unconditional IO throttle caused by REQ_PREFLUSH",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38043",
                            "    - firmware: arm_ffa: Set dma_mask for ffa devices",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38044",
                            "    - media: cx231xx: set device_caps for 417",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38065",
                            "    - orangefs: Do not truncate file size",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38066",
                            "    - dm cache: prevent BUG_ON by blocking retries on failed device resumes",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38068",
                            "    - crypto: lzo - Fix compression buffer overrun",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38045",
                            "    - wifi: iwlwifi: fix debug actions order",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38071",
                            "    - x86/mm: Check return value from memblock_phys_alloc_range()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38072",
                            "    - libnvdimm/labels: Fix divide error in nd_label_data_init()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38081",
                            "    - spi-rockchip: Fix register out of bounds access",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38074",
                            "    - vhost-scsi: protect vq->log_used with vq->mutex",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38048",
                            "    - virtio_ring: Fix data race by tagging event_triggered as racy for KCSAN",
                            "",
                            "  * Noble update: upstream stable patchset 2025-11-28 (LP: #2133301) //",
                            "    CVE-2025-38075",
                            "    - scsi: target: iscsi: Fix timeout on deleted connection",
                            "",
                            "  * CAP_PERFMON insufficient to get perf data (LP: #2131046)",
                            "    - SAUCE: perf/core: Allow CAP_PERFMON for paranoid level 4",
                            "",
                            "  * Dell AIO backlight is not working, dell_uart_backlight module is missing",
                            "    (LP: #2083800)",
                            "    - SAUCE: Removed sauce dell-uart-backlight driver",
                            "    - Revert \"UBUNTU: SAUCE: ACPI: video: Dell AIO UART backlight detection\"",
                            "    - platform/x86: Add new Dell UART backlight driver",
                            "    - ACPI: video: Add Dell UART backlight controller detection",
                            "    - SAUCE: dell_uart_backlight: size_t -> ssize_t",
                            "    - ACPI: video: Add backlight=native quirk for Dell OptiPlex 7760 AIO",
                            "    - ACPI: video: Add backlight=native quirk for Dell OptiPlex 5480 AIO",
                            "    - [Config] enable CONFIG_DELL_UART_BACKLIGHT",
                            "",
                            "  * Ubuntu x86_64 6.8 kernels won't build if CONFIG_FB_HYPERV config option is",
                            "    enabled  (LP: #2127971)",
                            "    - fbdev: Introduce devm_register_framebuffer()",
                            "",
                            "  * Run iio_info will be stucked forever (HID-",
                            "    SENSOR-200011.5.auto/iio:device1) (LP: #2102077)",
                            "    - HID: quirks: Add quirk for 2 Chicony Electronics HP 5MP Cameras",
                            "",
                            "  * kernel: sysfs: cannot create duplicate filename",
                            "    '/bus/platform/devices/iTCO_wdt' (LP: #2121997)",
                            "    - i2c: i801: Hide Intel Birch Stream SoC TCO WDT",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344)",
                            "    - fs/xattr.c: fix simple_xattr_list to always include security.* xattrs",
                            "    - selftests/exec: load_address: conform test to TAP format output",
                            "    - binfmt_elf: Leave a gap between .bss and brk",
                            "    - selftests/exec: Build both static and non-static load_address tests",
                            "    - binfmt_elf: Calculate total_size earlier",
                            "    - binfmt_elf: Honor PT_LOAD alignment for static PIE",
                            "    - binfmt_elf: Move brk for static PIE even if ASLR disabled",
                            "    - platform/x86/amd/pmc: Declare quirk_spurious_8042 for MECHREVO Wujie",
                            "      14XA (GX4HRXL)",
                            "    - platform/x86: asus-wmi: Fix wlan_ctrl_by_user detection",
                            "    - cgroup/cpuset: Extend kthread_is_per_cpu() check to all",
                            "      PF_NO_SETAFFINITY tasks",
                            "    - tracing: probes: Fix a possible race in trace_probe_log APIs",
                            "    - tpm: tis: Double the timeout B to 4s",
                            "    - firmware: arm_scmi: Add helper to trace bad messages",
                            "    - firmware: arm_scmi: Add message dump traces for bad and unexpected",
                            "      replies",
                            "    - firmware: arm_scmi: Add support for debug metrics at the interface",
                            "    - [Config] do not enable new support for SCMI debug metrics",
                            "    - firmware: arm_scmi: Track basic SCMI communication debug metrics",
                            "    - iio: adc: ad7266: Fix potential timestamp alignment issue.",
                            "    - iio: adc: ad7768-1: Fix insufficient alignment of timestamp.",
                            "    - iio: chemical: sps30: use aligned_s64 for timestamp",
                            "    - HID: thrustmaster: fix memory leak in thrustmaster_interrupts()",
                            "    - spi: loopback-test: Do not split 1024-byte hexdumps",
                            "    - Bluetooth: MGMT: Fix MGMT_OP_ADD_DEVICE invalid device flags",
                            "    - tools: ynl: ethtool.py: Output timestamping statistics from tsinfo-get",
                            "      operation",
                            "    - tools/net/ynl: ethtool: fix crash when Hardware Clock info is missing",
                            "    - mctp: no longer rely on net->dev_index_head[]",
                            "    - net: mctp: Ensure keys maintain only one ref to corresponding dev",
                            "    - ALSA: seq: Fix delivery of UMP events to group ports",
                            "    - ALSA: ump: Fix a typo of snd_ump_stream_msg_device_info",
                            "    - net: dsa: sja1105: discard incoming frames in BR_STATE_LISTENING",
                            "    - nvme-pci: make nvme_pci_npages_prp() __always_inline",
                            "    - nvme-pci: acquire cq_poll_lock in nvme_poll_irqdisable",
                            "    - ALSA: sh: SND_AICA should depend on SH_DMA_API",
                            "    - qlcnic: fix memory leak in qlcnic_sriov_channel_cfg_cmd()",
                            "    - octeontx2-pf: macsec: Fix incorrect max transmit size in TX secy",
                            "    - net: ethernet: mtk_eth_soc: fix typo for declaration MT7988 ESW",
                            "      capability",
                            "    - octeontx2-af: Fix CGX Receive counters",
                            "    - tsnep: fix timestamping with a stacked DSA driver",
                            "    - NFSv4/pnfs: Reset the layout state after a layoutreturn",
                            "    - udf: Make sure i_lenExtents is uptodate on inode eviction",
                            "    - LoongArch: Prevent cond_resched() occurring within kernel-fpu",
                            "    - LoongArch: Save and restore CSR.CNTC for hibernation",
                            "    - LoongArch: Fix MAX_REG_OFFSET calculation",
                            "    - LoongArch: uprobes: Remove user_{en,dis}able_single_step()",
                            "    - LoongArch: uprobes: Remove redundant code about resume_era",
                            "    - drm/amd/display: Correct the reply value when AUX write incomplete",
                            "    - drm/amd/display: Avoid flooding unnecessary info messages",
                            "    - ACPI: PPTT: Fix processor subtable walk",
                            "    - ALSA: es1968: Add error handling for snd_pcm_hw_constraint_pow2()",
                            "    - ALSA: usb-audio: Add sample rate quirk for Audioengine D1",
                            "    - ALSA: usb-audio: Add sample rate quirk for Microdia JP001 USB Camera",
                            "    - hv_netvsc: Use vmbus_sendpacket_mpb_desc() to send VMBus messages",
                            "    - hv_netvsc: Preserve contiguous PFN grouping in the page buffer array",
                            "    - hv_netvsc: Remove rmsg_pgcnt",
                            "    - Drivers: hv: Allow vmbus_sendpacket_mpb_desc() to create multiple ranges",
                            "    - Drivers: hv: vmbus: Remove vmbus_sendpacket_pagebuffer()",
                            "    - ftrace: Fix preemption accounting for stacktrace trigger command",
                            "    - ftrace: Fix preemption accounting for stacktrace filter command",
                            "    - tracing: samples: Initialize trace_array_printk() with the correct",
                            "      function",
                            "    - phy: Fix error handling in tegra_xusb_port_init",
                            "    - phy: renesas: rcar-gen3-usb2: Fix role detection on unbind/bind",
                            "    - phy: renesas: rcar-gen3-usb2: Set timing registers only once",
                            "    - scsi: sd_zbc: block: Respect bio vector limits for REPORT ZONES buffer",
                            "    - smb: client: fix memory leak during error handling for POSIX mkdir",
                            "    - spi: tegra114: Use value to check for invalid delays",
                            "    - net: qede: Initialize qede_ll_ops with designated initializer",
                            "    - dmaengine: ti: k3-udma: Use cap_mask directly from dma_device structure",
                            "      instead of a local copy",
                            "    - dmaengine: idxd: fix memory leak in error handling path of",
                            "      idxd_setup_wqs",
                            "    - dmaengine: idxd: fix memory leak in error handling path of",
                            "      idxd_setup_engines",
                            "    - dmaengine: idxd: fix memory leak in error handling path of",
                            "      idxd_setup_groups",
                            "    - dmaengine: idxd: Add missing cleanup for early error out in",
                            "      idxd_setup_internals",
                            "    - dmaengine: idxd: Add missing cleanups in cleanup internals",
                            "    - dmaengine: idxd: Add missing idxd cleanup to fix memory leak in remove",
                            "      call",
                            "    - dmaengine: idxd: fix memory leak in error handling path of",
                            "      idxd_pci_probe",
                            "    - LoongArch: Explicitly specify code model in Makefile",
                            "    - SAUCE: Revert \"memblock: Accept allocated memory before use in",
                            "      memblock_double_array()\"",
                            "    - phy: tegra: xusb: remove a stray unlock",
                            "    - drivers/platform/x86/amd: pmf: Check for invalid sideloaded Smart PC",
                            "      Policies",
                            "    - drivers/platform/x86/amd: pmf: Check for invalid Smart PC Policies",
                            "    - uio_hv_generic: Fix sysfs creation path for ring buffer",
                            "    - KVM: Add member to struct kvm_gfn_range to indicate private/shared",
                            "    - KVM: x86/mmu: Prevent installing hugepages when mem attributes are",
                            "      changing",
                            "    - iio: chemical: pms7003: use aligned_s64 for timestamp",
                            "    - iio: pressure: mprls0025pa: use aligned_s64 for timestamp",
                            "    - net: dsa: b53: prevent standalone from trying to forward to other ports",
                            "    - netlink: specs: tc: fix a couple of attribute names",
                            "    - LoongArch: Move __arch_cpu_idle() to .cpuidle.text section",
                            "    - btrfs: fix discard worker infinite loop after disabling discard",
                            "    - btrfs: fix folio leak in submit_one_async_extent()",
                            "    - btrfs: add back warning for mount option commit values exceeding 300",
                            "    - drm/amdgpu: fix incorrect MALL size for GFX1151",
                            "    - gpio: pca953x: fix IRQ storm on system wake up",
                            "    - kbuild: Disable -Wdefault-const-init-unsafe",
                            "    - mm: userfaultfd: correct dirty flags set for both present and swap pte",
                            "    - accel/ivpu: Rename ivpu_log_level to fw_log_level",
                            "    - accel/ivpu: Reset fw log on cold boot",
                            "    - accel/ivpu: Refactor functions in ivpu_fw_log.c",
                            "    - drm/fbdev-dma: Support struct drm_driver.fbdev_probe",
                            "    - Upstream stable to v6.6.92, v6.12.30",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-37968",
                            "    - iio: light: opt3001: fix deadlock due to concurrent flag access",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38011",
                            "    - drm/amdgpu: csa unmap use uninterruptible lock",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-21931",
                            "    - hwpoison, memory_hotplug: lock folio before unmap hwpoisoned folio",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-37960",
                            "    - memblock: Accept allocated memory before use in memblock_double_array()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-37967",
                            "    - usb: typec: ucsi: displayport: Fix deadlock",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-22102",
                            "    - Bluetooth: btnxpuart: Fix kernel panic during FW release",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38008",
                            "    - mm/page_alloc: fix race condition in unaccepted memory handling",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38014",
                            "    - dmaengine: idxd: Refactor remove call with idxd_cleanup() helper",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38015",
                            "    - dmaengine: idxd: fix memory leak in error handling path of idxd_alloc",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38005",
                            "    - dmaengine: ti: k3-udma: Add missing locking",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38009",
                            "    - wifi: mt76: disable napi on driver removal",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38010",
                            "    - phy: tegra: xusb: Use a bitmask for UTMI pad power state tracking",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38095",
                            "    - dma-buf: insert memory barrier before updating num_fences",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38018",
                            "    - net/tls: fix kernel panic when alloc_page failed",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38019",
                            "    - mlxsw: spectrum_router: Fix use-after-free when deleting GRE net devices",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38013",
                            "    - wifi: mac80211: Set n_channels after allocating struct",
                            "      cfg80211_scan_request",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38027",
                            "    - regulator: max20086: fix invalid memory access",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38020",
                            "    - net/mlx5e: Disable MACsec offload for uplink representor profile",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38094",
                            "    - net: cadence: macb: Fix a possible deadlock in macb_halt_tx.",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38006",
                            "    - net: mctp: Don't access ifa_index when missing",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-37992",
                            "    - net_sched: Flush gso_skb list too during ->change()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38023",
                            "    - nfs: handle failure of nfs_get_lock_context in unlock path",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38007",
                            "    - HID: uclogic: Add NULL check in uclogic_input_configured()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-30 (LP: #2130344) //",
                            "    CVE-2025-38024",
                            "    - RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277)",
                            "    - dm: add missing unlock on in dm_keyslot_evict()",
                            "    - arm64: dts: imx8mm-verdin: Link reg_usdhc2_vqmmc to usdhc2",
                            "    - can: mcan: m_can_class_unregister(): fix order of unregistration calls",
                            "    - can: mcp251xfd: mcp251xfd_remove(): fix order of unregistration calls",
                            "    - ksmbd: fix memory leak in parse_lease_state()",
                            "    - SAUCE: Revert \"sch_htb: make htb_deactivate() idempotent\"",
                            "    - sch_htb: make htb_deactivate() idempotent",
                            "    - gre: Fix again IPv6 link-local address generation.",
                            "    - netdevice: add netdev_tx_reset_subqueue() shorthand",
                            "    - net: ethernet: mtk_eth_soc: reset all TX queues on DMA free",
                            "    - can: mcp251xfd: fix TDC setting for low data bit rates",
                            "    - can: gw: fix RCU/BH usage in cgw_create_job()",
                            "    - net: dsa: b53: allow leaky reserved multicast",
                            "    - net: dsa: b53: fix clearing PVID of a port",
                            "    - net: dsa: b53: fix flushing old pvid VLAN on pvid change",
                            "    - net: dsa: b53: fix VLAN ID for untagged vlan on bridge leave",
                            "    - net: dsa: b53: always rejoin default untagged VLAN on bridge leave",
                            "    - net: dsa: b53: fix learning on VLAN unaware bridges",
                            "    - Input: cyttsp5 - ensure minimum reset pulse width",
                            "    - Input: cyttsp5 - fix power control issue on wakeup",
                            "    - Input: xpad - fix Share button on Xbox One controllers",
                            "    - Input: xpad - add support for 8BitDo Ultimate 2 Wireless Controller",
                            "    - Input: synaptics - enable InterTouch on Dynabook Portege X30-D",
                            "    - Input: synaptics - enable InterTouch on Dynabook Portege X30L-G",
                            "    - Input: synaptics - enable InterTouch on Dell Precision M3800",
                            "    - Input: synaptics - enable SMBus for HP Elitebook 850 G1",
                            "    - Input: synaptics - enable InterTouch on TUXEDO InfinityBook Pro 14 v5",
                            "    - staging: iio: adc: ad7816: Correct conditional logic for store mode",
                            "    - staging: axis-fifo: Remove hardware resets for user errors",
                            "    - staging: axis-fifo: Correct handling of tx_fifo_depth for size",
                            "      validation",
                            "    - drm/amd/display: Shift DMUB AUX reply command if necessary",
                            "    - iio: adc: ad7606: fix serial register access",
                            "    - iio: adc: rockchip: Fix clock initialization sequence",
                            "    - iio: adis16201: Correct inclinometer channel resolution",
                            "    - drm/amd/display: Fix the checking condition in dmub aux handling",
                            "    - drm/amd/display: Remove incorrect checking in dmub aux handler",
                            "    - drm/amd/display: Fix wrong handling for AUX_DEFER case",
                            "    - drm/amd/display: Copy AUX read reply data whenever length > 0",
                            "    - usb: uhci-platform: Make the clock really optional",
                            "    - xen: swiotlb: Use swiotlb bouncing if kmalloc allocation demands it",
                            "    - clocksource/i8253: Use raw_spinlock_irqsave() in",
                            "      clockevent_i8253_disable()",
                            "    - x86/microcode: Consolidate the loader enablement checking",
                            "    - ocfs2: switch osb->disable_recovery to enum",
                            "    - ocfs2: implement handshaking with ocfs2 recovery thread",
                            "    - ocfs2: stop quota recovery before disabling quotas",
                            "    - usb: cdnsp: Fix issue with resuming from L1",
                            "    - usb: cdnsp: fix L1 resume issue for RTL_REVISION_NEW_LPM version",
                            "    - usb: gadget: f_ecm: Add get_status callback",
                            "    - usb: gadget: tegra-xudc: ACK ST_RC after clearing CTRL_RUN",
                            "    - usb: gadget: Use get_status callback to set remote wakeup capability",
                            "    - usb: host: tegra: Prevent host controller crash when OTG port is used",
                            "    - usb: typec: tcpm: delay SNK_TRY_WAIT_DEBOUNCE to SRC_TRYWAIT transition",
                            "    - USB: usbtmc: use interruptible sleep in usbtmc_read",
                            "    - usb: usbtmc: Fix erroneous get_stb ioctl error returns",
                            "    - usb: usbtmc: Fix erroneous wait_srq ioctl return",
                            "    - usb: usbtmc: Fix erroneous generic_read ioctl return",
                            "    - iio: accel: adxl367: fix setting odr for activity time update",
                            "    - iio: temp: maxim-thermocouple: Fix potential lack of DMA safe buffer.",
                            "    - types: Complement the aligned types with signed 64-bit one",
                            "    - iio: accel: adxl355: Make timestamp 64-bit aligned using aligned_s64",
                            "    - iio: adc: dln2: Use aligned_s64 for timestamp",
                            "    - MIPS: Fix MAX_REG_OFFSET",
                            "    - drm/panel: simple: Update timings for AUO G101EVN010",
                            "    - do_umount(): add missing barrier before refcount checks in sync case",
                            "    - io_uring: always arm linked timeouts prior to issue",
                            "    - arm64: insn: Add support for encoding DSB",
                            "    - arm64: proton-pack: Expose whether the platform is mitigated by firmware",
                            "    - arm64: proton-pack: Expose whether the branchy loop k value",
                            "    - arm64: proton-pack: Add new CPUs 'k' values for branch mitigation",
                            "    - x86/bpf: Call branch history clearing sequence on exit",
                            "    - x86/bpf: Add IBHF call at end of classic BPF",
                            "    - x86/bhi: Do not set BHI_DIS_S in 32-bit mode",
                            "    - x86/speculation: Simplify and make CALL_NOSPEC consistent",
                            "    - x86/speculation: Add a conditional CS prefix to CALL_NOSPEC",
                            "    - x86/speculation: Remove the extra #ifdef around CALL_NOSPEC",
                            "    - Documentation: x86/bugs/its: Add ITS documentation",
                            "    - x86/its: Enumerate Indirect Target Selection (ITS) bug",
                            "    - x86/its: Add support for ITS-safe indirect thunk",
                            "    - [Config] enable Indirect Target Selection mitigation",
                            "    - x86/its: Add support for ITS-safe return thunk",
                            "    - x86/its: Enable Indirect Target Selection mitigation",
                            "    - x86/its: Add \"vmexit\" option to skip mitigation on some CPUs",
                            "    - x86/its: Add support for RSB stuffing mitigation",
                            "    - x86/its: Align RETs in BHB clear sequence to avoid thunking",
                            "    - x86/ibt: Keep IBT disabled during alternative patching",
                            "    - x86/its: Use dynamic thunks for indirect branches",
                            "    - x86/its: Fix build errors when CONFIG_MODULES=n",
                            "    - x86/its: FineIBT-paranoid vs ITS",
                            "    - x86/its: Fix build error for its_static_thunk()",
                            "    - firmware: arm_scmi: Fix timeout checks on polling path",
                            "    - s390/entry: Fix last breaking event handling in case of stack corruption",
                            "    - erofs: ensure the extra temporary copy is valid for shortened bvecs",
                            "    - net: dsa: b53: keep CPU port always tagged again",
                            "    - net: dsa: b53: do not allow to configure VLAN 0",
                            "    - net: dsa: b53: do not program vlans when vlan filtering is off",
                            "    - net: dsa: b53: fix toggling vlan_filtering",
                            "    - net: dsa: b53: do not set learning and unicast/multicast on up",
                            "    - rust: clean Rust 1.88.0's warning about `clippy::disallowed_macros`",
                            "      configuration",
                            "    - mm/userfaultfd: fix uninitialized output field for -EAGAIN race",
                            "    - selftests/mm: compaction_test: support platform with huge mount of",
                            "      memory",
                            "    - selftests/mm: fix a build failure on powerpc",
                            "    - io_uring: ensure deferred completions are flushed for multishot",
                            "    - iio: imu: inv_mpu6050: align buffer for timestamp",
                            "    - drm/xe: Add page queue multiplier",
                            "    - usb: dwc3: gadget: Make gadget_wakeup asynchronous",
                            "    - riscv: misaligned: Add handling for ZCB instructions",
                            "    - riscv: misaligned: factorize trap handling",
                            "    - riscv: misaligned: enable IRQs while handling misaligned accesses",
                            "    - selftest/x86/bugs: Add selftests for ITS",
                            "    - Upstream stable to v6.6.91, v6.12.29",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37960",
                            "    - memblock: Accept allocated memory before use in memblock_double_array()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37957",
                            "    - KVM: SVM: Forcibly leave SMM mode on SHUTDOWN interception",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37963",
                            "    - arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37948",
                            "    - arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37994",
                            "    - usb: typec: ucsi: displayport: Fix NULL pointer access",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37995",
                            "    - module: ensure that kobject_put() is safe for module type kobjects",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37949",
                            "    - xenbus: Use kref to track req lifetime",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37954",
                            "    - smb: client: Avoid race in open_cached_dir with lease breaks",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37951",
                            "    - drm/v3d: Add job to pending list if the reset was skipped",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37969",
                            "    - iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_tagged_fifo",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37970",
                            "    - iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_fifo",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37972",
                            "    - Input: mtk-pmic-keys - fix possible null pointer dereference",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37959",
                            "    - bpf: Scrub packet on bpf_redirect_peer",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37961",
                            "    - ipvs: fix uninit-value for saddr in do_output_route4",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37998",
                            "    - openvswitch: Fix unsafe attribute parsing in output_userspace()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37952",
                            "    - ksmbd: Fix UAF in __close_file_table_ids",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37947",
                            "    - ksmbd: prevent out-of-bounds stream writes by validating *pos",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37956",
                            "    - ksmbd: prevent rename with empty string",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-29 (LP: #2130277) //",
                            "    CVE-2025-37973",
                            "    - wifi: cfg80211: fix out-of-bounds access during multi-link element",
                            "      defragmentation",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559)",
                            "    - ALSA: usb-audio: Add retry on -EPROTO from usb_set_interface()",
                            "    - ALSA: usb-audio: Add second USB ID for Jabra Evolve 65 headset",
                            "    - btrfs: fix COW handling in run_delalloc_nocow()",
                            "    - drm/fdinfo: Protect against driver unbind",
                            "    - EDAC/altera: Test the correct error reg offset",
                            "    - EDAC/altera: Set DDR and SDMMC interrupt mask before registration",
                            "    - i2c: imx-lpi2c: Fix clock count when probe defers",
                            "    - arm64: errata: Add missing sentinels to Spectre-BHB MIDR arrays",
                            "    - amd-xgbe: Fix to ensure dependent features are toggled with RX checksum",
                            "      offload",
                            "    - mm/memblock: pass size instead of end to memblock_set_node()",
                            "    - mm/memblock: repeat setting reserved region nid if array is doubled",
                            "    - mmc: renesas_sdhi: Fix error handling in renesas_sdhi_probe",
                            "    - spi: tegra114: Don't fail set_cs_timing when delays are zero",
                            "    - tracing: Do not take trace_event_sem in print_event_fields()",
                            "    - dm-integrity: fix a warning on invalid table line",
                            "    - dm: always update the array size in realloc_argv on success",
                            "    - iommu/vt-d: Apply quirk_iommu_igfx for 8086:0044 (QM57/QS57)",
                            "    - platform/x86/amd: pmc: Require at least 2.5 seconds between HW sleep",
                            "      cycles",
                            "    - platform/x86/intel-uncore-freq: Fix missing uncore sysfs during CPU",
                            "      hotplug",
                            "    - smb: client: fix zero length for mkdir POSIX create context",
                            "    - cpufreq: Avoid using inconsistent policy->min and policy->max",
                            "    - cpufreq: Fix setting policy limits when frequency tables are used",
                            "    - PCI: imx6: Skip controller_id generation logic for i.MX7D",
                            "    - ASoC: soc-pcm: Fix hw_params() and DAPM widget sequence",
                            "    - powerpc/boot: Check for ld-option support",
                            "    - drm/i915/pxp: fix undefined reference to",
                            "      `intel_pxp_gsccs_is_ready_for_sessions'",
                            "    - powerpc/boot: Fix dash warning",
                            "    - net/mlx5: E-Switch, Initialize MAC Address for Default GID",
                            "    - net/mlx5: E-switch, Fix error handling for enabling roce",
                            "    - net: Rename mono_delivery_time to tstamp_type for scalabilty",
                            "    - Bluetooth: L2CAP: copy RX timestamp to new fragments",
                            "    - net: mscc: ocelot: treat 802.1ad tagged traffic as 802.1Q-untagged",
                            "    - net: mscc: ocelot: delete PVID VLAN when readding it as non-PVID",
                            "    - net: ethernet: mtk-star-emac: rearm interrupts in rx_poll only when",
                            "      advised",
                            "    - pds_core: delete VF dev on reset",
                            "    - pds_core: make pdsc_auxbus_dev_del() void",
                            "    - pds_core: specify auxiliary_device to be created",
                            "    - nvme-pci: fix queue unquiesce check on slot_reset",
                            "    - net: dlink: Correct endianness handling of led_mode",
                            "    - net: mdio: mux-meson-gxl: set reversed bit when using internal phy",
                            "    - igc: fix lock order in igc_ptp_reset",
                            "    - net: dsa: felix: fix broken taprio gate states after clock jump",
                            "    - net: ipv6: fix UDPv6 GSO segmentation with NAT",
                            "    - bnxt_en: Fix coredump logic to free allocated buffer",
                            "    - bnxt_en: Fix ethtool -d byte order for 32-bit values",
                            "    - nvme-tcp: fix premature queue removal and I/O failover",
                            "    - net: fec: ERR007885 Workaround for conventional TX",
                            "    - net: hns3: store rx VLAN tag offload state for VF",
                            "    - net: hns3: fix an interrupt residual problem",
                            "    - net: hns3: fixed debugfs tm_qset size",
                            "    - net: hns3: defer calling ptp_clock_register()",
                            "    - net: vertexcom: mse102x: Fix possible stuck of SPI interrupt",
                            "    - net: vertexcom: mse102x: Fix LEN_MASK",
                            "    - net: vertexcom: mse102x: Add range check for CMD_RTS",
                            "    - net: vertexcom: mse102x: Fix RX error handling",
                            "    - ASoC: Use of_property_read_bool()",
                            "    - ASoC: soc-core: Stop using of_property_read_bool() for non-boolean",
                            "      properties",
                            "    - firmware: arm_ffa: Skip Rx buffer ownership release if not acquired",
                            "    - ARM: dts: opos6ul: add ksz8081 phy properties",
                            "    - arm64: dts: st: Adjust interrupt-controller for stm32mp25 SoCs",
                            "    - arm64: dts: st: Use 128kB size for aliased GIC400 register access on",
                            "      stm32mp25 SoCs",
                            "    - Revert \"drm/meson: vclk: fix calculation of 59.94 fractional rates\"",
                            "    - xhci: Add helper to set an interrupters interrupt moderation interval",
                            "    - xhci: support setting interrupt moderation IMOD for secondary",
                            "      interrupters",
                            "    - xhci: Limit time spent with xHC interrupts disabled during bus resume",
                            "    - kernel: param: rename locate_module_kobject",
                            "    - kernel: globalize lookup_or_create_module_kobject()",
                            "    - drivers: base: handle module_kobject creation",
                            "    - iommu/arm-smmu-v3: Use the new rb tree helpers",
                            "    - iommu/arm-smmu-v3: Fix iommu_device_probe bug due to duplicated stream",
                            "      ids",
                            "    - drm/amd/display: Add scoped mutexes for amdgpu_dm_dhcp",
                            "    - dm: fix copying after src array boundaries",
                            "    - bpf: Fix BPF_INTERNAL namespace import",
                            "    - binder: fix offset calculation in debug log",
                            "    - perf/x86/intel: Only check the group flag for X86 leader",
                            "    - drm: Select DRM_KMS_HELPER from DRM_DEBUG_DP_MST_TOPOLOGY_REFS",
                            "    - iommu/arm-smmu-v3: Fix pgsize_bit for sva domains",
                            "    - pinctrl: imx: Return NULL if no group is matched and found",
                            "    - Bluetooth: hci_conn: Fix not setting timeout for BIG Create Sync",
                            "    - idpf: fix offloads support for encapsulated packets",
                            "    - drm/tests: shmem: Fix memleak",
                            "    - idpf: fix potential memory leak on kcalloc() failure",
                            "    - idpf: protect shutdown from reset",
                            "    - ALSA: hda/realtek: Fix built-mic regression on other ASUS models",
                            "    - bnxt_en: Add missing skb_mark_for_recycle() in bnxt_rx_vlan()",
                            "    - nvme-tcp: select CONFIG_TLS from CONFIG_NVME_TCP_TLS",
                            "    - nvmet-tcp: select CONFIG_TLS from CONFIG_NVME_TARGET_TCP_TLS",
                            "    - accel/ivpu: Fix a typo",
                            "    - drm/xe: Ensure fixed_slice_mode gets set after ccs_mode change",
                            "    - Upstream stable to v6.6.90, v6.12.27, v6.12.28",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37920",
                            "    - xsk: Fix race condition in AF_XDP generic RX path",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37900",
                            "    - iommu: Fix two issues in iommu_copy_struct_from_user()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37931",
                            "    - btrfs: adjust subpage bit start based on sectorsize",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37903",
                            "    - drm/amd/display: Fix slab-use-after-free in hdcp",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37905",
                            "    - firmware: arm_scmi: Balance device refcount when destroying devices",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37933",
                            "    - octeon_ep: Fix host hang issue during device reboot",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37909",
                            "    - net: lan743x: Fix memleak issue when GSO enabled",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37911",
                            "    - bnxt_en: Fix out-of-bound memcpy() during ethtool -w",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37935",
                            "    - net: ethernet: mtk_eth_soc: fix SER panic with 4GB+ RAM",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37891",
                            "    - ALSA: ump: Fix buffer overflow at UMP SysEx message conversion",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37912",
                            "    - ice: Check VF VSI Pointer Value in ice_vc_add_fdir_fltr()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37913",
                            "    - net_sched: qfq: Fix double list add in class with netem as child qdisc",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37914",
                            "    - net_sched: ets: Fix double list add in class with netem as child qdisc",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37915",
                            "    - net_sched: drr: Fix double list add in class with netem as child qdisc",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37916",
                            "    - pds_core: remove write-after-free of client_id",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37917",
                            "    - net: ethernet: mtk-star-emac: fix spinlock recursion issues on rx/tx",
                            "      poll",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37918",
                            "    - Bluetooth: btusb: avoid NULL pointer dereference in skb_dequeue()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37921",
                            "    - vxlan: vnifilter: Fix unlocked deletion of default FDB entry",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37897",
                            "    - wifi: plfxlc: Remove erroneous assert in plfxlc_mac_release",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37922",
                            "    - book3s64/radix : Align section vmemmap start address to PAGE_SIZE",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37923",
                            "    - tracing: Fix oob write in trace_seq_to_buffer()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37924",
                            "    - ksmbd: fix use-after-free in kerberos authentication",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37927",
                            "    - iommu/amd: Fix potential buffer overflow in parse_ivrs_acpihid",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37928",
                            "    - dm-bufio: don't schedule in atomic context",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37990",
                            "    - wifi: brcm80211: fmac: Add error handling for brcmf_usb_dl_writeimage()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37901",
                            "    - irqchip/qcom-mpm: Prevent crash when trying to handle non-wake GPIOs",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37936",
                            "    - perf/x86/intel: KVM: Mask PEBS_ENABLE loaded for guest with vCPU's",
                            "      value.",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37991",
                            "    - parisc: Fix double SIGFPE crash",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-22 (LP: #2129559) //",
                            "    CVE-2025-37930",
                            "    - drm/nouveau: Fix WARN_ON in nouveau_fence_context_kill()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307)",
                            "    - module: sign with sha512 instead of sha1 by default",
                            "    - x86/extable: Remove unused fixup type EX_TYPE_COPY",
                            "    - tracing: Add __string_len() example",
                            "    - tracing: Add __print_dynamic_array() helper",
                            "    - soc: qcom: ice: introduce devm_of_qcom_ice_get",
                            "    - mmc: sdhci-msm: fix dev reference leaked through of_qcom_ice_get",
                            "    - auxdisplay: hd44780: Convert to platform remove callback returning void",
                            "    - auxdisplay: hd44780: Fix an API misuse in hd44780.c",
                            "    - net: dsa: mv88e6xxx: fix internal PHYs for 6320 family",
                            "    - net: dsa: mv88e6xxx: fix VTU methods for 6320 family",
                            "    - ASoC: qcom: q6apm-dai: drop unused 'q6apm_dai_rtd' fields",
                            "    - ASoC: q6apm-dai: schedule all available frames to avoid dsp under-runs",
                            "    - ASoC: q6apm-dai: make use of q6apm_get_hw_pointer",
                            "    - iio: adc: ad7768-1: Move setting of val a bit later to avoid unnecessary",
                            "      return value check",
                            "    - iio: adc: ad7768-1: Fix conversion result sign",
                            "    - arm64: tegra: Remove the Orin NX/Nano suspend key",
                            "    - clk: renesas: r9a07g04[34]: Fix typo for sel_shdi variable",
                            "    - clk: renesas: r9a07g043: Fix HP clock source for RZ/Five",
                            "    - of: resolver: Simplify of_resolve_phandles() using __free()",
                            "    - of: resolver: Fix device node refcount leakage in of_resolve_phandles()",
                            "    - scsi: ufs: qcom: fix dev reference leaked through of_qcom_ice_get",
                            "    - cpufreq/sched: Explicitly synchronize limits_changed flag handling",
                            "    - ceph: Fix incorrect flush end position calculation",
                            "    - dma/contiguous: avoid warning about unused size_bytes",
                            "    - cpufreq: cppc: Fix invalid return value in .get() callback",
                            "    - btrfs: avoid page_lockend underflow in btrfs_punch_hole_lock_range()",
                            "    - scsi: core: Clear flags for scsi_cmnd that did not complete",
                            "    - net: ethernet: mtk_eth_soc: net: revise NETSYSv3 hardware configuration",
                            "    - net: dsa: mt7530: sync driver-specific behavior of MT7531 variants",
                            "    - pds_core: Remove unnecessary check in pds_client_adminq_cmd()",
                            "    - iommu/amd: Return an error if vCPU affinity is set for non-vCPU IRTE",
                            "    - splice: remove duplicate noinline from pipe_clear_nowait",
                            "    - perf/x86: Fix non-sampling (counting) events on certain x86 platforms",
                            "    - LoongArch: Select ARCH_USE_MEMTEST",
                            "    - LoongArch: Make regs_irqs_disabled() more clear",
                            "    - LoongArch: Make do_xyz() exception handlers more robust",
                            "    - virtio_console: fix missing byte order handling for cols and rows",
                            "    - crypto: atmel-sha204a - Set hwrng quality to lowest possible",
                            "    - net: selftests: initialize TCP header and skb payload with zero",
                            "    - net: phy: microchip: force IRQ polling mode for lan88xx",
                            "    - drm/amd/display: Fix gpu reset in multidisplay config",
                            "    - LoongArch: Return NULL from huge_pte_offset() for invalid PMD",
                            "    - LoongArch: Fix panic caused by NULL-PMD in huge_pte_offset()",
                            "    - LoongArch: Remove a bogus reference to ZONE_DMA",
                            "    - io_uring: fix 'sync' handling of io_fallback_tw()",
                            "    - KVM: SVM: Allocate IR data using atomic allocation",
                            "    - cxl/core/regs.c: Skip Memory Space Enable check for RCD and RCH Ports",
                            "    - ata: libata-scsi: Improve CDL control",
                            "    - ata: libata-scsi: Fix ata_mselect_control_ata_feature() return type",
                            "    - ata: libata-scsi: Fix ata_msense_control_ata_feature()",
                            "    - USB: storage: quirk for ADATA Portable HDD CH94",
                            "    - scsi: Improve CDL control",
                            "    - mei: me: add panther lake H DID",
                            "    - KVM: x86: Explicitly treat routing entry type changes as changes",
                            "    - char: misc: register chrdev region with all possible minors",
                            "    - misc: microchip: pci1xxxx: Fix incorrect IRQ status handling during ack",
                            "    - serial: msm: Configure correct working mode before starting earlycon",
                            "    - serial: sifive: lock port in startup()/shutdown() callbacks",
                            "    - USB: serial: ftdi_sio: add support for Abacus Electrics Optical Probe",
                            "    - USB: serial: option: add Sierra Wireless EM9291",
                            "    - USB: serial: simple: add OWON HDS200 series oscilloscope support",
                            "    - usb: chipidea: ci_hdrc_imx: fix call balance of regulator routines",
                            "    - usb: chipidea: ci_hdrc_imx: implement usb_phy_init() error handling",
                            "    - USB: OHCI: Add quirk for LS7A OHCI controller (rev 0x02)",
                            "    - usb: dwc3: xilinx: Prevent spike in reset signal",
                            "    - usb: quirks: add DELAY_INIT quirk for Silicon Motion Flash Drive",
                            "    - usb: quirks: Add delay init quirk for SanDisk 3.2Gen1 Flash Drive",
                            "    - USB: VLI disk crashes if LPM is used",
                            "    - USB: wdm: handle IO errors in wdm_wwan_port_start",
                            "    - USB: wdm: wdm_wwan_port_tx_complete mutex in atomic context",
                            "    - USB: wdm: add annotation",
                            "    - pinctrl: renesas: rza2: Fix potential NULL pointer dereference",
                            "    - MIPS: cm: Detect CM quirks from device tree",
                            "    - crypto: ccp - Add support for PCI device 0x1134",
                            "    - clk: check for disabled clock-provider in of_clk_get_hw_from_clkspec()",
                            "    - parisc: PDT: Fix missing prototype warning",
                            "    - s390/tty: Fix a potential memory leak bug",
                            "    - bpf: bpftool: Setting error code in do_loader()",
                            "    - bpf: Only fails the busy counter check in bpf_cgrp_storage_get if it",
                            "      creates storage",
                            "    - bpf: Reject attaching fexit/fmod_ret to __noreturn functions",
                            "    - mailbox: pcc: Fix the possible race in updation of chan_in_use flag",
                            "    - mailbox: pcc: Always clear the platform ack interrupt first",
                            "    - usb: host: max3421-hcd: Add missing spi_device_id table",
                            "    - fs/ntfs3: Fix WARNING in ntfs_extend_initialized_size",
                            "    - usb: dwc3: gadget: Refactor loop to avoid NULL endpoints",
                            "    - usb: dwc3: gadget: Avoid using reserved endpoints on Intel Merrifield",
                            "    - usb: host: xhci-plat: mvebu: use ->quirks instead of ->init_quirk() func",
                            "    - thunderbolt: Scan retimers after device router has been enumerated",
                            "    - objtool: Silence more KCOV warnings",
                            "    - objtool, panic: Disable SMAP in __stack_chk_fail()",
                            "    - objtool, ASoC: codecs: wcd934x: Remove potential undefined behavior in",
                            "      wcd934x_slim_irq_handler()",
                            "    - objtool, regulator: rk808: Remove potential undefined behavior in",
                            "      rk806_set_mode_dcdc()",
                            "    - objtool, lkdtm: Obfuscate the do_nothing() pointer",
                            "    - ntb: reduce stack usage in idt_scan_mws",
                            "    - ntb_hw_amd: Add NTB PCI ID for new gen CPU",
                            "    - rtc: pcf85063: do a SW reset if POR failed",
                            "    - io_uring: always do atomic put from iowq",
                            "    - sched/isolation: Make CONFIG_CPU_ISOLATION depend on CONFIG_SMP",
                            "    - KVM: s390: Don't use %pK through tracepoints",
                            "    - KVM: s390: Don't use %pK through debug printing",
                            "    - selftests: ublk: fix test_stripe_04",
                            "    - xen: Change xen-acpi-processor dom0 dependency",
                            "    - ACPI: EC: Set ec_no_wakeup for Lenovo Go S",
                            "    - ACPI PPTT: Fix coding mistakes in a couple of sizeof() calls",
                            "    - nvme: multipath: fix return value of nvme_available_path",
                            "    - objtool: Stop UNRET validation on UD2",
                            "    - gpiolib: of: Move Atmel HSMCI quirk up out of the regulator comment",
                            "    - selftests/mincore: Allow read-ahead pages to reach the end of the file",
                            "    - x86/bugs: Use SBPB in write_ibpb() if applicable",
                            "    - x86/bugs: Don't fill RSB on VMEXIT with eIBRS+retpoline",
                            "    - x86/bugs: Don't fill RSB on context switch with eIBRS",
                            "    - nvmet-fc: take tgtport reference only once",
                            "    - cifs: Fix encoding of SMB1 Session Setup Kerberos Request in non-UNICODE",
                            "      mode",
                            "    - timekeeping: Add a lockdep override in tick_freeze()",
                            "    - ext4: make block validity check resistent to sb bh corruption",
                            "    - scsi: hisi_sas: Fix I/O errors caused by hardware port ID changes",
                            "    - scsi: ufs: exynos: Ensure pre_link() executes before",
                            "      exynos_ufs_phy_init()",
                            "    - scsi: pm80xx: Set phy_attached to zero when device is gone",
                            "    - x86/i8253: Call clockevent_i8253_disable() with interrupts disabled",
                            "    - iomap: skip unnecessary ifs_block_is_uptodate check",
                            "    - riscv: Provide all alternative macros all the time",
                            "    - loop: aio inherit the ioprio of original request",
                            "    - spi: tegra210-quad: use WARN_ON_ONCE instead of WARN_ON for timeouts",
                            "    - spi: tegra210-quad: add rate limiting and simplify timeout error message",
                            "    - ubsan: Fix panic from test_ubsan_out_of_bounds",
                            "    - x86/cpu: Add CPU model number for Bartlett Lake CPUs with Raptor Cove",
                            "      cores",
                            "    - x86/pvh: Call C code via the kernel virtual mapping",
                            "    - Revert \"drivers: core: synchronize really_probe() and dev_uevent()\"",
                            "    - driver core: introduce device_set_driver() helper",
                            "    - comedi: jr3_pci: Fix synchronous deletion of timer",
                            "    - net: dsa: mv88e6xxx: fix atu_move_port_mask for 6341 family",
                            "    - net: dsa: mv88e6xxx: enable PVT for 6321 switch",
                            "    - net: dsa: mv88e6xxx: enable .port_set_policy() for 6320 family",
                            "    - net: dsa: mv88e6xxx: enable STU methods for 6320 family",
                            "    - MIPS: cm: Fix warning if MIPS_CM is disabled",
                            "    - objtool: Ignore end-of-section jumps for KCOV/GCOV",
                            "    - objtool: Silence more KCOV warnings, part 2",
                            "    - ALSA: hda/cirrus_scodec_test: Don't select dependencies",
                            "    - ALSA: hda: improve bass speaker support for ASUS Zenbook UM5606WA",
                            "    - ALSA: hda/realtek: Workaround for resume on Dell Venue 11 Pro 7130",
                            "    - ALSA: hda/realtek - Fixed ASUS platform headset Mic issue",
                            "    - net: ethernet: mtk_eth_soc: reapply mdc divider on reset",
                            "    - riscv: Use kvmalloc_array on relocation_hashtable",
                            "    - riscv: module: Allocate PLT entries for R_RISCV_PLT32",
                            "    - ASoC: fsl: fsl_qmc_audio: Reset audio data pointers on TRIGGER_START",
                            "      event",
                            "    - dma-buf/sw_sync: Decrement refcount on error in",
                            "      sw_sync_ioctl_get_deadline()",
                            "    - mm/compaction: fix bug in hugetlb handling pathway",
                            "    - platform/x86: amd: pmf: Fix STT limits",
                            "    - drm/amd/display: Add HP Elitebook 645 to the quirk list for eDP on DP1",
                            "    - drm/amd/display: Add HP Probook 445 and 465 to the quirk list for eDP on",
                            "      DP1",
                            "    - drm/xe/dma_buf: stop relying on placement in unmap",
                            "    - drm/amdgpu: fix warning of drm_mm_clean",
                            "    - arm64/sysreg: Update register fields for ID_AA64MMFR0_EL1",
                            "    - arm64/sysreg: Add register fields for HDFGRTR2_EL2",
                            "    - arm64/sysreg: Add register fields for HDFGWTR2_EL2",
                            "    - arm64/sysreg: Add register fields for HFGITR2_EL2",
                            "    - arm64/sysreg: Add register fields for HFGRTR2_EL2",
                            "    - arm64/sysreg: Add register fields for HFGWTR2_EL2",
                            "    - kbuild: Add '-fno-builtin-wcslen'",
                            "    - drm/amd/display: Temporarily disable hostvm on DCN31",
                            "    - block: remove rq_list_move",
                            "    - bpf: add find_containing_subprog() utility function",
                            "    - selftests/bpf: test for changing packet data from global functions",
                            "    - selftests/bpf: freplace tests for tracking of changes_packet_data",
                            "    - selftests/bpf: validate that tail call invalidates packet pointers",
                            "    - selftests/bpf: extend changes_pkt_data with cases w/o subprograms",
                            "    - media: i2c: imx214: Use subdev active state",
                            "    - media: i2c: imx214: Simplify with dev_err_probe()",
                            "    - media: i2c: imx214: Convert to CCI register access helpers",
                            "    - media: i2c: imx214: Replace register addresses with macros",
                            "    - media: i2c: imx214: Check number of lanes from device tree",
                            "    - media: i2c: imx214: Fix link frequency validation",
                            "    - scsi: ufs: exynos: Move UFS shareability value to drvdata",
                            "    - cgroup/cpuset: Expose cpuset filesystem with cpuset v1 only",
                            "    - cgroup/cpuset-v1: Add missing support for cpuset_v2_mode",
                            "    - vhost-scsi: Add better resource allocation failure handling",
                            "    - vhost-scsi: Fix vhost_scsi_send_bad_target()",
                            "    - vhost-scsi: Fix vhost_scsi_send_status()",
                            "    - scsi: ufs: mcq: Use ufshcd_mcq_req_to_hwq() to simplify updating hwq",
                            "    - riscv: Replace function-like macro by static inline function",
                            "    - bpf: Add namespace to BPF internal symbols",
                            "    - netfilter: fib: avoid lookup if socket is available",
                            "    - drm: panel: jd9365da: fix reset signal polarity in unprepare",
                            "    - drm/amd/display: Force full update in gpu reset",
                            "    - KVM: x86: Take irqfds.lock when adding/deleting IRQ bypass producer",
                            "    - firmware: stratix10-svc: Add of_platform_default_populate()",
                            "    - i3c: master: svc: Add support for Nuvoton npcm845 i3c",
                            "    - 9p/trans_fd: mark concurrent read and writes to p9_conn->err",
                            "    - x86/xen: disable CPU idle and frequency drivers for PVH dom0",
                            "    - nvmet-fc: put ref when assoc->del_work is already scheduled",
                            "    - scsi: ufs: exynos: Move phy calls to .exit() callback",
                            "    - ASoC: fsl_asrc_dma: get codec or cpu dai from backend",
                            "    - xfs: do not check NEEDSREPAIR if ro,norecovery mount.",
                            "    - xfs: Do not allow norecovery mount with quotacheck",
                            "    - xfs: rename xfs_iomap_swapfile_activate to xfs_vm_swap_activate",
                            "    - xfs: flush inodegc before swapon",
                            "    - selftests/bpf: fix bpf_map_redirect call for cpu map test",
                            "    - selftests/bpf: make xdp_cpumap_attach keep redirect prog attached",
                            "    - selftests/bpf: check program redirect in xdp_cpumap_attach",
                            "    - selftests/bpf: Adjust data size to have ETH_HLEN",
                            "    - Revert \"net: dsa: mv88e6xxx: fix internal PHYs for 6320 family\"",
                            "    - iommu: Handle race with default domain setup",
                            "    - media: i2c: imx214: Fix uninitialized variable in imx214_set_ctrl()",
                            "    - usb: typec: class: Unlocked on error in typec_register_partner()",
                            "    - Upstream stable to v6.6.89, v6.12.25, v6.12.26",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37986",
                            "    - usb: typec: class: Invalidate USB device pointers on partner",
                            "      unregistration",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37809",
                            "    - usb: typec: class: Fix NULL pointer access",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37816",
                            "    - mei: vsc: Fix fortify-panic caused by invalid counted_by() use",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37822",
                            "    - riscv: uprobes: Add missing fence.i after building the XOL buffer",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37987",
                            "    - pds_core: Prevent possible adminq overflow/stuck condition",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37826",
                            "    - scsi: ufs: core: Add NULL check in ufshcd_mcq_compl_pending_transfer()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37827",
                            "    - btrfs: zoned: return EIO on RAID1 block group write pointer mismatch",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37977",
                            "    - scsi: ufs: exynos: Disable iocc if dma-coherent property isn't set",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37944",
                            "    - wifi: ath12k: Fix invalid entry fetch in ath12k_dp_mon_srng_process",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37761",
                            "    - drm/xe: Fix an out-of-bounds shift when invalidating TLB",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37763",
                            "    - drm/imagination: take paired job reference",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37764",
                            "    - drm/imagination: fix firmware memory leaks",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37869",
                            "    - drm/xe: Use local fence in error path of xe_migrate_clear",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37978",
                            "    - block: integrity: Do not call set_page_dirty_lock()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37975",
                            "    - riscv: module: Fix out-of-bounds relocation access",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37872",
                            "    - net: txgbe: fix memory leak in txgbe_probe() error path",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37873",
                            "    - eth: bnxt: fix missing ring index trim on error path",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-22120",
                            "    - ext4: goto right label 'out_mmap_sem' in ext4_setattr()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37799",
                            "    - vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37800",
                            "    - driver core: fix potential NULL pointer dereference in dev_uevent()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37878",
                            "    - perf/core: Fix WARN_ON(!ctx) in __free_event() for partial init",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37803",
                            "    - udmabuf: fix a buf size overflow issue during udmabuf creation",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37879",
                            "    - 9p/net: fix improper handling of bogus negative read/write replies",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37983",
                            "    - qibfs: fix _another_ leak",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37881",
                            "    - usb: gadget: aspeed: Add NULL pointer check in ast_vhub_init_dev()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37805",
                            "    - sound/virtio: Fix cancel_sync warnings on uninitialized work_structs",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37883",
                            "    - s390/sclp: Add check for get_zeroed_page()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37884",
                            "    - bpf: Fix deadlock between rcu_tasks_trace and event_mutex.",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37808",
                            "    - crypto: null - Use spin lock instead of mutex",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37985",
                            "    - USB: wdm: close race between wdm_open and wdm_wwan_port_stop",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37810",
                            "    - usb: dwc3: gadget: check that event count does not exceed event buffer",
                            "      length",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37811",
                            "    - usb: chipidea: ci_hdrc_imx: fix usbmisc handling",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37812",
                            "    - usb: cdns3: Fix deadlock when using NCM gadget",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37813",
                            "    - usb: xhci: Fix invalid pointer dereference in Etron workaround",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37815",
                            "    - misc: microchip: pci1xxxx: Fix Kernel panic during IRQ handler",
                            "      registration",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37885",
                            "    - KVM: x86: Reset IRTE to host control if *new* route isn't postable",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37817",
                            "    - mcb: fix a double free bug in chameleon_parse_gdd()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37819",
                            "    - irqchip/gic-v2m: Prevent use after free of gicv2m_get_fwnode()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37820",
                            "    - xen-netfront: handle NULL returned by xdp_convert_buff_to_frame()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37886",
                            "    - pds_core: make wait_context part of q_info",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37887",
                            "    - pds_core: handle unsupported PDS_CORE_CMD_FW_CONTROL result",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37823",
                            "    - net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37988",
                            "    - fix a couple of races in MNT_TREE_BENEATH handling by do_move_mount()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37824",
                            "    - tipc: fix NULL pointer dereference in tipc_mon_reinit_self()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37989",
                            "    - net: phy: leds: fix memory leak",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37828",
                            "    - scsi: ufs: mcq: Add NULL check in ufshcd_mcq_abort()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37829",
                            "    - cpufreq: scpi: Fix null-ptr-deref in scpi_cpufreq_get_rate()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37830",
                            "    - cpufreq: scmi: Fix null-ptr-deref in scmi_cpufreq_get_rate()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37831",
                            "    - cpufreq: apple-soc: Fix null-ptr-deref in apple_soc_cpufreq_get_rate()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-37938",
                            "    - tracing: Verify event formats that have \"%*p..\"",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-21 (LP: #2129307) //",
                            "    CVE-2025-39989",
                            "    - x86/mce: use is_copy_from_user() to determine copy-from-user context",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-22026",
                            "    - nfsd: don't ignore the return code of svc_proc_register()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37836",
                            "    - PCI: Fix reference leak in pci_register_host_bridge()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37846",
                            "    - arm64: mops: Do not dereference src reg for a set operation",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37942",
                            "    - HID: pidff: Make sure to fetch pool before checking SIMULTANEOUS_MAX",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37856",
                            "    - btrfs: harden block_group::bg_list against list_del() races",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37861",
                            "    - scsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queue",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37744",
                            "    - wifi: ath12k: fix memory leak in ath12k_pci_remove()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37745",
                            "    - PM: hibernate: Avoid deadlock in hibernate_compressor_param_set()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37945",
                            "    - net: phy: allow MDIO bus PM ops to start/stop state machine for phylink-",
                            "      controlled PHY",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37759",
                            "    - ublk: fix handling recovery & reissue in ublk_abort_queue()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23140",
                            "    - misc: pci_endpoint_test: Avoid issue of interrupts remaining after",
                            "      request_irq error",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-22126",
                            "    - md: fix mddev uaf while iterating all_mddevs list",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37765",
                            "    - drm/nouveau: prime: fix ttm_bo_delayed_delete oops",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37766",
                            "    - drm/amd/pm/powerplay/hwmgr/vega20_thermal: Prevent division by zero",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37767",
                            "    - drm/amd/pm/swsmu/smu13/smu_v13_0: Prevent division by zero",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37768",
                            "    - drm/amd/pm/powerplay/hwmgr/smu7_thermal: Prevent division by zero",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37769",
                            "    - drm/amd/pm/smu11: Prevent division by zero",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37770",
                            "    - drm/amd/pm/powerplay: Prevent division by zero",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37768 // CVE-2025-37771",
                            "    - drm/amd/pm: Prevent division by zero",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37772",
                            "    - RDMA/cma: Fix workqueue crash in cma_netevent_work_handler",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37773",
                            "    - virtiofs: add filesystem context source name check",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37775",
                            "    - ksmbd: fix the warning from __kernel_write_iter",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37778",
                            "    - ksmbd: Fix dangling pointer in krb_authenticate",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37863",
                            "    - ovl: don't allow datadir only",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37780",
                            "    - isofs: Prevent the use of too small fid",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37781",
                            "    - i2c: cros-ec-tunnel: defer probe if parent EC is not present",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37979",
                            "    - ASoC: qcom: Fix sc7280 lpass potential buffer overflow",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37784",
                            "    - net: ti: icss-iep: Fix possible NULL pointer dereference for perout",
                            "      request",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37786",
                            "    - net: dsa: free routing table on probe failure",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37864",
                            "    - net: dsa: clean up FDB, MDB, VLAN entries on unbind",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37865",
                            "    - net: dsa: mv88e6xxx: fix -ENOENT when deleting VLANs and MST is",
                            "      unsupported",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37787",
                            "    - net: dsa: mv88e6xxx: avoid unregistering devlink regions which were",
                            "      never registered",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37788",
                            "    - cxgb4: fix memory leak in cxgb4_init_ethtool_filters() error path",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37874",
                            "    - net: ngbe: fix memory leak in ngbe_probe() error path",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37789",
                            "    - net: openvswitch: fix nested key length validation in the set() action",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37980",
                            "    - block: fix resource leak in blk_register_queue() error path",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37790",
                            "    - net: mctp: Set SOCK_RCU_FREE",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37875",
                            "    - igc: fix PTM cycle trigger logic",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37792",
                            "    - Bluetooth: btrtl: Prevent potential NULL dereference",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37867",
                            "    - RDMA/core: Silence oversized kvmalloc() warning",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37793",
                            "    - ASoC: Intel: avs: Fix null-ptr-deref in avs_component_probe()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37982",
                            "    - wifi: wl1251: fix memory leak in wl1251_tx_work",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37794",
                            "    - wifi: mac80211: Purge vif txq in ieee80211_do_stop()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37796",
                            "    - wifi: at76c50x: fix use after free access in at76_disconnect",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23141",
                            "    - KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory",
                            "      accesses",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37940",
                            "    - ftrace: Add cond_resched() to ftrace_graph_set_hash()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37844",
                            "    - cifs: avoid NULL pointer dereference in dbg call",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23142",
                            "    - sctp: detect and prevent references to a freed transport in sendmsg",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23144",
                            "    - backlight: led_bl: Hold led_access lock when calling led_sysfs_disable()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37892",
                            "    - mtd: inftlcore: Add error check for inftl_read_oob()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23145",
                            "    - mptcp: fix NULL pointer in can_accept_new_subflow",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23146",
                            "    - mfd: ene-kb3930: Fix a potential NULL pointer dereference",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37839",
                            "    - jbd2: remove wrong sb->s_sequence check",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23147",
                            "    - i3c: Add NULL pointer check in i3c_master_queue_ibi()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23148",
                            "    - soc: samsung: exynos-chipid: Add NULL pointer check in",
                            "      exynos_chipid_probe()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23149",
                            "    - tpm: do not start chip while suspended",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23150",
                            "    - ext4: fix off-by-one error in do_split",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23151",
                            "    - bus: mhi: host: Fix race between unprepare and queue_buf",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23156",
                            "    - media: venus: hfi_parser: refactor hfi packet parsing logic",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23157",
                            "    - media: venus: hfi_parser: add check to avoid out of bound access",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37840",
                            "    - mtd: rawnand: brcmnand: fix PM resume warning",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37849",
                            "    - KVM: arm64: Tear down vGIC on failed vCPU creation",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23158",
                            "    - media: venus: hfi: add check to handle incorrect queue size",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23159",
                            "    - media: venus: hfi: add a check to handle OOB in sfr region",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23160",
                            "    - media: mediatek: vcodec: Fix a resource leak related to the scp device",
                            "      in FW initialization",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37850",
                            "    - pwm: mediatek: Prevent divide-by-zero in pwm_mediatek_config()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37851",
                            "    - fbdev: omapfb: Add 'plane' value check",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23161",
                            "    - PCI: vmd: Make vmd_dev::cfg_lock a raw_spinlock_t type",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37852",
                            "    - drm/amdgpu: handle amdgpu_cgs_create_device() errors in",
                            "      amd_powerplay_create()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37853",
                            "    - drm/amdkfd: debugfs hang_hws skip GPU with MES",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37854",
                            "    - drm/amdkfd: Fix mode1 reset crash issue",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-23163",
                            "    - net: vlan: don't propagate flags on open",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37857",
                            "    - scsi: st: Fix array overflow in st_setup()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37738",
                            "    - ext4: ignore xattrs past end",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37739",
                            "    - f2fs: fix to avoid out-of-bounds access in f2fs_truncate_inode_blocks()",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37943",
                            "    - wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37740",
                            "    - jfs: add sanity check for agwidth in dbMount",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37741",
                            "    - jfs: Prevent copying of nlink with value 0 from disk inode",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37858",
                            "    - fs/jfs: Prevent integer overflow in AG size calculation",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37742",
                            "    - jfs: Fix uninit-value access of imap allocated in the diMount() function",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37859",
                            "    - page_pool: avoid infinite loop to schedule delayed worker",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37862",
                            "    - HID: pidff: Fix null pointer dereference in pidff_find_fields",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37841",
                            "    - pm: cpupower: bench: Prevent NULL dereference on malloc failure",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37748",
                            "    - iommu/mediatek: Fix NULL pointer deference in mtk_iommu_device_group",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37749",
                            "    - net: ppp: Add bound checking for skb data on ppp_sync_txmung",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37754",
                            "    - drm/i915/huc: Fix fence not released on early probe errors",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37755",
                            "    - net: libwx: handle page_pool_dev_alloc_pages error",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37757",
                            "    - tipc: fix memory leak in tipc_link_xmit",
                            "",
                            "  * Noble update: upstream stable patchset 2025-10-17 (LP: #2128722) //",
                            "    CVE-2025-37758",
                            "    - ata: pata_pxa: Fix potential NULL pointer dereference in pxa_ata_probe()",
                            "",
                            "  * CVE-2025-37801",
                            "    - spi: spi-imx: Add check for spi_imx_setupxfer()",
                            "",
                            "  * CVE-2025-39946",
                            "    - tls: make sure to abort the stream if headers are bogus",
                            "",
                            "  * CVE-2025-38584",
                            "    - padata: Fix pd UAF once and for all",
                            "    - padata: Remove comment for reorder_work",
                            "",
                            "  * CVE-2025-40019",
                            "    - crypto: essiv - Check ssize for decryption and in-place encryption",
                            "",
                            "  * CVE-2025-38561",
                            "    - ksmbd: fix Preauh_HashValue race condition",
                            "",
                            "  * CVE-2025-39698",
                            "    - io_uring/futex: ensure io_futex_wait() cleans up properly on failure",
                            ""
                        ],
                        "package": "linux",
                        "version": "6.8.0-98.98",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2137901,
                            1786013,
                            2136820,
                            2137528,
                            2130244,
                            2128722,
                            2131265,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2137586,
                            2135716,
                            2135261,
                            1928890,
                            2112357,
                            2096976,
                            2012859,
                            2031531,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136740,
                            2136361,
                            2136361,
                            2136361,
                            2136361,
                            2136361,
                            2136361,
                            2136361,
                            2136361,
                            2136361,
                            2136361,
                            2136361,
                            2136361,
                            2136361,
                            2136361,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2136221,
                            2134382,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2135261,
                            2132317,
                            2065369,
                            2071861,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134640,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134499,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2134382,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133786,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2133301,
                            2131046,
                            2083800,
                            2127971,
                            2102077,
                            2121997,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130344,
                            2130277,
                            2130277,
                            2130277,
                            2130277,
                            2130277,
                            2130277,
                            2130277,
                            2130277,
                            2130277,
                            2130277,
                            2130277,
                            2130277,
                            2130277,
                            2130277,
                            2130277,
                            2130277,
                            2130277,
                            2130277,
                            2130277,
                            2130277,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129559,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2129307,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722,
                            2128722
                        ],
                        "author": "Stefan Bader <stefan.bader@canonical.com>",
                        "date": "Fri, 09 Jan 2026 13:27:16 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-virtual",
                "from_version": {
                    "source_package_name": "linux-meta-riscv-6.14",
                    "source_package_version": "6.14.0-37.37.1~24.04.1",
                    "version": "6.14.0-37.37.1~24.04.1"
                },
                "to_version": {
                    "source_package_name": "linux-meta-riscv-6.17",
                    "source_package_version": "6.17.0-14.14.1~24.04.1",
                    "version": "6.17.0-14.14.1~24.04.1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    1786013
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Main version: 6.17.0-14.14.1~24.04.1",
                            ""
                        ],
                        "package": "linux-meta-riscv-6.17",
                        "version": "6.17.0-14.14.1~24.04.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [],
                        "author": "Emil Renner Berthing <emil.renner.berthing@canonical.com>",
                        "date": "Tue, 27 Jan 2026 21:16:13 +0100"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Main version: 6.17.0-9.9.1~24.04.1",
                            "",
                            "  * Packaging resync (LP: #1786013)",
                            "    - [Packaging] debian/dkms-versions -- resync from main package",
                            ""
                        ],
                        "package": "linux-meta-riscv-6.17",
                        "version": "6.17.0-9.9.1~24.04.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            1786013
                        ],
                        "author": "Emil Renner Berthing <emil.renner.berthing@canonical.com>",
                        "date": "Wed, 14 Jan 2026 14:23:47 +0100"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Main version: 6.17.0-9.9.1~24.04.0",
                            ""
                        ],
                        "package": "linux-meta-riscv-6.17",
                        "version": "6.17.0-9.9.1~24.04.0",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [],
                        "author": "Emil Renner Berthing <emil.renner.berthing@canonical.com>",
                        "date": "Wed, 14 Jan 2026 14:21:00 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "locales",
                "from_version": {
                    "source_package_name": "glibc",
                    "source_package_version": "2.39-0ubuntu8.6",
                    "version": "2.39-0ubuntu8.6"
                },
                "to_version": {
                    "source_package_name": "glibc",
                    "source_package_version": "2.39-0ubuntu8.7",
                    "version": "2.39-0ubuntu8.7"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-15281",
                        "url": "https://ubuntu.com/security/CVE-2025-15281",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-0861",
                        "url": "https://ubuntu.com/security/CVE-2026-0861",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-0915",
                        "url": "https://ubuntu.com/security/CVE-2026-0915",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-15281",
                                "url": "https://ubuntu.com/security/CVE-2025-15281",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-0861",
                                "url": "https://ubuntu.com/security/CVE-2026-0861",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-0915",
                                "url": "https://ubuntu.com/security/CVE-2026-0915",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: use-after-free in wordexp_t fields",
                            "    - debian/patches/CVE-2025-15281.patch: posix: Reset wordexp_t fields",
                            "      with WRDE_REUSE",
                            "    - CVE-2025-15281",
                            "  * SECURITY UPDATE: integer overflow in memalign",
                            "    - debian/patches/CVE-2026-0861.patch: memalign: reinstate alignment",
                            "      overflow check",
                            "    - CVE-2026-0861",
                            "  * SECURITY UPDATE: memory leak in NSS DNS",
                            "    - debian/patches/CVE-2026-0915.patch: resolv: Fix NSS DNS backend for",
                            "      getnetbyaddr",
                            "    - CVE-2026-0915",
                            ""
                        ],
                        "package": "glibc",
                        "version": "2.39-0ubuntu8.7",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Nishit Majithia <nishit.majithia@canonical.com>",
                        "date": "Fri, 30 Jan 2026 13:57:54 +0530"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "motd-news-config",
                "from_version": {
                    "source_package_name": "base-files",
                    "source_package_version": "13ubuntu10.3",
                    "version": "13ubuntu10.3"
                },
                "to_version": {
                    "source_package_name": "base-files",
                    "source_package_version": "13ubuntu10.4",
                    "version": "13ubuntu10.4"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2140756
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * /etc/issue{,.net}, /etc/{lsb,os}-release: bump version to 24.04.4",
                            "    (LP: #2140756)",
                            ""
                        ],
                        "package": "base-files",
                        "version": "13ubuntu10.4",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2140756
                        ],
                        "author": "Florent 'Skia' Jacquet <skia@ubuntu.com>",
                        "date": "Fri, 06 Feb 2026 08:23:01 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "mount",
                "from_version": {
                    "source_package_name": "util-linux",
                    "source_package_version": "2.39.3-9ubuntu6.3",
                    "version": "2.39.3-9ubuntu6.3"
                },
                "to_version": {
                    "source_package_name": "util-linux",
                    "source_package_version": "2.39.3-9ubuntu6.4",
                    "version": "2.39.3-9ubuntu6.4"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2123886
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Add ARM core support for Vera systems (LP: #2123886)",
                            "    - d/p/ubuntu/lp-2123886-add-missing-arm-cores.patch",
                            ""
                        ],
                        "package": "util-linux",
                        "version": "2.39.3-9ubuntu6.4",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2123886
                        ],
                        "author": "Joao Andre Simioni <joao.simioni@canonical.com>",
                        "date": "Mon, 15 Sep 2025 21:08:02 -0300"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "multipath-tools",
                "from_version": {
                    "source_package_name": "multipath-tools",
                    "source_package_version": "0.9.4-5ubuntu8",
                    "version": "0.9.4-5ubuntu8"
                },
                "to_version": {
                    "source_package_name": "multipath-tools",
                    "source_package_version": "0.9.4-5ubuntu8.1",
                    "version": "0.9.4-5ubuntu8.1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2116901
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * d/p/0005-hpe-msa-gen7-support.patch: add support for HPE MSA gen7 arrays",
                            "    (LP: #2116901)",
                            ""
                        ],
                        "package": "multipath-tools",
                        "version": "0.9.4-5ubuntu8.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2116901
                        ],
                        "author": "Jonas Jelten <jonas.jelten@canonical.com>",
                        "date": "Tue, 22 Jul 2025 17:44:15 +0200"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "numactl",
                "from_version": {
                    "source_package_name": "numactl",
                    "source_package_version": "2.0.18-1build1",
                    "version": "2.0.18-1build1"
                },
                "to_version": {
                    "source_package_name": "numactl",
                    "source_package_version": "2.0.18-1ubuntu0.24.04.1",
                    "version": "2.0.18-1ubuntu0.24.04.1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2136104
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * d/p/fix-stray-errno.patch: save and restore errno when probing for",
                            "    SET_PREFERRED_MANY (LP: #2136104)",
                            ""
                        ],
                        "package": "numactl",
                        "version": "2.0.18-1ubuntu0.24.04.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2136104
                        ],
                        "author": "Renan Rodrigo <rr@ubuntu.com>",
                        "date": "Fri, 09 Jan 2026 10:36:33 -0300"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "openssl",
                "from_version": {
                    "source_package_name": "openssl",
                    "source_package_version": "3.0.13-0ubuntu3.6",
                    "version": "3.0.13-0ubuntu3.6"
                },
                "to_version": {
                    "source_package_name": "openssl",
                    "source_package_version": "3.0.13-0ubuntu3.7",
                    "version": "3.0.13-0ubuntu3.7"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-15467",
                        "url": "https://ubuntu.com/security/CVE-2025-15467",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68160",
                        "url": "https://ubuntu.com/security/CVE-2025-68160",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-69418",
                        "url": "https://ubuntu.com/security/CVE-2025-69418",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-69419",
                        "url": "https://ubuntu.com/security/CVE-2025-69419",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-69420",
                        "url": "https://ubuntu.com/security/CVE-2025-69420",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-69421",
                        "url": "https://ubuntu.com/security/CVE-2025-69421",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-2279",
                        "url": "https://ubuntu.com/security/CVE-2026-2279",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-22795",
                        "url": "https://ubuntu.com/security/CVE-2026-22795",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-22796",
                        "url": "https://ubuntu.com/security/CVE-2026-22796",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-15467",
                                "url": "https://ubuntu.com/security/CVE-2025-15467",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68160",
                                "url": "https://ubuntu.com/security/CVE-2025-68160",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-69418",
                                "url": "https://ubuntu.com/security/CVE-2025-69418",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-69419",
                                "url": "https://ubuntu.com/security/CVE-2025-69419",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-69420",
                                "url": "https://ubuntu.com/security/CVE-2025-69420",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-69421",
                                "url": "https://ubuntu.com/security/CVE-2025-69421",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-2279",
                                "url": "https://ubuntu.com/security/CVE-2026-2279",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-22795",
                                "url": "https://ubuntu.com/security/CVE-2026-22795",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-22796",
                                "url": "https://ubuntu.com/security/CVE-2026-22796",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Stack buffer overflow in CMS AuthEnvelopedData parsing",
                            "    - debian/patches/CVE-2025-15467-1.patch: correct handling of",
                            "      AEAD-encrypted CMS with inadmissibly long IV in crypto/evp/evp_lib.c.",
                            "    - debian/patches/CVE-2025-15467-2.patch: some comments to clarify",
                            "      functions usage in crypto/asn1/evp_asn1.c.",
                            "    - debian/patches/CVE-2025-15467-3.patch: test for handling of",
                            "      AEAD-encrypted CMS with inadmissibly long IV in test/cmsapitest.c,",
                            "      test/recipes/80-test_cmsapi.t,",
                            "      test/recipes/80-test_cmsapi_data/encDataWithTooLongIV.pem.",
                            "    - CVE-2025-15467",
                            "  * SECURITY UPDATE: Heap out-of-bounds write in BIO_f_linebuffer on short",
                            "    writes",
                            "    - debian/patches/CVE-2025-68160.patch: fix heap buffer overflow in",
                            "      BIO_f_linebuffer in crypto/bio/bf_lbuf.c.",
                            "    - CVE-2025-68160",
                            "  * SECURITY UPDATE: Unauthenticated/unencrypted trailing bytes with",
                            "    low-level OCB function calls",
                            "    - debian/patches/CVE-2025-69418.patch: fix OCB AES-NI/HW stream path",
                            "      unauthenticated/unencrypted trailing bytes in crypto/modes/ocb128.c.",
                            "    - CVE-2025-69418",
                            "  * SECURITY UPDATE: Out of bounds write in PKCS12_get_friendlyname() UTF-8",
                            "    conversion",
                            "    - debian/patches/CVE-2025-69419.patch: check return code of UTF8_putc",
                            "      in crypto/asn1/a_strex.c, crypto/pkcs12/p12_utl.c.",
                            "    - CVE-2025-69419",
                            "  * SECURITY UPDATE: Missing ASN1_TYPE validation in",
                            "    TS_RESP_verify_response() function",
                            "    - debian/patches/CVE-2025-69420.patch: verify ASN1 object's types",
                            "      before attempting to access them as a particular type in",
                            "      crypto/ts/ts_rsp_verify.c.",
                            "    - CVE-2025-69420",
                            "  * SECURITY UPDATE: NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex",
                            "    - debian/patches/CVE-2025-69421.patch: add NULL check in",
                            "      crypto/pkcs12/p12_decr.c.",
                            "    - CVE-2025-69421",
                            "  * SECURITY UPDATE: ASN1_TYPE missing validation and type confusion",
                            "    - debian/patches/CVE-2026-2279x.patch: ensure ASN1 types are checked",
                            "      before use in apps/s_client.c, crypto/pkcs12/p12_kiss.c,",
                            "      crypto/pkcs7/pk7_doit.c.",
                            "    - CVE-2026-22795",
                            "    - CVE-2026-22796",
                            ""
                        ],
                        "package": "openssl",
                        "version": "3.0.13-0ubuntu3.7",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Mon, 26 Jan 2026 07:31:31 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "python-apt-common",
                "from_version": {
                    "source_package_name": "python-apt",
                    "source_package_version": "2.7.7ubuntu5.1",
                    "version": "2.7.7ubuntu5.1"
                },
                "to_version": {
                    "source_package_name": "python-apt",
                    "source_package_version": "2.7.7ubuntu5.2",
                    "version": "2.7.7ubuntu5.2"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2138617
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Mirror list update for 24.04.4 (LP: #2138617)",
                            ""
                        ],
                        "package": "python-apt",
                        "version": "2.7.7ubuntu5.2",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2138617
                        ],
                        "author": "Florent 'Skia' Jacquet <skia@ubuntu.com>",
                        "date": "Mon, 19 Jan 2026 11:38:23 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "python3-apt",
                "from_version": {
                    "source_package_name": "python-apt",
                    "source_package_version": "2.7.7ubuntu5.1",
                    "version": "2.7.7ubuntu5.1"
                },
                "to_version": {
                    "source_package_name": "python-apt",
                    "source_package_version": "2.7.7ubuntu5.2",
                    "version": "2.7.7ubuntu5.2"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2138617
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Mirror list update for 24.04.4 (LP: #2138617)",
                            ""
                        ],
                        "package": "python-apt",
                        "version": "2.7.7ubuntu5.2",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2138617
                        ],
                        "author": "Florent 'Skia' Jacquet <skia@ubuntu.com>",
                        "date": "Mon, 19 Jan 2026 11:38:23 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "python3-distupgrade",
                "from_version": {
                    "source_package_name": "ubuntu-release-upgrader",
                    "source_package_version": "1:24.04.27",
                    "version": "1:24.04.27"
                },
                "to_version": {
                    "source_package_name": "ubuntu-release-upgrader",
                    "source_package_version": "1:24.04.28",
                    "version": "1:24.04.28"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2138637
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Run pre-build.sh: updating mirrors for point release (LP: #2138637)",
                            ""
                        ],
                        "package": "ubuntu-release-upgrader",
                        "version": "1:24.04.28",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2138637
                        ],
                        "author": "Florent 'Skia' Jacquet <skia@ubuntu.com>",
                        "date": "Mon, 19 Jan 2026 16:31:44 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "python3-pyasn1",
                "from_version": {
                    "source_package_name": "pyasn1",
                    "source_package_version": "0.4.8-4",
                    "version": "0.4.8-4"
                },
                "to_version": {
                    "source_package_name": "pyasn1",
                    "source_package_version": "0.4.8-4ubuntu0.1",
                    "version": "0.4.8-4ubuntu0.1"
                },
                "cves": [
                    {
                        "cve": "CVE-2026-23490",
                        "url": "https://ubuntu.com/security/CVE-2026-23490",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2026-23490",
                                "url": "https://ubuntu.com/security/CVE-2026-23490",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: memory exhaustion from malformed RELATIVE-OID",
                            "    - debian/patches/CVE-2026-23490.patch: add limit of 20 continuation",
                            "      octets per OID arc in pyasn1/codec/ber/decoder.py,",
                            "      tests/codec/ber/test_decoder.py.",
                            "    - CVE-2026-23490",
                            ""
                        ],
                        "package": "pyasn1",
                        "version": "0.4.8-4ubuntu0.1",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Tue, 20 Jan 2026 10:40:22 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "python3-urllib3",
                "from_version": {
                    "source_package_name": "python-urllib3",
                    "source_package_version": "2.0.7-1ubuntu0.3",
                    "version": "2.0.7-1ubuntu0.3"
                },
                "to_version": {
                    "source_package_name": "python-urllib3",
                    "source_package_version": "2.0.7-1ubuntu0.6",
                    "version": "2.0.7-1ubuntu0.6"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-66471",
                        "url": "https://ubuntu.com/security/CVE-2025-66471",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-66471",
                        "url": "https://ubuntu.com/security/CVE-2025-66471",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-21441",
                        "url": "https://ubuntu.com/security/CVE-2026-21441",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [
                    2136906,
                    2136906
                ],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-66471",
                                "url": "https://ubuntu.com/security/CVE-2025-66471",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY REGRESSION: Zstandard missing attribute after CVE-2025-66471 fix.",
                            "    (LP: #2136906)",
                            "    - debian/patches/CVE-2025-66471-fix2.patch: Fall back if \"needs_input\" is",
                            "      not a zstd object attribute in src/urllib3/response.py.",
                            ""
                        ],
                        "package": "python-urllib3",
                        "version": "2.0.7-1ubuntu0.6",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [
                            2136906
                        ],
                        "author": "Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com>",
                        "date": "Tue, 13 Jan 2026 09:34:51 -0330"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-66471",
                                "url": "https://ubuntu.com/security/CVE-2025-66471",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY REGRESSION: Zstd issues after CVE-2025-66471 fix. (LP: #2136906)",
                            "    - debian/patches/CVE-2025-66471-fix1.patch: Revert zstd fix due to not",
                            "      being compatible with zstandard.",
                            ""
                        ],
                        "package": "python-urllib3",
                        "version": "2.0.7-1ubuntu0.5",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [
                            2136906
                        ],
                        "author": "Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com>",
                        "date": "Mon, 12 Jan 2026 17:27:22 -0330"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2026-21441",
                                "url": "https://ubuntu.com/security/CVE-2026-21441",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Decompression bomb in HTTP redirect responses.",
                            "    - debian/patches/CVE-2026-21441.patch: Add decode_content to self.read()",
                            "      in src/urllib3/response.py. Add tests in",
                            "      test/with_dummyserver/test_connectionpool.py and dummyserver/app.py.",
                            "    - CVE-2026-21441",
                            ""
                        ],
                        "package": "python-urllib3",
                        "version": "2.0.7-1ubuntu0.4",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com>",
                        "date": "Thu, 08 Jan 2026 15:36:38 -0330"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "python3.12",
                "from_version": {
                    "source_package_name": "python3.12",
                    "source_package_version": "3.12.3-1ubuntu0.9",
                    "version": "3.12.3-1ubuntu0.9"
                },
                "to_version": {
                    "source_package_name": "python3.12",
                    "source_package_version": "3.12.3-1ubuntu0.11",
                    "version": "3.12.3-1ubuntu0.11"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-11468",
                        "url": "https://ubuntu.com/security/CVE-2025-11468",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-12084",
                        "url": "https://ubuntu.com/security/CVE-2025-12084",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-13837",
                        "url": "https://ubuntu.com/security/CVE-2025-13837",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-15282",
                        "url": "https://ubuntu.com/security/CVE-2025-15282",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-15366",
                        "url": "https://ubuntu.com/security/CVE-2025-15366",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-15367",
                        "url": "https://ubuntu.com/security/CVE-2025-15367",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-0672",
                        "url": "https://ubuntu.com/security/CVE-2026-0672",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-0865",
                        "url": "https://ubuntu.com/security/CVE-2026-0865",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-13836",
                        "url": "https://ubuntu.com/security/CVE-2025-13836",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-11468",
                                "url": "https://ubuntu.com/security/CVE-2025-11468",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-12084",
                                "url": "https://ubuntu.com/security/CVE-2025-12084",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-13837",
                                "url": "https://ubuntu.com/security/CVE-2025-13837",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-15282",
                                "url": "https://ubuntu.com/security/CVE-2025-15282",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-15366",
                                "url": "https://ubuntu.com/security/CVE-2025-15366",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-15367",
                                "url": "https://ubuntu.com/security/CVE-2025-15367",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-0672",
                                "url": "https://ubuntu.com/security/CVE-2026-0672",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-0865",
                                "url": "https://ubuntu.com/security/CVE-2026-0865",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Header injection in email messages where addresses are not",
                            "    sanitized.",
                            "    - debian/patches/CVE-2025-11468.patch: Add escape parentheses and backslash",
                            "      in Lib/email/_header_value_parser.py. Add test in",
                            "      Lib/test/test_email/test__header_value_parser.py.",
                            "    - CVE-2025-11468",
                            "  * SECURITY UPDATE: Quadratic algorithm when building excessively nested XML",
                            "    documents.",
                            "    - debian/patches/CVE-2025-12084-*.patch: Remove _in_document and replace",
                            "      with node.ownerDocument in Lib/xml/dom/minidom.py. Set self.ownerDocument",
                            "      to None in Lib/xml/dom/minidom.py. Add test in Lib/test/test_minidom.py.",
                            "    - CVE-2025-12084",
                            "  * SECURITY UPDATE: OOM and denial of service when opening malicious plist",
                            "    file.",
                            "    - debian/patches/CVE-2025-13837.patch: Add _MIN_READ_BUF_SIZE and _read",
                            "      with checks in Lib/plistlib.py. Add test in Lib/test/test_plistlib.py.",
                            "    - CVE-2025-13837",
                            "  * SECURITY UPDATE: Header injection in user controlled data URLs in urllib.",
                            "    - debian/patches/CVE-2025-15282.patch: Add control character checks in",
                            "      Lib/urllib/request.py. Add test in Lib/test/test_urllib.py.",
                            "  * SECURITY UPDATE: Command injection through user controlled commands in",
                            "    imaplib.",
                            "    - debian/patches/CVE-2025-15366.patch: Add _control_chars and checks in",
                            "      Lib/imaplib.py. Add test in Lib/test/test_imaplib.py.",
                            "  * SECURITY UPDATE: Command injection through user controlled commands in",
                            "    poplib.",
                            "    - debian/patches/CVE-2025-15367.patch: Add control character regex check",
                            "      in Lib/poplib.py. Add test in Lib/test/test_poplib.py.",
                            "    - CVE-2025-15367",
                            "  * SECURITY UPDATE: HTTP header injection in user controlled cookie values.",
                            "    - debian/patches/CVE-2026-0672.patch: Add _control_characters_re and",
                            "      checks in Lib/http/cookies.py. Add test in Lib/test/test_http_cookies.py.",
                            "    - CVE-2026-0672",
                            "  * SECURITY UPDATE: HTTP header injection in user controlled headers and",
                            "    values with newlines.",
                            "    - debian/patches/CVE-2026-0865.patch: Add _control_chars_re and check in",
                            "      Lib/wsgiref/headers.py. Add test in Lib/test/support/__init__.py and",
                            "      Lib/test/test_wsgiref.py.",
                            "    - CVE-2026-0865",
                            ""
                        ],
                        "package": "python3.12",
                        "version": "3.12.3-1ubuntu0.11",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com>",
                        "date": "Thu, 22 Jan 2026 17:27:42 -0330"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-13836",
                                "url": "https://ubuntu.com/security/CVE-2025-13836",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: HTTP Content-Length denial of service",
                            "    - debian/patches/CVE-2025-13836.patch: Read large data in chunks with",
                            "      geometric reads in Lib/http/client.py and add tests in ",
                            "      Lib/test/test_httplib.py",
                            "    - CVE-2025-13836",
                            ""
                        ],
                        "package": "python3.12",
                        "version": "3.12.3-1ubuntu0.10",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Vyom Yadav <vyom.yadav@canonical.com>",
                        "date": "Thu, 08 Jan 2026 17:00:50 +0530"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "python3.12-minimal",
                "from_version": {
                    "source_package_name": "python3.12",
                    "source_package_version": "3.12.3-1ubuntu0.9",
                    "version": "3.12.3-1ubuntu0.9"
                },
                "to_version": {
                    "source_package_name": "python3.12",
                    "source_package_version": "3.12.3-1ubuntu0.11",
                    "version": "3.12.3-1ubuntu0.11"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-11468",
                        "url": "https://ubuntu.com/security/CVE-2025-11468",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-12084",
                        "url": "https://ubuntu.com/security/CVE-2025-12084",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-13837",
                        "url": "https://ubuntu.com/security/CVE-2025-13837",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-15282",
                        "url": "https://ubuntu.com/security/CVE-2025-15282",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-15366",
                        "url": "https://ubuntu.com/security/CVE-2025-15366",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-15367",
                        "url": "https://ubuntu.com/security/CVE-2025-15367",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-0672",
                        "url": "https://ubuntu.com/security/CVE-2026-0672",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2026-0865",
                        "url": "https://ubuntu.com/security/CVE-2026-0865",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-13836",
                        "url": "https://ubuntu.com/security/CVE-2025-13836",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-11468",
                                "url": "https://ubuntu.com/security/CVE-2025-11468",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-12084",
                                "url": "https://ubuntu.com/security/CVE-2025-12084",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-13837",
                                "url": "https://ubuntu.com/security/CVE-2025-13837",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-15282",
                                "url": "https://ubuntu.com/security/CVE-2025-15282",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-15366",
                                "url": "https://ubuntu.com/security/CVE-2025-15366",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-15367",
                                "url": "https://ubuntu.com/security/CVE-2025-15367",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-0672",
                                "url": "https://ubuntu.com/security/CVE-2026-0672",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2026-0865",
                                "url": "https://ubuntu.com/security/CVE-2026-0865",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Header injection in email messages where addresses are not",
                            "    sanitized.",
                            "    - debian/patches/CVE-2025-11468.patch: Add escape parentheses and backslash",
                            "      in Lib/email/_header_value_parser.py. Add test in",
                            "      Lib/test/test_email/test__header_value_parser.py.",
                            "    - CVE-2025-11468",
                            "  * SECURITY UPDATE: Quadratic algorithm when building excessively nested XML",
                            "    documents.",
                            "    - debian/patches/CVE-2025-12084-*.patch: Remove _in_document and replace",
                            "      with node.ownerDocument in Lib/xml/dom/minidom.py. Set self.ownerDocument",
                            "      to None in Lib/xml/dom/minidom.py. Add test in Lib/test/test_minidom.py.",
                            "    - CVE-2025-12084",
                            "  * SECURITY UPDATE: OOM and denial of service when opening malicious plist",
                            "    file.",
                            "    - debian/patches/CVE-2025-13837.patch: Add _MIN_READ_BUF_SIZE and _read",
                            "      with checks in Lib/plistlib.py. Add test in Lib/test/test_plistlib.py.",
                            "    - CVE-2025-13837",
                            "  * SECURITY UPDATE: Header injection in user controlled data URLs in urllib.",
                            "    - debian/patches/CVE-2025-15282.patch: Add control character checks in",
                            "      Lib/urllib/request.py. Add test in Lib/test/test_urllib.py.",
                            "  * SECURITY UPDATE: Command injection through user controlled commands in",
                            "    imaplib.",
                            "    - debian/patches/CVE-2025-15366.patch: Add _control_chars and checks in",
                            "      Lib/imaplib.py. Add test in Lib/test/test_imaplib.py.",
                            "  * SECURITY UPDATE: Command injection through user controlled commands in",
                            "    poplib.",
                            "    - debian/patches/CVE-2025-15367.patch: Add control character regex check",
                            "      in Lib/poplib.py. Add test in Lib/test/test_poplib.py.",
                            "    - CVE-2025-15367",
                            "  * SECURITY UPDATE: HTTP header injection in user controlled cookie values.",
                            "    - debian/patches/CVE-2026-0672.patch: Add _control_characters_re and",
                            "      checks in Lib/http/cookies.py. Add test in Lib/test/test_http_cookies.py.",
                            "    - CVE-2026-0672",
                            "  * SECURITY UPDATE: HTTP header injection in user controlled headers and",
                            "    values with newlines.",
                            "    - debian/patches/CVE-2026-0865.patch: Add _control_chars_re and check in",
                            "      Lib/wsgiref/headers.py. Add test in Lib/test/support/__init__.py and",
                            "      Lib/test/test_wsgiref.py.",
                            "    - CVE-2026-0865",
                            ""
                        ],
                        "package": "python3.12",
                        "version": "3.12.3-1ubuntu0.11",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com>",
                        "date": "Thu, 22 Jan 2026 17:27:42 -0330"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-13836",
                                "url": "https://ubuntu.com/security/CVE-2025-13836",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: HTTP Content-Length denial of service",
                            "    - debian/patches/CVE-2025-13836.patch: Read large data in chunks with",
                            "      geometric reads in Lib/http/client.py and add tests in ",
                            "      Lib/test/test_httplib.py",
                            "    - CVE-2025-13836",
                            ""
                        ],
                        "package": "python3.12",
                        "version": "3.12.3-1ubuntu0.10",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Vyom Yadav <vyom.yadav@canonical.com>",
                        "date": "Thu, 08 Jan 2026 17:00:50 +0530"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "screen",
                "from_version": {
                    "source_package_name": "screen",
                    "source_package_version": "4.9.1-1build1",
                    "version": "4.9.1-1build1"
                },
                "to_version": {
                    "source_package_name": "screen",
                    "source_package_version": "4.9.1-1ubuntu1",
                    "version": "4.9.1-1ubuntu1"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-46802",
                        "url": "https://ubuntu.com/security/CVE-2025-46802",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-46804",
                        "url": "https://ubuntu.com/security/CVE-2025-46804",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-46805",
                        "url": "https://ubuntu.com/security/CVE-2025-46805",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-46802",
                                "url": "https://ubuntu.com/security/CVE-2025-46802",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-46804",
                                "url": "https://ubuntu.com/security/CVE-2025-46804",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-46805",
                                "url": "https://ubuntu.com/security/CVE-2025-46805",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: incorrect PTY permissions",
                            "    - debian/patches/CVE-2025-46802.patch: prevent temporary 0666 mode on",
                            "      PTYs in attacher.c, screen.c.",
                            "    - CVE-2025-46802",
                            "  * SECURITY UPDATE: minor information leak",
                            "    - debian/patches/CVE-2025-46804.patch: avoid file existence test",
                            "      information leaks in screen.c, socket.c.",
                            "    - CVE-2025-46804",
                            "  * SECURITY UPDATE: TOCTOU allowing to send SIGHUP, SIGCONT",
                            "    - debian/patches/CVE-2025-46805.patch: don't send signals with root",
                            "      privileges in socket.c.",
                            "    - CVE-2025-46805",
                            ""
                        ],
                        "package": "screen",
                        "version": "4.9.1-1ubuntu1",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Thu, 22 Jan 2026 14:59:29 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "snapd",
                "from_version": {
                    "source_package_name": "snapd",
                    "source_package_version": "2.72+ubuntu24.04",
                    "version": "2.72+ubuntu24.04"
                },
                "to_version": {
                    "source_package_name": "snapd",
                    "source_package_version": "2.73+ubuntu24.04",
                    "version": "2.73+ubuntu24.04"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2132084,
                    2127189,
                    1851490,
                    2121853,
                    2127214,
                    2127244,
                    2127766,
                    2118396,
                    2114923,
                    2112551,
                    2114779,
                    2112544,
                    2112332,
                    1952500,
                    1849346,
                    2098780,
                    2033883
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * New upstream release, LP: #2132084",
                            "    - FDE: do not save incomplete FDE state when resealing was skipped",
                            "    - FDE: warn of inconsistent primary or policy counter",
                            "    - Confdb: document confdb in snapctl help messages",
                            "    - Confdb: only confdb hooks wait if snaps are disabled",
                            "    - Confdb: relax confdb change conflict checks",
                            "    - Confdb: remove empty parent when removing last leaf",
                            "    - Confdb: support parsing field filters",
                            "    - Confdb: wrap confdb write values under \"values\" key",
                            "    - dm-verity for essential snaps: add new naming convention for",
                            "      verity files",
                            "    - dm-verity for essential snaps: add snap integrity discovery",
                            "    - dm-verity for essential snaps: fix verity salt calculation",
                            "    - Assertions: add hardware identity assertion",
                            "    - Assertions: add integrity stanza in snap resources revisions",
                            "    - Assertions: add request message assertion required for remote",
                            "      device management",
                            "    - Assertions: add response-message assertion for secure remote",
                            "      device management",
                            "    - Assertions: expose WithStackedBackstore in RODatabase",
                            "    - Packaging: cross-distro | install upstream NEWS file into relevant",
                            "      snapd package doc directory",
                            "    - Packaging: cross-distro | tweak how the blocks injecting",
                            "      $SNAP_MOUNT_DIR/bin are generated as required for openSUSE",
                            "    - Packaging: remove deprecated snap-gdb-shim and all references now",
                            "      that snap run --gdb is unsupported and replaced by --gdbserver",
                            "    - Preseed: call systemd-tmpfiles instead handle-writable-paths on",
                            "      uc26",
                            "    - Preseed: do not remove the /snap dir but rather all its contents",
                            "      during reset",
                            "    - snap-confine: attach name derived from security tag to BPF maps",
                            "      and programs",
                            "    - snap-confine: ensure permitted capabilities match expectation",
                            "    - snap-confine: fix cached snap-confine profile cleanup to report",
                            "      the correct error instead of masking backend setup failures",
                            "    - snap-confine: Improve validation of user controlled paths",
                            "    - snap-confine: tighten snap cgroup checks to ensure a snap cannot",
                            "      start another snap in the same cgroup, preventing incorrect",
                            "      device-filter installation",
                            "    - core-initrd: add 26.04 ubuntu-core-initramfs package",
                            "    - core-initrd: add missing order dependency for setting default",
                            "      system files",
                            "    - core-initrd: avoid scanning loop and mmc boot partitions as the",
                            "      boot disk won't be any of these",
                            "    - core-initrd: make cpio a Depends and remove from Build-Depends",
                            "    - core-initrd: start plymouth sooner and reload when gadget is",
                            "      available",
                            "    - Cross-distro: modify syscheck to account for differences in",
                            "      openSUSE 16.0+",
                            "    - Validation sets: use in-flight validation sets when calling",
                            "      'snapctl install' from hook",
                            "    - Prompting: enable prompting for the camera interface",
                            "    - Prompting: remove polkit authentication when modifying/deleting",
                            "      prompting rules",
                            "    - LP: #2127189 Prompting: do not record notices for unchanged rules",
                            "      on snapd startup",
                            "    - AppArmor: add free and pidof to the template",
                            "    - AppArmor: adjust interfaces/profiles to cope with coreutils paths",
                            "    - Interfaces: add support for compatibility expressions",
                            "    - Interfaces: checkbox-support | complete overhaul",
                            "    - Interfaces: define vulkan-driver-libs, cuda-driver-libs, egl-",
                            "      driver-libs, gbm-driver-libs, opengl-driver-libs, and opengles-",
                            "      driver-libs",
                            "    - Interfaces: allow snaps on classic access to nvidia graphics",
                            "      libraries exported by *-driver-libs interfaces",
                            "    - Interfaces: fwupd | broaden access to /boot/efi/EFI",
                            "    - Interfaces: gsettings | set dconf-service as profile for",
                            "      ca.desrt.dconf.Writer",
                            "    - Interfaces: iscsi-initiator, dm-multipath, nvme-control | add new",
                            "      interfaces",
                            "    - Interfaces: opengl | grant read/write permission to /run/nvidia-",
                            "      persistenced/socket",
                            "    - interfaces: ros-snapd-support | add access to /v2/changes/",
                            "    - Interfaces: system-observe | read access to btrfs/ext4/zfs",
                            "      filesystem information",
                            "    - Interfaces: system-trace | allow /sys/kernel/tracing/** rw",
                            "    - Interfaces: usb-gadget | add support for ffs mounts in attributes",
                            "    - Add autocompletion to run command",
                            "    - Introduce option for disallowing auto-connection of a specific",
                            "      interface",
                            "    - Only log errors for user service operations performed as a part of",
                            "      snap removal",
                            "    - Patch snap names in service requests for parallel installed snaps",
                            "    - Simplify traits for eMMC special partitions",
                            "    - Strip apparmor_parser from debug symbols shrinking snapd size by",
                            "      ~3MB",
                            "    - Fix InstallPathMany skipping refresh control",
                            "    - Fix waiting for GDB helper to stop before attaching gdbserver",
                            "    - Protect the per-snap tmp directory against being reaped by age",
                            "    - Prevent disabling base snaps to ensure dependent snaps can be",
                            "      removed",
                            "    - Modify API endpoint /v2/logs to reject n <= 0 (except for special",
                            "      case -1 meaning all)",
                            "    - Avoid potential deadlock when task is injected after the change",
                            "      was aborted",
                            "    - Avoid race between store download stream and cache cleanup",
                            "      executing in parallel when invoked by snap download task",
                            "    - LP: #1851490 Use \"current\" instead of revision number for icons",
                            "    - LP: #2121853 Add snapctl version command",
                            "    - LP: #2127214 Ensure no more than one partition on disk can match a",
                            "      gadget partition",
                            "    - LP: #2127244 snap-confine: update AppArmor profile to allow",
                            "      read/write to journal as workaround for snap-confine fd",
                            "      inheritance prevented by newer AppArmor",
                            "    - LP: #2127766 Add new tracing mechanism with independently running",
                            "      strace and shim synchronization",
                            ""
                        ],
                        "package": "snapd",
                        "version": "2.73+ubuntu24.04",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2132084,
                            2127189,
                            1851490,
                            2121853,
                            2127214,
                            2127244,
                            2127766
                        ],
                        "author": "Ernest Lotter <ernest.lotter@canonical.com>",
                        "date": "Fri, 21 Nov 2025 09:08:02 +0200"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * New upstream release, LP: #2118396",
                            "    - FDE: auto-repair when recovery key is used",
                            "    - FDE: revoke keys on shim update",
                            "    - FDE: revoke old TPM keys when dbx has been updated",
                            "    - FDE: do not reseal FDE hook keys every time",
                            "    - FDE: store keys in the kernel keyring when installing from initrd",
                            "    - FDE: allow disabled DMA on Core",
                            "    - FDE: snap-bootstrap: do not check for partition in scan-disk on",
                            "      CVM",
                            "    - FDE: support secboot preinstall check for 25.10+ hybrid installs",
                            "      via the /v2/system/{label} endpoint",
                            "    - FDE: support generating recovery key at install time via the",
                            "      /v2/systems/{label} endpoint",
                            "    - FDE: update passphrase quality check at install time via the",
                            "      /v2/systems/{label} endpoint",
                            "    - FDE: support replacing recovery key at runtime via the new",
                            "      /v2/system-volumes endpoint",
                            "    - FDE: support checking recovery keys at runtime via the /v2/system-",
                            "      volumes endpoint",
                            "    - FDE: support enumerating keyslots at runtime via the /v2/system-",
                            "      volumes endpoint",
                            "    - FDE: support changing passphrase at runtime via the /v2/system-",
                            "      volumes endpoint",
                            "    - FDE: support passphrase quality check at runtime via the",
                            "      /v2/system-volumes endpoint",
                            "    - FDE: update secboot to revision 3e181c8edf0f",
                            "    - Confdb: support lists and indexed paths on read and write",
                            "    - Confdb: alias references must be wrapped in brackets",
                            "    - Confdb: support indexed paths in confdb-schema assertion",
                            "    - Confdb: make API errors consistent with options",
                            "    - Confdb: fetch confdb-schema assertion on access",
                            "    - Confdb: prevent --previous from being used in read-side hooks",
                            "    - Components: fix snap command with multiple components",
                            "    - Components: set revision of seed components to x1",
                            "    - Components: unmount extra kernel-modules components mounts",
                            "    - AppArmor Prompting: add lifespan \"session\" for prompting rules",
                            "    - AppArmor Prompting: support restoring prompts after snapd restart",
                            "    - AppArmor Prompting: limit the extra information included in probed",
                            "      AppArmor features and system key",
                            "    - Notices: refactor notice state internals",
                            "    - SELinux: look for restorecon/matchpathcon at all known locations",
                            "      rather than current PATH",
                            "    - SELinux: update policy to allow watching cgroups (for RAA), and",
                            "      talking to user session agents (service mgmt/refresh)",
                            "    - Refresh App Awareness: Fix unexpected inotify file descriptor",
                            "      cleanup",
                            "    - snap-confine: workaround for glibc fchmodat() fallback and handle",
                            "      ENOSYS",
                            "    - snap-confine: add support for host policy for limiting users able",
                            "      to run snaps",
                            "    - LP: #2114923 Reject system key mismatch advise when not yet seeded",
                            "    - Use separate lanes for essential and non-essential snaps during",
                            "      seeding and allow non-essential installs to retry",
                            "    - Fix bug preventing remodel from core18 to core18 when snapd snap",
                            "      is unchanged",
                            "    - LP: #2112551 Make removal of last active revision of a snap equal",
                            "      to snap remove",
                            "    - LP: #2114779 Allow non-gpt in fallback mode to support RPi",
                            "    - Switch from using systemd LogNamespace to manually controlled",
                            "      journal quotas",
                            "    - Change snap command trace logging to only log the command names",
                            "    - Grant desktop-launch access to /v2/snaps",
                            "    - Update code for creating the snap journal stream",
                            "    - Switch from using core to snapd snap for snap debug connectivity",
                            "    - LP: #2112544 Fix offline remodel case where we switched to a",
                            "      channel without an actual refresh",
                            "    - LP: #2112332 Exclude snap/snapd/preseeding when generating preseed",
                            "      tarball",
                            "    - LP: #1952500 Fix snap command progress reporting",
                            "    - LP: #1849346 Interfaces: kerberos-tickets |  add new interface",
                            "    - Interfaces: u2f | add support for Thetis Pro",
                            "    - Interfaces: u2f | add OneSpan device and fix older device",
                            "    - Interfaces: pipewire, audio-playback | support pipewire as system",
                            "      daemon",
                            "    - Interfaces: gpg-keys | allow access to GPG agent sockets",
                            "    - Interfaces: usb-gadget | add new interface",
                            "    - Interfaces: snap-fde-control, firmware-updater-support | add new",
                            "      interfaces to support FDE",
                            "    - Interfaces: timezone-control | extend to support timedatectl",
                            "      varlink",
                            "    - Interfaces: cpu-control | fix rules for accessing IRQ sysfs and",
                            "      procfs directories",
                            "    - Interfaces: microstack-support | allow SR-IOV attachments",
                            "    - Interfaces: modify AppArmor template to allow snaps to read their",
                            "      own systemd credentials",
                            "    - Interfaces: posix-mq | allow stat on /dev/mqueue",
                            "    - LP: #2098780 Interfaces: log-observe | add capability",
                            "      dac_read_search",
                            "    - Interfaces: block-devices | allow access to ZFS pools and datasets",
                            "    - LP: #2033883 Interfaces: block-devices | opt-in access to",
                            "      individual partitions",
                            "    - Interfaces: accel | add new interface to support accel kernel",
                            "      subsystem",
                            "    - Interfaces: shutdown | allow client to bind on its side of dbus",
                            "      socket",
                            "    - Interfaces: modify seccomp template to allow pwritev2",
                            "    - Interfaces: modify AppArmor template to allow reading",
                            "      /proc/sys/fs/nr_open",
                            "    - Packaging: drop snap.failure service for openSUSE",
                            "    - Packaging: add SELinux support for openSUSE",
                            "    - Packaging: disable optee when using nooptee build tag",
                            "    - Packaging: add support for static PIE builds in snapd.mk, drop",
                            "      pie.patch from openSUSE",
                            "    - Packaging: add libcap2-bin runtime dependency for ubuntu-16.04",
                            "    - Packaging: use snapd.mk for packaging on Fedora",
                            "    - Packaging: exclude .git directory",
                            "    - Packaging: fix DPKG_PARSECHANGELOG assignment",
                            "    - Packaging: fix building on Fedora with dpkg installed",
                            ""
                        ],
                        "package": "snapd",
                        "version": "2.71",
                        "urgency": "medium",
                        "distributions": "xenial",
                        "launchpad_bugs_fixed": [
                            2118396,
                            2114923,
                            2112551,
                            2114779,
                            2112544,
                            2112332,
                            1952500,
                            1849346,
                            2098780,
                            2033883
                        ],
                        "author": "Ernest Lotter <ernest.lotter@canonical.com>",
                        "date": "Fri, 25 Jul 2025 13:18:47 +0200"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "systemd",
                "from_version": {
                    "source_package_name": "systemd",
                    "source_package_version": "255.4-1ubuntu8.11",
                    "version": "255.4-1ubuntu8.11"
                },
                "to_version": {
                    "source_package_name": "systemd",
                    "source_package_version": "255.4-1ubuntu8.12",
                    "version": "255.4-1ubuntu8.12"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2125405,
                    2132666,
                    2130554
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * basic: validate timezones in get_timezones() (LP: #2125405)",
                            "  * ukify: fix insertion of padding in merged sections (LP: #2132666)",
                            "  * core: downgrade a log message from warning to debug (LP: #2130554)",
                            "  * test: skip testcase_multipath_basic_failover.",
                            "    This test has been failing on Ubuntu infrastructure for a long time.",
                            "    Leaving this alone at the moment allows other failures to potentially go",
                            "    unnoticed, because the migration reference baseline has been reset to",
                            "    fail. Skip the test to try and reset the baseline to pass.",
                            "  * d/gbp.conf: stop using wrap_cl.py",
                            ""
                        ],
                        "package": "systemd",
                        "version": "255.4-1ubuntu8.12",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2125405,
                            2132666,
                            2130554
                        ],
                        "author": "Nick Rosbrook <enr0n@ubuntu.com>",
                        "date": "Tue, 25 Nov 2025 13:16:31 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "systemd-dev",
                "from_version": {
                    "source_package_name": "systemd",
                    "source_package_version": "255.4-1ubuntu8.11",
                    "version": "255.4-1ubuntu8.11"
                },
                "to_version": {
                    "source_package_name": "systemd",
                    "source_package_version": "255.4-1ubuntu8.12",
                    "version": "255.4-1ubuntu8.12"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2125405,
                    2132666,
                    2130554
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * basic: validate timezones in get_timezones() (LP: #2125405)",
                            "  * ukify: fix insertion of padding in merged sections (LP: #2132666)",
                            "  * core: downgrade a log message from warning to debug (LP: #2130554)",
                            "  * test: skip testcase_multipath_basic_failover.",
                            "    This test has been failing on Ubuntu infrastructure for a long time.",
                            "    Leaving this alone at the moment allows other failures to potentially go",
                            "    unnoticed, because the migration reference baseline has been reset to",
                            "    fail. Skip the test to try and reset the baseline to pass.",
                            "  * d/gbp.conf: stop using wrap_cl.py",
                            ""
                        ],
                        "package": "systemd",
                        "version": "255.4-1ubuntu8.12",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2125405,
                            2132666,
                            2130554
                        ],
                        "author": "Nick Rosbrook <enr0n@ubuntu.com>",
                        "date": "Tue, 25 Nov 2025 13:16:31 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "systemd-resolved",
                "from_version": {
                    "source_package_name": "systemd",
                    "source_package_version": "255.4-1ubuntu8.11",
                    "version": "255.4-1ubuntu8.11"
                },
                "to_version": {
                    "source_package_name": "systemd",
                    "source_package_version": "255.4-1ubuntu8.12",
                    "version": "255.4-1ubuntu8.12"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2125405,
                    2132666,
                    2130554
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * basic: validate timezones in get_timezones() (LP: #2125405)",
                            "  * ukify: fix insertion of padding in merged sections (LP: #2132666)",
                            "  * core: downgrade a log message from warning to debug (LP: #2130554)",
                            "  * test: skip testcase_multipath_basic_failover.",
                            "    This test has been failing on Ubuntu infrastructure for a long time.",
                            "    Leaving this alone at the moment allows other failures to potentially go",
                            "    unnoticed, because the migration reference baseline has been reset to",
                            "    fail. Skip the test to try and reset the baseline to pass.",
                            "  * d/gbp.conf: stop using wrap_cl.py",
                            ""
                        ],
                        "package": "systemd",
                        "version": "255.4-1ubuntu8.12",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2125405,
                            2132666,
                            2130554
                        ],
                        "author": "Nick Rosbrook <enr0n@ubuntu.com>",
                        "date": "Tue, 25 Nov 2025 13:16:31 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "systemd-sysv",
                "from_version": {
                    "source_package_name": "systemd",
                    "source_package_version": "255.4-1ubuntu8.11",
                    "version": "255.4-1ubuntu8.11"
                },
                "to_version": {
                    "source_package_name": "systemd",
                    "source_package_version": "255.4-1ubuntu8.12",
                    "version": "255.4-1ubuntu8.12"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2125405,
                    2132666,
                    2130554
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * basic: validate timezones in get_timezones() (LP: #2125405)",
                            "  * ukify: fix insertion of padding in merged sections (LP: #2132666)",
                            "  * core: downgrade a log message from warning to debug (LP: #2130554)",
                            "  * test: skip testcase_multipath_basic_failover.",
                            "    This test has been failing on Ubuntu infrastructure for a long time.",
                            "    Leaving this alone at the moment allows other failures to potentially go",
                            "    unnoticed, because the migration reference baseline has been reset to",
                            "    fail. Skip the test to try and reset the baseline to pass.",
                            "  * d/gbp.conf: stop using wrap_cl.py",
                            ""
                        ],
                        "package": "systemd",
                        "version": "255.4-1ubuntu8.12",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2125405,
                            2132666,
                            2130554
                        ],
                        "author": "Nick Rosbrook <enr0n@ubuntu.com>",
                        "date": "Tue, 25 Nov 2025 13:16:31 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "systemd-timesyncd",
                "from_version": {
                    "source_package_name": "systemd",
                    "source_package_version": "255.4-1ubuntu8.11",
                    "version": "255.4-1ubuntu8.11"
                },
                "to_version": {
                    "source_package_name": "systemd",
                    "source_package_version": "255.4-1ubuntu8.12",
                    "version": "255.4-1ubuntu8.12"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2125405,
                    2132666,
                    2130554
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * basic: validate timezones in get_timezones() (LP: #2125405)",
                            "  * ukify: fix insertion of padding in merged sections (LP: #2132666)",
                            "  * core: downgrade a log message from warning to debug (LP: #2130554)",
                            "  * test: skip testcase_multipath_basic_failover.",
                            "    This test has been failing on Ubuntu infrastructure for a long time.",
                            "    Leaving this alone at the moment allows other failures to potentially go",
                            "    unnoticed, because the migration reference baseline has been reset to",
                            "    fail. Skip the test to try and reset the baseline to pass.",
                            "  * d/gbp.conf: stop using wrap_cl.py",
                            ""
                        ],
                        "package": "systemd",
                        "version": "255.4-1ubuntu8.12",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2125405,
                            2132666,
                            2130554
                        ],
                        "author": "Nick Rosbrook <enr0n@ubuntu.com>",
                        "date": "Tue, 25 Nov 2025 13:16:31 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "telnet",
                "from_version": {
                    "source_package_name": "inetutils",
                    "source_package_version": "2:2.5-3ubuntu4",
                    "version": "0.17+2.5-3ubuntu4"
                },
                "to_version": {
                    "source_package_name": "inetutils",
                    "source_package_version": "2:2.5-3ubuntu4.1",
                    "version": "0.17+2.5-3ubuntu4.1"
                },
                "cves": [
                    {
                        "cve": "CVE-2026-24061",
                        "url": "https://ubuntu.com/security/CVE-2026-24061",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2026-24061",
                                "url": "https://ubuntu.com/security/CVE-2026-24061",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: telnetd remote authentication bypass",
                            "    - debian/patches/CVE-2026-24061-1.patch: fix injection bug with bogus",
                            "      user names in telnetd/utility.c.",
                            "    - debian/patches/CVE-2026-24061-2.patch: sanitize all variable",
                            "      expansions in telnetd/utility.c.",
                            "    - debian/patches/CVE-2026-24061-3.patch: fix compiler warning in",
                            "      telnetd/utility.c.",
                            "    - CVE-2026-24061",
                            ""
                        ],
                        "package": "inetutils",
                        "version": "2:2.5-3ubuntu4.1",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Fri, 30 Jan 2026 11:17:34 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "ubuntu-release-upgrader-core",
                "from_version": {
                    "source_package_name": "ubuntu-release-upgrader",
                    "source_package_version": "1:24.04.27",
                    "version": "1:24.04.27"
                },
                "to_version": {
                    "source_package_name": "ubuntu-release-upgrader",
                    "source_package_version": "1:24.04.28",
                    "version": "1:24.04.28"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2138637
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Run pre-build.sh: updating mirrors for point release (LP: #2138637)",
                            ""
                        ],
                        "package": "ubuntu-release-upgrader",
                        "version": "1:24.04.28",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2138637
                        ],
                        "author": "Florent 'Skia' Jacquet <skia@ubuntu.com>",
                        "date": "Mon, 19 Jan 2026 16:31:44 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "udev",
                "from_version": {
                    "source_package_name": "systemd",
                    "source_package_version": "255.4-1ubuntu8.11",
                    "version": "255.4-1ubuntu8.11"
                },
                "to_version": {
                    "source_package_name": "systemd",
                    "source_package_version": "255.4-1ubuntu8.12",
                    "version": "255.4-1ubuntu8.12"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2125405,
                    2132666,
                    2130554
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * basic: validate timezones in get_timezones() (LP: #2125405)",
                            "  * ukify: fix insertion of padding in merged sections (LP: #2132666)",
                            "  * core: downgrade a log message from warning to debug (LP: #2130554)",
                            "  * test: skip testcase_multipath_basic_failover.",
                            "    This test has been failing on Ubuntu infrastructure for a long time.",
                            "    Leaving this alone at the moment allows other failures to potentially go",
                            "    unnoticed, because the migration reference baseline has been reset to",
                            "    fail. Skip the test to try and reset the baseline to pass.",
                            "  * d/gbp.conf: stop using wrap_cl.py",
                            ""
                        ],
                        "package": "systemd",
                        "version": "255.4-1ubuntu8.12",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2125405,
                            2132666,
                            2130554
                        ],
                        "author": "Nick Rosbrook <enr0n@ubuntu.com>",
                        "date": "Tue, 25 Nov 2025 13:16:31 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "util-linux",
                "from_version": {
                    "source_package_name": "util-linux",
                    "source_package_version": "2.39.3-9ubuntu6.3",
                    "version": "2.39.3-9ubuntu6.3"
                },
                "to_version": {
                    "source_package_name": "util-linux",
                    "source_package_version": "2.39.3-9ubuntu6.4",
                    "version": "2.39.3-9ubuntu6.4"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2123886
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Add ARM core support for Vera systems (LP: #2123886)",
                            "    - d/p/ubuntu/lp-2123886-add-missing-arm-cores.patch",
                            ""
                        ],
                        "package": "util-linux",
                        "version": "2.39.3-9ubuntu6.4",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2123886
                        ],
                        "author": "Joao Andre Simioni <joao.simioni@canonical.com>",
                        "date": "Mon, 15 Sep 2025 21:08:02 -0300"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "uuid-runtime",
                "from_version": {
                    "source_package_name": "util-linux",
                    "source_package_version": "2.39.3-9ubuntu6.3",
                    "version": "2.39.3-9ubuntu6.3"
                },
                "to_version": {
                    "source_package_name": "util-linux",
                    "source_package_version": "2.39.3-9ubuntu6.4",
                    "version": "2.39.3-9ubuntu6.4"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2123886
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Add ARM core support for Vera systems (LP: #2123886)",
                            "    - d/p/ubuntu/lp-2123886-add-missing-arm-cores.patch",
                            ""
                        ],
                        "package": "util-linux",
                        "version": "2.39.3-9ubuntu6.4",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2123886
                        ],
                        "author": "Joao Andre Simioni <joao.simioni@canonical.com>",
                        "date": "Mon, 15 Sep 2025 21:08:02 -0300"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            }
        ],
        "snap": []
    },
    "added": {
        "deb": [
            {
                "name": "libdebuginfod-common",
                "from_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "to_version": {
                    "source_package_name": "elfutils",
                    "source_package_version": "0.190-1.1ubuntu0.1",
                    "version": "0.190-1.1ubuntu0.1"
                },
                "cves": [
                    {
                        "cve": "CVE-2024-25260",
                        "url": "https://ubuntu.com/security/CVE-2024-25260",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-1365",
                        "url": "https://ubuntu.com/security/CVE-2025-1365",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-1371",
                        "url": "https://ubuntu.com/security/CVE-2025-1371",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-1372",
                        "url": "https://ubuntu.com/security/CVE-2025-1372",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-1377",
                        "url": "https://ubuntu.com/security/CVE-2025-1377",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [
                    2083480
                ],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2024-25260",
                                "url": "https://ubuntu.com/security/CVE-2024-25260",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-1365",
                                "url": "https://ubuntu.com/security/CVE-2025-1365",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-1371",
                                "url": "https://ubuntu.com/security/CVE-2025-1371",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-1372",
                                "url": "https://ubuntu.com/security/CVE-2025-1372",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-1377",
                                "url": "https://ubuntu.com/security/CVE-2025-1377",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: out-of-bounds read",
                            "    - debian/patches/CVE-2024-25260.patch: Fix arm_machine_flag_name",
                            "      version string.",
                            "    - CVE-2024-25260",
                            "  * SECURITY UPDATE: buffer overflow",
                            "    - debian/patches/CVE-2025-1365.patch: Use validate_str also to check",
                            "      dynamic symstr data.",
                            "    - CVE-2025-1365",
                            "  * SECURITY UPDATE: null pointer dereference",
                            "    - debian/patches/CVE-2025-1371.patch: Handle NULL phdr in",
                            "      handle_dynamic_symtab.",
                            "    - CVE-2025-1371",
                            "  * SECURITY UPDATE: null pointer dereference",
                            "    - debian/patches/CVE-2025-1372.patch: Skip trying to uncompress",
                            "      sections without a name.",
                            "    - CVE-2025-1372",
                            "  * SECURITY UPDATE: null pointer dereference",
                            "    - debian/patches/CVE-2025-1377.patch: Verify symbol table is a real",
                            "      symbol table.",
                            "    - CVE-2025-1377",
                            ""
                        ],
                        "package": "elfutils",
                        "version": "0.190-1.1ubuntu0.1",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Fabian Toepfer <fabian.toepfer@canonical.com>",
                        "date": "Mon, 17 Mar 2025 17:03:58 +0100"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * SRU: LP: #2083480: No-change rebuild to disable frame pointers on",
                            "    ppc64el and s390x.",
                            ""
                        ],
                        "package": "elfutils",
                        "version": "0.190-1.1build4.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2083480
                        ],
                        "author": "Matthias Klose <doko@ubuntu.com>",
                        "date": "Wed, 02 Oct 2024 14:40:51 +0200"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * No-change rebuild against libarchive13t64",
                            ""
                        ],
                        "package": "elfutils",
                        "version": "0.190-1.1build4",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [],
                        "author": "Steve Langasek <steve.langasek@ubuntu.com>",
                        "date": "Sun, 07 Apr 2024 07:06:10 +0000"
                    }
                ],
                "notes": "For a newly added package only the three most recent changelog entries are shown.",
                "is_version_downgrade": false
            },
            {
                "name": "libdebuginfod1t64:riscv64",
                "from_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "to_version": {
                    "source_package_name": "elfutils",
                    "source_package_version": "0.190-1.1ubuntu0.1",
                    "version": "0.190-1.1ubuntu0.1"
                },
                "cves": [
                    {
                        "cve": "CVE-2024-25260",
                        "url": "https://ubuntu.com/security/CVE-2024-25260",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-1365",
                        "url": "https://ubuntu.com/security/CVE-2025-1365",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-1371",
                        "url": "https://ubuntu.com/security/CVE-2025-1371",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-1372",
                        "url": "https://ubuntu.com/security/CVE-2025-1372",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-1377",
                        "url": "https://ubuntu.com/security/CVE-2025-1377",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [
                    2083480
                ],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2024-25260",
                                "url": "https://ubuntu.com/security/CVE-2024-25260",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-1365",
                                "url": "https://ubuntu.com/security/CVE-2025-1365",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-1371",
                                "url": "https://ubuntu.com/security/CVE-2025-1371",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-1372",
                                "url": "https://ubuntu.com/security/CVE-2025-1372",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-1377",
                                "url": "https://ubuntu.com/security/CVE-2025-1377",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: out-of-bounds read",
                            "    - debian/patches/CVE-2024-25260.patch: Fix arm_machine_flag_name",
                            "      version string.",
                            "    - CVE-2024-25260",
                            "  * SECURITY UPDATE: buffer overflow",
                            "    - debian/patches/CVE-2025-1365.patch: Use validate_str also to check",
                            "      dynamic symstr data.",
                            "    - CVE-2025-1365",
                            "  * SECURITY UPDATE: null pointer dereference",
                            "    - debian/patches/CVE-2025-1371.patch: Handle NULL phdr in",
                            "      handle_dynamic_symtab.",
                            "    - CVE-2025-1371",
                            "  * SECURITY UPDATE: null pointer dereference",
                            "    - debian/patches/CVE-2025-1372.patch: Skip trying to uncompress",
                            "      sections without a name.",
                            "    - CVE-2025-1372",
                            "  * SECURITY UPDATE: null pointer dereference",
                            "    - debian/patches/CVE-2025-1377.patch: Verify symbol table is a real",
                            "      symbol table.",
                            "    - CVE-2025-1377",
                            ""
                        ],
                        "package": "elfutils",
                        "version": "0.190-1.1ubuntu0.1",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Fabian Toepfer <fabian.toepfer@canonical.com>",
                        "date": "Mon, 17 Mar 2025 17:03:58 +0100"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * SRU: LP: #2083480: No-change rebuild to disable frame pointers on",
                            "    ppc64el and s390x.",
                            ""
                        ],
                        "package": "elfutils",
                        "version": "0.190-1.1build4.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2083480
                        ],
                        "author": "Matthias Klose <doko@ubuntu.com>",
                        "date": "Wed, 02 Oct 2024 14:40:51 +0200"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * No-change rebuild against libarchive13t64",
                            ""
                        ],
                        "package": "elfutils",
                        "version": "0.190-1.1build4",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [],
                        "author": "Steve Langasek <steve.langasek@ubuntu.com>",
                        "date": "Sun, 07 Apr 2024 07:06:10 +0000"
                    }
                ],
                "notes": "For a newly added package only the three most recent changelog entries are shown.",
                "is_version_downgrade": false
            },
            {
                "name": "linux-headers-6.17.0-14-generic",
                "from_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "to_version": {
                    "source_package_name": "linux-riscv-6.17",
                    "source_package_version": "6.17.0-14.14.1~24.04.1",
                    "version": "6.17.0-14.14.1~24.04.1"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-40256",
                        "url": "https://ubuntu.com/security/CVE-2025-40256",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68204",
                        "url": "https://ubuntu.com/security/CVE-2025-68204",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68203",
                        "url": "https://ubuntu.com/security/CVE-2025-68203",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40267",
                        "url": "https://ubuntu.com/security/CVE-2025-40267",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68198",
                        "url": "https://ubuntu.com/security/CVE-2025-68198",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68199",
                        "url": "https://ubuntu.com/security/CVE-2025-68199",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40268",
                        "url": "https://ubuntu.com/security/CVE-2025-40268",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40269",
                        "url": "https://ubuntu.com/security/CVE-2025-40269",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68205",
                        "url": "https://ubuntu.com/security/CVE-2025-68205",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40270",
                        "url": "https://ubuntu.com/security/CVE-2025-40270",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40271",
                        "url": "https://ubuntu.com/security/CVE-2025-40271",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40272",
                        "url": "https://ubuntu.com/security/CVE-2025-40272",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68245",
                        "url": "https://ubuntu.com/security/CVE-2025-68245",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68240",
                        "url": "https://ubuntu.com/security/CVE-2025-68240",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68241",
                        "url": "https://ubuntu.com/security/CVE-2025-68241",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68211",
                        "url": "https://ubuntu.com/security/CVE-2025-68211",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68246",
                        "url": "https://ubuntu.com/security/CVE-2025-68246",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40273",
                        "url": "https://ubuntu.com/security/CVE-2025-40273",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40212",
                        "url": "https://ubuntu.com/security/CVE-2025-40212",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40274",
                        "url": "https://ubuntu.com/security/CVE-2025-40274",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68202",
                        "url": "https://ubuntu.com/security/CVE-2025-68202",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68239",
                        "url": "https://ubuntu.com/security/CVE-2025-68239",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68247",
                        "url": "https://ubuntu.com/security/CVE-2025-68247",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68208",
                        "url": "https://ubuntu.com/security/CVE-2025-68208",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68200",
                        "url": "https://ubuntu.com/security/CVE-2025-68200",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40275",
                        "url": "https://ubuntu.com/security/CVE-2025-40275",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68242",
                        "url": "https://ubuntu.com/security/CVE-2025-68242",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68243",
                        "url": "https://ubuntu.com/security/CVE-2025-68243",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40276",
                        "url": "https://ubuntu.com/security/CVE-2025-40276",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40277",
                        "url": "https://ubuntu.com/security/CVE-2025-40277",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68206",
                        "url": "https://ubuntu.com/security/CVE-2025-68206",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68209",
                        "url": "https://ubuntu.com/security/CVE-2025-68209",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40278",
                        "url": "https://ubuntu.com/security/CVE-2025-40278",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40279",
                        "url": "https://ubuntu.com/security/CVE-2025-40279",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40280",
                        "url": "https://ubuntu.com/security/CVE-2025-40280",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40281",
                        "url": "https://ubuntu.com/security/CVE-2025-40281",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40282",
                        "url": "https://ubuntu.com/security/CVE-2025-40282",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40283",
                        "url": "https://ubuntu.com/security/CVE-2025-40283",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40284",
                        "url": "https://ubuntu.com/security/CVE-2025-40284",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68210",
                        "url": "https://ubuntu.com/security/CVE-2025-68210",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40285",
                        "url": "https://ubuntu.com/security/CVE-2025-40285",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40286",
                        "url": "https://ubuntu.com/security/CVE-2025-40286",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40287",
                        "url": "https://ubuntu.com/security/CVE-2025-40287",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40288",
                        "url": "https://ubuntu.com/security/CVE-2025-40288",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40289",
                        "url": "https://ubuntu.com/security/CVE-2025-40289",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68201",
                        "url": "https://ubuntu.com/security/CVE-2025-68201",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68207",
                        "url": "https://ubuntu.com/security/CVE-2025-68207",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68244",
                        "url": "https://ubuntu.com/security/CVE-2025-68244",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68316",
                        "url": "https://ubuntu.com/security/CVE-2025-68316",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40292",
                        "url": "https://ubuntu.com/security/CVE-2025-40292",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68180",
                        "url": "https://ubuntu.com/security/CVE-2025-68180",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40327",
                        "url": "https://ubuntu.com/security/CVE-2025-40327",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40328",
                        "url": "https://ubuntu.com/security/CVE-2025-40328",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40291",
                        "url": "https://ubuntu.com/security/CVE-2025-40291",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68322",
                        "url": "https://ubuntu.com/security/CVE-2025-68322",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40293",
                        "url": "https://ubuntu.com/security/CVE-2025-40293",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40294",
                        "url": "https://ubuntu.com/security/CVE-2025-40294",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40329",
                        "url": "https://ubuntu.com/security/CVE-2025-40329",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40295",
                        "url": "https://ubuntu.com/security/CVE-2025-40295",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40296",
                        "url": "https://ubuntu.com/security/CVE-2025-40296",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40297",
                        "url": "https://ubuntu.com/security/CVE-2025-40297",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68320",
                        "url": "https://ubuntu.com/security/CVE-2025-68320",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68169",
                        "url": "https://ubuntu.com/security/CVE-2025-68169",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68197",
                        "url": "https://ubuntu.com/security/CVE-2025-68197",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40330",
                        "url": "https://ubuntu.com/security/CVE-2025-40330",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68192",
                        "url": "https://ubuntu.com/security/CVE-2025-68192",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40331",
                        "url": "https://ubuntu.com/security/CVE-2025-40331",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68187",
                        "url": "https://ubuntu.com/security/CVE-2025-68187",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68167",
                        "url": "https://ubuntu.com/security/CVE-2025-68167",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68319",
                        "url": "https://ubuntu.com/security/CVE-2025-68319",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40298",
                        "url": "https://ubuntu.com/security/CVE-2025-40298",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40299",
                        "url": "https://ubuntu.com/security/CVE-2025-40299",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40301",
                        "url": "https://ubuntu.com/security/CVE-2025-40301",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40358",
                        "url": "https://ubuntu.com/security/CVE-2025-40358",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68186",
                        "url": "https://ubuntu.com/security/CVE-2025-68186",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68184",
                        "url": "https://ubuntu.com/security/CVE-2025-68184",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40302",
                        "url": "https://ubuntu.com/security/CVE-2025-40302",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40303",
                        "url": "https://ubuntu.com/security/CVE-2025-40303",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40362",
                        "url": "https://ubuntu.com/security/CVE-2025-40362",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40332",
                        "url": "https://ubuntu.com/security/CVE-2025-40332",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40304",
                        "url": "https://ubuntu.com/security/CVE-2025-40304",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40305",
                        "url": "https://ubuntu.com/security/CVE-2025-40305",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68318",
                        "url": "https://ubuntu.com/security/CVE-2025-68318",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40209",
                        "url": "https://ubuntu.com/security/CVE-2025-40209",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68183",
                        "url": "https://ubuntu.com/security/CVE-2025-68183",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68173",
                        "url": "https://ubuntu.com/security/CVE-2025-68173",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40306",
                        "url": "https://ubuntu.com/security/CVE-2025-40306",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40307",
                        "url": "https://ubuntu.com/security/CVE-2025-40307",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40308",
                        "url": "https://ubuntu.com/security/CVE-2025-40308",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40309",
                        "url": "https://ubuntu.com/security/CVE-2025-40309",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68174",
                        "url": "https://ubuntu.com/security/CVE-2025-68174",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40310",
                        "url": "https://ubuntu.com/security/CVE-2025-40310",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40361",
                        "url": "https://ubuntu.com/security/CVE-2025-40361",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40311",
                        "url": "https://ubuntu.com/security/CVE-2025-40311",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68185",
                        "url": "https://ubuntu.com/security/CVE-2025-68185",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68176",
                        "url": "https://ubuntu.com/security/CVE-2025-68176",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68190",
                        "url": "https://ubuntu.com/security/CVE-2025-68190",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68168",
                        "url": "https://ubuntu.com/security/CVE-2025-68168",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40312",
                        "url": "https://ubuntu.com/security/CVE-2025-40312",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40333",
                        "url": "https://ubuntu.com/security/CVE-2025-40333",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68321",
                        "url": "https://ubuntu.com/security/CVE-2025-68321",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40334",
                        "url": "https://ubuntu.com/security/CVE-2025-40334",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68191",
                        "url": "https://ubuntu.com/security/CVE-2025-68191",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68309",
                        "url": "https://ubuntu.com/security/CVE-2025-68309",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40313",
                        "url": "https://ubuntu.com/security/CVE-2025-40313",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40335",
                        "url": "https://ubuntu.com/security/CVE-2025-40335",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40314",
                        "url": "https://ubuntu.com/security/CVE-2025-40314",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40336",
                        "url": "https://ubuntu.com/security/CVE-2025-40336",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68193",
                        "url": "https://ubuntu.com/security/CVE-2025-68193",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68175",
                        "url": "https://ubuntu.com/security/CVE-2025-68175",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68188",
                        "url": "https://ubuntu.com/security/CVE-2025-68188",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68315",
                        "url": "https://ubuntu.com/security/CVE-2025-68315",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40337",
                        "url": "https://ubuntu.com/security/CVE-2025-40337",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40338",
                        "url": "https://ubuntu.com/security/CVE-2025-40338",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40339",
                        "url": "https://ubuntu.com/security/CVE-2025-40339",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68194",
                        "url": "https://ubuntu.com/security/CVE-2025-68194",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40363",
                        "url": "https://ubuntu.com/security/CVE-2025-40363",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68311",
                        "url": "https://ubuntu.com/security/CVE-2025-68311",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40340",
                        "url": "https://ubuntu.com/security/CVE-2025-40340",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68196",
                        "url": "https://ubuntu.com/security/CVE-2025-68196",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68178",
                        "url": "https://ubuntu.com/security/CVE-2025-68178",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40341",
                        "url": "https://ubuntu.com/security/CVE-2025-40341",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40342",
                        "url": "https://ubuntu.com/security/CVE-2025-40342",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40343",
                        "url": "https://ubuntu.com/security/CVE-2025-40343",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68177",
                        "url": "https://ubuntu.com/security/CVE-2025-68177",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68317",
                        "url": "https://ubuntu.com/security/CVE-2025-68317",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40315",
                        "url": "https://ubuntu.com/security/CVE-2025-40315",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40316",
                        "url": "https://ubuntu.com/security/CVE-2025-40316",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40360",
                        "url": "https://ubuntu.com/security/CVE-2025-40360",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68179",
                        "url": "https://ubuntu.com/security/CVE-2025-68179",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68310",
                        "url": "https://ubuntu.com/security/CVE-2025-68310",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40317",
                        "url": "https://ubuntu.com/security/CVE-2025-40317",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40359",
                        "url": "https://ubuntu.com/security/CVE-2025-40359",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68181",
                        "url": "https://ubuntu.com/security/CVE-2025-68181",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68170",
                        "url": "https://ubuntu.com/security/CVE-2025-68170",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40213",
                        "url": "https://ubuntu.com/security/CVE-2025-40213",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40318",
                        "url": "https://ubuntu.com/security/CVE-2025-40318",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68312",
                        "url": "https://ubuntu.com/security/CVE-2025-68312",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40344",
                        "url": "https://ubuntu.com/security/CVE-2025-40344",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68172",
                        "url": "https://ubuntu.com/security/CVE-2025-68172",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40319",
                        "url": "https://ubuntu.com/security/CVE-2025-40319",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68182",
                        "url": "https://ubuntu.com/security/CVE-2025-68182",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68314",
                        "url": "https://ubuntu.com/security/CVE-2025-68314",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68189",
                        "url": "https://ubuntu.com/security/CVE-2025-68189",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68171",
                        "url": "https://ubuntu.com/security/CVE-2025-68171",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68313",
                        "url": "https://ubuntu.com/security/CVE-2025-68313",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40320",
                        "url": "https://ubuntu.com/security/CVE-2025-40320",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40321",
                        "url": "https://ubuntu.com/security/CVE-2025-40321",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40322",
                        "url": "https://ubuntu.com/security/CVE-2025-40322",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40211",
                        "url": "https://ubuntu.com/security/CVE-2025-40211",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40323",
                        "url": "https://ubuntu.com/security/CVE-2025-40323",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40210",
                        "url": "https://ubuntu.com/security/CVE-2025-40210",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40324",
                        "url": "https://ubuntu.com/security/CVE-2025-40324",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40326",
                        "url": "https://ubuntu.com/security/CVE-2025-40326",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40084",
                        "url": "https://ubuntu.com/security/CVE-2025-40084",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40222",
                        "url": "https://ubuntu.com/security/CVE-2025-40222",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40223",
                        "url": "https://ubuntu.com/security/CVE-2025-40223",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40106",
                        "url": "https://ubuntu.com/security/CVE-2025-40106",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40224",
                        "url": "https://ubuntu.com/security/CVE-2025-40224",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40225",
                        "url": "https://ubuntu.com/security/CVE-2025-40225",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40226",
                        "url": "https://ubuntu.com/security/CVE-2025-40226",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40227",
                        "url": "https://ubuntu.com/security/CVE-2025-40227",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40228",
                        "url": "https://ubuntu.com/security/CVE-2025-40228",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40229",
                        "url": "https://ubuntu.com/security/CVE-2025-40229",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40230",
                        "url": "https://ubuntu.com/security/CVE-2025-40230",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40231",
                        "url": "https://ubuntu.com/security/CVE-2025-40231",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40233",
                        "url": "https://ubuntu.com/security/CVE-2025-40233",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40235",
                        "url": "https://ubuntu.com/security/CVE-2025-40235",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40236",
                        "url": "https://ubuntu.com/security/CVE-2025-40236",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40237",
                        "url": "https://ubuntu.com/security/CVE-2025-40237",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40238",
                        "url": "https://ubuntu.com/security/CVE-2025-40238",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40239",
                        "url": "https://ubuntu.com/security/CVE-2025-40239",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40240",
                        "url": "https://ubuntu.com/security/CVE-2025-40240",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40241",
                        "url": "https://ubuntu.com/security/CVE-2025-40241",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40242",
                        "url": "https://ubuntu.com/security/CVE-2025-40242",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40243",
                        "url": "https://ubuntu.com/security/CVE-2025-40243",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40244",
                        "url": "https://ubuntu.com/security/CVE-2025-40244",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40245",
                        "url": "https://ubuntu.com/security/CVE-2025-40245",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40086",
                        "url": "https://ubuntu.com/security/CVE-2025-40086",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40087",
                        "url": "https://ubuntu.com/security/CVE-2025-40087",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40088",
                        "url": "https://ubuntu.com/security/CVE-2025-40088",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40162",
                        "url": "https://ubuntu.com/security/CVE-2025-40162",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40085",
                        "url": "https://ubuntu.com/security/CVE-2025-40085",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40172",
                        "url": "https://ubuntu.com/security/CVE-2025-40172",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40177",
                        "url": "https://ubuntu.com/security/CVE-2025-40177",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40163",
                        "url": "https://ubuntu.com/security/CVE-2025-40163",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40174",
                        "url": "https://ubuntu.com/security/CVE-2025-40174",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40089",
                        "url": "https://ubuntu.com/security/CVE-2025-40089",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40176",
                        "url": "https://ubuntu.com/security/CVE-2025-40176",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40164",
                        "url": "https://ubuntu.com/security/CVE-2025-40164",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40091",
                        "url": "https://ubuntu.com/security/CVE-2025-40091",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40175",
                        "url": "https://ubuntu.com/security/CVE-2025-40175",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40173",
                        "url": "https://ubuntu.com/security/CVE-2025-40173",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40092",
                        "url": "https://ubuntu.com/security/CVE-2025-40092",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40093",
                        "url": "https://ubuntu.com/security/CVE-2025-40093",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40094",
                        "url": "https://ubuntu.com/security/CVE-2025-40094",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40095",
                        "url": "https://ubuntu.com/security/CVE-2025-40095",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40165",
                        "url": "https://ubuntu.com/security/CVE-2025-40165",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40096",
                        "url": "https://ubuntu.com/security/CVE-2025-40096",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40097",
                        "url": "https://ubuntu.com/security/CVE-2025-40097",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40098",
                        "url": "https://ubuntu.com/security/CVE-2025-40098",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40099",
                        "url": "https://ubuntu.com/security/CVE-2025-40099",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40100",
                        "url": "https://ubuntu.com/security/CVE-2025-40100",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40101",
                        "url": "https://ubuntu.com/security/CVE-2025-40101",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40167",
                        "url": "https://ubuntu.com/security/CVE-2025-40167",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40102",
                        "url": "https://ubuntu.com/security/CVE-2025-40102",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40103",
                        "url": "https://ubuntu.com/security/CVE-2025-40103",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40104",
                        "url": "https://ubuntu.com/security/CVE-2025-40104",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40166",
                        "url": "https://ubuntu.com/security/CVE-2025-40166",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40105",
                        "url": "https://ubuntu.com/security/CVE-2025-40105",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40019",
                        "url": "https://ubuntu.com/security/CVE-2025-40019",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40214",
                        "url": "https://ubuntu.com/security/CVE-2025-40214",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [
                    2137844,
                    2013232,
                    2074082,
                    2137845,
                    1786013,
                    2137849,
                    1786013,
                    2136820,
                    2137698,
                    2129812,
                    2125022,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136813,
                    2132317,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2132095,
                    2131046,
                    2115860,
                    2128792,
                    2121852,
                    2131259,
                    2131259,
                    2131702,
                    2129610,
                    2138113,
                    2138115,
                    2133507,
                    1975592,
                    2013232
                ],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-40256",
                                "url": "https://ubuntu.com/security/CVE-2025-40256",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68204",
                                "url": "https://ubuntu.com/security/CVE-2025-68204",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68203",
                                "url": "https://ubuntu.com/security/CVE-2025-68203",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40267",
                                "url": "https://ubuntu.com/security/CVE-2025-40267",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68198",
                                "url": "https://ubuntu.com/security/CVE-2025-68198",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68199",
                                "url": "https://ubuntu.com/security/CVE-2025-68199",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40268",
                                "url": "https://ubuntu.com/security/CVE-2025-40268",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40269",
                                "url": "https://ubuntu.com/security/CVE-2025-40269",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68205",
                                "url": "https://ubuntu.com/security/CVE-2025-68205",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40270",
                                "url": "https://ubuntu.com/security/CVE-2025-40270",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40271",
                                "url": "https://ubuntu.com/security/CVE-2025-40271",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40272",
                                "url": "https://ubuntu.com/security/CVE-2025-40272",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68245",
                                "url": "https://ubuntu.com/security/CVE-2025-68245",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68240",
                                "url": "https://ubuntu.com/security/CVE-2025-68240",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68241",
                                "url": "https://ubuntu.com/security/CVE-2025-68241",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68211",
                                "url": "https://ubuntu.com/security/CVE-2025-68211",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68246",
                                "url": "https://ubuntu.com/security/CVE-2025-68246",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40273",
                                "url": "https://ubuntu.com/security/CVE-2025-40273",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40212",
                                "url": "https://ubuntu.com/security/CVE-2025-40212",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40274",
                                "url": "https://ubuntu.com/security/CVE-2025-40274",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68202",
                                "url": "https://ubuntu.com/security/CVE-2025-68202",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68239",
                                "url": "https://ubuntu.com/security/CVE-2025-68239",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68247",
                                "url": "https://ubuntu.com/security/CVE-2025-68247",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68208",
                                "url": "https://ubuntu.com/security/CVE-2025-68208",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68200",
                                "url": "https://ubuntu.com/security/CVE-2025-68200",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40275",
                                "url": "https://ubuntu.com/security/CVE-2025-40275",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68242",
                                "url": "https://ubuntu.com/security/CVE-2025-68242",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68243",
                                "url": "https://ubuntu.com/security/CVE-2025-68243",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40276",
                                "url": "https://ubuntu.com/security/CVE-2025-40276",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40277",
                                "url": "https://ubuntu.com/security/CVE-2025-40277",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68206",
                                "url": "https://ubuntu.com/security/CVE-2025-68206",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68209",
                                "url": "https://ubuntu.com/security/CVE-2025-68209",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40278",
                                "url": "https://ubuntu.com/security/CVE-2025-40278",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40279",
                                "url": "https://ubuntu.com/security/CVE-2025-40279",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40280",
                                "url": "https://ubuntu.com/security/CVE-2025-40280",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40281",
                                "url": "https://ubuntu.com/security/CVE-2025-40281",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40282",
                                "url": "https://ubuntu.com/security/CVE-2025-40282",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40283",
                                "url": "https://ubuntu.com/security/CVE-2025-40283",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40284",
                                "url": "https://ubuntu.com/security/CVE-2025-40284",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68210",
                                "url": "https://ubuntu.com/security/CVE-2025-68210",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40285",
                                "url": "https://ubuntu.com/security/CVE-2025-40285",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40286",
                                "url": "https://ubuntu.com/security/CVE-2025-40286",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40287",
                                "url": "https://ubuntu.com/security/CVE-2025-40287",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40288",
                                "url": "https://ubuntu.com/security/CVE-2025-40288",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40289",
                                "url": "https://ubuntu.com/security/CVE-2025-40289",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68201",
                                "url": "https://ubuntu.com/security/CVE-2025-68201",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68207",
                                "url": "https://ubuntu.com/security/CVE-2025-68207",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68244",
                                "url": "https://ubuntu.com/security/CVE-2025-68244",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68316",
                                "url": "https://ubuntu.com/security/CVE-2025-68316",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40292",
                                "url": "https://ubuntu.com/security/CVE-2025-40292",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68180",
                                "url": "https://ubuntu.com/security/CVE-2025-68180",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40327",
                                "url": "https://ubuntu.com/security/CVE-2025-40327",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40328",
                                "url": "https://ubuntu.com/security/CVE-2025-40328",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40291",
                                "url": "https://ubuntu.com/security/CVE-2025-40291",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68322",
                                "url": "https://ubuntu.com/security/CVE-2025-68322",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40293",
                                "url": "https://ubuntu.com/security/CVE-2025-40293",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40294",
                                "url": "https://ubuntu.com/security/CVE-2025-40294",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40329",
                                "url": "https://ubuntu.com/security/CVE-2025-40329",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40295",
                                "url": "https://ubuntu.com/security/CVE-2025-40295",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40296",
                                "url": "https://ubuntu.com/security/CVE-2025-40296",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40297",
                                "url": "https://ubuntu.com/security/CVE-2025-40297",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68320",
                                "url": "https://ubuntu.com/security/CVE-2025-68320",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68169",
                                "url": "https://ubuntu.com/security/CVE-2025-68169",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68197",
                                "url": "https://ubuntu.com/security/CVE-2025-68197",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40330",
                                "url": "https://ubuntu.com/security/CVE-2025-40330",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68192",
                                "url": "https://ubuntu.com/security/CVE-2025-68192",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40331",
                                "url": "https://ubuntu.com/security/CVE-2025-40331",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68187",
                                "url": "https://ubuntu.com/security/CVE-2025-68187",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68167",
                                "url": "https://ubuntu.com/security/CVE-2025-68167",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68319",
                                "url": "https://ubuntu.com/security/CVE-2025-68319",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40298",
                                "url": "https://ubuntu.com/security/CVE-2025-40298",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40299",
                                "url": "https://ubuntu.com/security/CVE-2025-40299",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40301",
                                "url": "https://ubuntu.com/security/CVE-2025-40301",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40358",
                                "url": "https://ubuntu.com/security/CVE-2025-40358",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68186",
                                "url": "https://ubuntu.com/security/CVE-2025-68186",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68184",
                                "url": "https://ubuntu.com/security/CVE-2025-68184",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40302",
                                "url": "https://ubuntu.com/security/CVE-2025-40302",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40303",
                                "url": "https://ubuntu.com/security/CVE-2025-40303",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40362",
                                "url": "https://ubuntu.com/security/CVE-2025-40362",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40332",
                                "url": "https://ubuntu.com/security/CVE-2025-40332",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40304",
                                "url": "https://ubuntu.com/security/CVE-2025-40304",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40305",
                                "url": "https://ubuntu.com/security/CVE-2025-40305",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68318",
                                "url": "https://ubuntu.com/security/CVE-2025-68318",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40209",
                                "url": "https://ubuntu.com/security/CVE-2025-40209",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68183",
                                "url": "https://ubuntu.com/security/CVE-2025-68183",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68173",
                                "url": "https://ubuntu.com/security/CVE-2025-68173",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40306",
                                "url": "https://ubuntu.com/security/CVE-2025-40306",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40307",
                                "url": "https://ubuntu.com/security/CVE-2025-40307",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40308",
                                "url": "https://ubuntu.com/security/CVE-2025-40308",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40309",
                                "url": "https://ubuntu.com/security/CVE-2025-40309",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68174",
                                "url": "https://ubuntu.com/security/CVE-2025-68174",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40310",
                                "url": "https://ubuntu.com/security/CVE-2025-40310",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40361",
                                "url": "https://ubuntu.com/security/CVE-2025-40361",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40311",
                                "url": "https://ubuntu.com/security/CVE-2025-40311",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68185",
                                "url": "https://ubuntu.com/security/CVE-2025-68185",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68176",
                                "url": "https://ubuntu.com/security/CVE-2025-68176",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68190",
                                "url": "https://ubuntu.com/security/CVE-2025-68190",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68168",
                                "url": "https://ubuntu.com/security/CVE-2025-68168",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40312",
                                "url": "https://ubuntu.com/security/CVE-2025-40312",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40333",
                                "url": "https://ubuntu.com/security/CVE-2025-40333",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68321",
                                "url": "https://ubuntu.com/security/CVE-2025-68321",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40334",
                                "url": "https://ubuntu.com/security/CVE-2025-40334",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68191",
                                "url": "https://ubuntu.com/security/CVE-2025-68191",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68309",
                                "url": "https://ubuntu.com/security/CVE-2025-68309",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40313",
                                "url": "https://ubuntu.com/security/CVE-2025-40313",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40335",
                                "url": "https://ubuntu.com/security/CVE-2025-40335",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40314",
                                "url": "https://ubuntu.com/security/CVE-2025-40314",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40336",
                                "url": "https://ubuntu.com/security/CVE-2025-40336",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68193",
                                "url": "https://ubuntu.com/security/CVE-2025-68193",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68175",
                                "url": "https://ubuntu.com/security/CVE-2025-68175",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68188",
                                "url": "https://ubuntu.com/security/CVE-2025-68188",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68315",
                                "url": "https://ubuntu.com/security/CVE-2025-68315",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40337",
                                "url": "https://ubuntu.com/security/CVE-2025-40337",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40338",
                                "url": "https://ubuntu.com/security/CVE-2025-40338",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40339",
                                "url": "https://ubuntu.com/security/CVE-2025-40339",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68194",
                                "url": "https://ubuntu.com/security/CVE-2025-68194",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40363",
                                "url": "https://ubuntu.com/security/CVE-2025-40363",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68311",
                                "url": "https://ubuntu.com/security/CVE-2025-68311",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40340",
                                "url": "https://ubuntu.com/security/CVE-2025-40340",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68196",
                                "url": "https://ubuntu.com/security/CVE-2025-68196",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68178",
                                "url": "https://ubuntu.com/security/CVE-2025-68178",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40341",
                                "url": "https://ubuntu.com/security/CVE-2025-40341",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40342",
                                "url": "https://ubuntu.com/security/CVE-2025-40342",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40343",
                                "url": "https://ubuntu.com/security/CVE-2025-40343",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68177",
                                "url": "https://ubuntu.com/security/CVE-2025-68177",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68317",
                                "url": "https://ubuntu.com/security/CVE-2025-68317",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40315",
                                "url": "https://ubuntu.com/security/CVE-2025-40315",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40316",
                                "url": "https://ubuntu.com/security/CVE-2025-40316",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40360",
                                "url": "https://ubuntu.com/security/CVE-2025-40360",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68179",
                                "url": "https://ubuntu.com/security/CVE-2025-68179",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68310",
                                "url": "https://ubuntu.com/security/CVE-2025-68310",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40317",
                                "url": "https://ubuntu.com/security/CVE-2025-40317",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40359",
                                "url": "https://ubuntu.com/security/CVE-2025-40359",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68181",
                                "url": "https://ubuntu.com/security/CVE-2025-68181",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68170",
                                "url": "https://ubuntu.com/security/CVE-2025-68170",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40213",
                                "url": "https://ubuntu.com/security/CVE-2025-40213",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40318",
                                "url": "https://ubuntu.com/security/CVE-2025-40318",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68312",
                                "url": "https://ubuntu.com/security/CVE-2025-68312",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40344",
                                "url": "https://ubuntu.com/security/CVE-2025-40344",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68172",
                                "url": "https://ubuntu.com/security/CVE-2025-68172",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40319",
                                "url": "https://ubuntu.com/security/CVE-2025-40319",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68182",
                                "url": "https://ubuntu.com/security/CVE-2025-68182",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68314",
                                "url": "https://ubuntu.com/security/CVE-2025-68314",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68189",
                                "url": "https://ubuntu.com/security/CVE-2025-68189",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68171",
                                "url": "https://ubuntu.com/security/CVE-2025-68171",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68313",
                                "url": "https://ubuntu.com/security/CVE-2025-68313",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40320",
                                "url": "https://ubuntu.com/security/CVE-2025-40320",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40321",
                                "url": "https://ubuntu.com/security/CVE-2025-40321",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40322",
                                "url": "https://ubuntu.com/security/CVE-2025-40322",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40211",
                                "url": "https://ubuntu.com/security/CVE-2025-40211",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40323",
                                "url": "https://ubuntu.com/security/CVE-2025-40323",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40210",
                                "url": "https://ubuntu.com/security/CVE-2025-40210",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40324",
                                "url": "https://ubuntu.com/security/CVE-2025-40324",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40326",
                                "url": "https://ubuntu.com/security/CVE-2025-40326",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40084",
                                "url": "https://ubuntu.com/security/CVE-2025-40084",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40222",
                                "url": "https://ubuntu.com/security/CVE-2025-40222",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40223",
                                "url": "https://ubuntu.com/security/CVE-2025-40223",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40106",
                                "url": "https://ubuntu.com/security/CVE-2025-40106",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40224",
                                "url": "https://ubuntu.com/security/CVE-2025-40224",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40225",
                                "url": "https://ubuntu.com/security/CVE-2025-40225",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40226",
                                "url": "https://ubuntu.com/security/CVE-2025-40226",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40227",
                                "url": "https://ubuntu.com/security/CVE-2025-40227",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40228",
                                "url": "https://ubuntu.com/security/CVE-2025-40228",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40229",
                                "url": "https://ubuntu.com/security/CVE-2025-40229",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40230",
                                "url": "https://ubuntu.com/security/CVE-2025-40230",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40231",
                                "url": "https://ubuntu.com/security/CVE-2025-40231",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40233",
                                "url": "https://ubuntu.com/security/CVE-2025-40233",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40235",
                                "url": "https://ubuntu.com/security/CVE-2025-40235",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40236",
                                "url": "https://ubuntu.com/security/CVE-2025-40236",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40237",
                                "url": "https://ubuntu.com/security/CVE-2025-40237",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40238",
                                "url": "https://ubuntu.com/security/CVE-2025-40238",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40239",
                                "url": "https://ubuntu.com/security/CVE-2025-40239",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40240",
                                "url": "https://ubuntu.com/security/CVE-2025-40240",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40241",
                                "url": "https://ubuntu.com/security/CVE-2025-40241",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40242",
                                "url": "https://ubuntu.com/security/CVE-2025-40242",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40243",
                                "url": "https://ubuntu.com/security/CVE-2025-40243",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40244",
                                "url": "https://ubuntu.com/security/CVE-2025-40244",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40245",
                                "url": "https://ubuntu.com/security/CVE-2025-40245",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40086",
                                "url": "https://ubuntu.com/security/CVE-2025-40086",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40087",
                                "url": "https://ubuntu.com/security/CVE-2025-40087",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40088",
                                "url": "https://ubuntu.com/security/CVE-2025-40088",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40162",
                                "url": "https://ubuntu.com/security/CVE-2025-40162",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40085",
                                "url": "https://ubuntu.com/security/CVE-2025-40085",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40172",
                                "url": "https://ubuntu.com/security/CVE-2025-40172",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40177",
                                "url": "https://ubuntu.com/security/CVE-2025-40177",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40163",
                                "url": "https://ubuntu.com/security/CVE-2025-40163",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40174",
                                "url": "https://ubuntu.com/security/CVE-2025-40174",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40089",
                                "url": "https://ubuntu.com/security/CVE-2025-40089",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40176",
                                "url": "https://ubuntu.com/security/CVE-2025-40176",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40164",
                                "url": "https://ubuntu.com/security/CVE-2025-40164",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40091",
                                "url": "https://ubuntu.com/security/CVE-2025-40091",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40175",
                                "url": "https://ubuntu.com/security/CVE-2025-40175",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40173",
                                "url": "https://ubuntu.com/security/CVE-2025-40173",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40092",
                                "url": "https://ubuntu.com/security/CVE-2025-40092",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40093",
                                "url": "https://ubuntu.com/security/CVE-2025-40093",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40094",
                                "url": "https://ubuntu.com/security/CVE-2025-40094",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40095",
                                "url": "https://ubuntu.com/security/CVE-2025-40095",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40165",
                                "url": "https://ubuntu.com/security/CVE-2025-40165",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40096",
                                "url": "https://ubuntu.com/security/CVE-2025-40096",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40097",
                                "url": "https://ubuntu.com/security/CVE-2025-40097",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40098",
                                "url": "https://ubuntu.com/security/CVE-2025-40098",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40099",
                                "url": "https://ubuntu.com/security/CVE-2025-40099",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40100",
                                "url": "https://ubuntu.com/security/CVE-2025-40100",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40101",
                                "url": "https://ubuntu.com/security/CVE-2025-40101",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40167",
                                "url": "https://ubuntu.com/security/CVE-2025-40167",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40102",
                                "url": "https://ubuntu.com/security/CVE-2025-40102",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40103",
                                "url": "https://ubuntu.com/security/CVE-2025-40103",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40104",
                                "url": "https://ubuntu.com/security/CVE-2025-40104",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40166",
                                "url": "https://ubuntu.com/security/CVE-2025-40166",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40105",
                                "url": "https://ubuntu.com/security/CVE-2025-40105",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40019",
                                "url": "https://ubuntu.com/security/CVE-2025-40019",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40214",
                                "url": "https://ubuntu.com/security/CVE-2025-40214",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * noble/linux-riscv-6.17: 6.17.0-14.14.1~24.04.1 -proposed tracker (LP: #2137844)",
                            "",
                            "  * Enable StarFive VisionFive 2 board (LP: #2013232)",
                            "    - SAUCE: PCI: starfive: Use regulator APIs instead of GPIO APIs to control",
                            "      the 3V3 power supply of PCIe slots",
                            "",
                            "  * Enable Microchip PIC64GX Curiosity Kit (LP: #2074082)",
                            "    - dt-bindings: cache: sifive,ccache0: add a pic64gx compatible",
                            "    - dt-bindings: interrupt-controller: sifive,plic: Add pic64gx",
                            "      compatibility",
                            "    - dt-bindings: gpio: mpfs-gpio: Add pic64gx GPIO compatibility",
                            "    - dt-bindings: net: cdns,macb: Add pic64gx compatibility",
                            "    - riscv: dts: microchip: Minor whitespace cleanup",
                            "    - riscv: dts: microchip: add common board dtsi for icicle kit variants",
                            "    - dt-bindings: riscv: microchip: document icicle kit with production",
                            "      device",
                            "    - riscv: dts: microchip: add icicle kit with production device",
                            "    - riscv: dts: microchip: rename icicle kit ccc clock and other minor fixes",
                            "    - dt-bindings: riscv: microchip: document Discovery Kit",
                            "    - riscv: dts: microchip: add a device tree for Discovery Kit",
                            "    - dt-bindings: soc: microchip: document the simple-mfd syscon on PolarFire",
                            "      SoC",
                            "    - soc: microchip: add mfd drivers for two syscon regions on PolarFire SoC",
                            "    - MAINTAINERS: add new soc drivers to Microchip RISC-V entry",
                            "    - MAINTAINERS: rename Microchip RISC-V entry",
                            "    - dt-bindings: pinctrl: document pic64gx \"gpio2\" pinmux",
                            "    - pinctrl: add pic64gx \"gpio2\" pinmux driver",
                            "    - dt-bindings: pinctrl: document polarfire soc iomux0 pinmux",
                            "    - pinctrl: add polarfire soc iomux0 pinmux driver",
                            "    - MAINTAINERS: add Microchip RISC-V pinctrl drivers/bindings to entry",
                            "    - dt-bindings: clk: microchip: mpfs: remove first reg region",
                            "    - clk: microchip: mpfs: use regmap for clocks",
                            "    - reset: mpfs: add non-auxiliary bus probing",
                            "    - pinctrl: pic64gx-gpio2: Add REGMAP_MMIO dependency",
                            "    - pinctrl: add CONFIG_OF dependencies for microchip drivers",
                            "    - SAUCE: pinctrl: move microchip riscv pinctrl drivers to a folder",
                            "    - SAUCE: pinctrl: add generic functions + pins mapper",
                            "    - SAUCE: dt-bindings: pinctrl: document polarfire soc mssio pin controller",
                            "    - SAUCE: pinctrl: add polarfire soc mssio pinctrl driver",
                            "    - SAUCE: MAINTAINERS: add Microchip mpfs mssio driver/bindings to entry",
                            "    - SAUCE: dt-bindings: soc: microchip: add compatible for the mss-top-",
                            "      sysreg on pic64gx",
                            "    - SAUCE: dt-bindings: soc: microchip: mpfs-sys-controller: Add pic64gx",
                            "      compatibility",
                            "    - SAUCE: soc: microchip: mpfs-sys-controller: add support for pic64gx",
                            "    - SAUCE: dt-bindings: timer: sifive,clint: add pic64gx compatibility",
                            "    - SAUCE: clk: microchip: drop POLARFIRE from ARCH_MICROCHIP_POLARFIRE",
                            "    - SAUCE: dt-bindings: clock: mpfs-ccc: Add pic64gx compatibility",
                            "    - SAUCE: dt-bindings: clock: mpfs-clkcfg: Add pic64gx compatibility",
                            "    - SAUCE: dt-bindings: mbox: add pic64gx mailbox compatibility to mpfs",
                            "      mailbox",
                            "    - SAUCE: mailbox: mpfs: drop POLARFIRE from ARCH_MICROCHIP_POLARFIRE",
                            "    - SAUCE: dt-bindings: riscv: microchip: document the PIC64GX curiosity kit",
                            "    - SAUCE: riscv: dts: microchip: add pic64gx and its curiosity kit",
                            "    - SAUCE: riscv: dts: microchip: remove POLARFIRE mention in Makefile",
                            "    - [Config] riscv: updateconfigs for PIC64GX support",
                            "",
                            "  [ Ubuntu-riscv: 6.17.0-14.14.1 ]",
                            "",
                            "  * questing/linux-riscv: 6.17.0-14.14.1 -proposed tracker (LP: #2137845)",
                            "  * Packaging resync (LP: #1786013)",
                            "    - [Packaging] debian.riscv/dkms-versions -- update from kernel-versions",
                            "      (main/2026.01.12)",
                            "  [ Ubuntu: 6.17.0-14.14 ]",
                            "  * questing/linux: 6.17.0-14.14 -proposed tracker (LP: #2137849)",
                            "  * Packaging resync (LP: #1786013)",
                            "    - [Packaging] debian.master/dkms-versions -- update from kernel-versions",
                            "      (main/2026.01.12)",
                            "  * ubuntu_kselftests:_net/net:gre_gso.sh failing (LP: #2136820)",
                            "    - SAUCE increase socat timeout in gre_gso.sh",
                            "  * ubuntu_blktrace_smoke_test fails on questing with rust coreutils",
                            "    (LP: #2137698)",
                            "    - SAUCE: Revert \"ext4: fail unaligned direct IO write with EINVAL\"",
                            "  * bareudp.sh in ubuntu_kselftests_net fails because of dash default shell",
                            "    (LP: #2129812)",
                            "    - selftests: net: use BASH for bareudp testing",
                            "  * CVE-2025-40256",
                            "    - xfrm: also call xfrm_state_delete_tunnel at destroy time for states that",
                            "      were never added",
                            "  * Enable PMF on AMD HPT/STX/KRK (LP: #2125022)",
                            "    - platform/x86/amd/pmf: Add support for adjusting PMF PPT and PPT APU",
                            "      thresholds",
                            "    - platform/x86/amd/pmf: Extend custom BIOS inputs for more policies",
                            "    - platform/x86/amd/pmf: Update ta_pmf_action structure member",
                            "    - platform/x86/amd/pmf: Add helper to verify BIOS input notifications are",
                            "      enable/disable",
                            "    - platform/x86/amd/pmf: Add custom BIOS input support for AMD_CPU_ID_PS",
                            "    - platform/x86/amd/pmf: Preserve custom BIOS inputs for evaluating the",
                            "      policies",
                            "    - platform/x86/amd/pmf: Call enact function sooner to process early",
                            "      pending requests",
                            "    - platform/x86/amd/pmf: Add debug logs for pending requests and custom",
                            "      BIOS inputs",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850)",
                            "    - iommufd/selftest: Fix ioctl return value in _test_cmd_trigger_vevents()",
                            "    - drm/mediatek: Add pm_runtime support for GCE power control",
                            "    - drm/i915: Fix conversion between clock ticks and nanoseconds",
                            "    - drm/amdgpu: set default gfx reset masks for gfx6-8",
                            "    - drm/amd/display: Don't stretch non-native images by default in eDP",
                            "    - smb: client: fix refcount leak in smb2_set_path_attr",
                            "    - iommufd: Make vfio_compat's unmap succeed if the range is already empty",
                            "    - futex: Optimize per-cpu reference counting",
                            "    - drm/amd: Fix suspend failure with secure display TA",
                            "    - drm/xe: Move declarations under conditional branch",
                            "    - drm/xe: Do clean shutdown also when using flr",
                            "    - drm/amd/display: Add pixel_clock to amd_pp_display_configuration",
                            "    - drm/amd/pm: Use pm_display_cfg in legacy DPM (v2)",
                            "    - drm/amd/display: Disable fastboot on DCE 6 too",
                            "    - drm/amd/pm: Disable MCLK switching on SI at high pixel clocks",
                            "    - drm/amd: Disable ASPM on SI",
                            "    - arm64: kprobes: check the return value of set_memory_rox()",
                            "    - compiler_types: Move unused static inline functions warning to W=2",
                            "    - riscv: Build loader.bin exclusively for Canaan K210",
                            "    - RISC-V: clear hot-unplugged cores from all task mm_cpumasks to avoid",
                            "      rfence errors",
                            "    - riscv: acpi: avoid errors caused by probing DT devices when ACPI is used",
                            "    - fs: return EOPNOTSUPP from file_setattr/file_getattr syscalls",
                            "    - ASoC: nau8821: Avoid unnecessary blocking in IRQ handler",
                            "    - NFS4: Fix state renewals missing after boot",
                            "    - drm/amdkfd: fix suspend/resume all calls in mes based eviction path",
                            "    - NFS4: Apply delay_retrans to async operations",
                            "    - HID: intel-thc-hid: intel-quickspi: Add ARL PCI Device Id's",
                            "    - HID: quirks: avoid Cooler Master MM712 dongle wakeup bug",
                            "    - ixgbe: handle IXGBE_VF_GET_PF_LINK_STATE mailbox operation",
                            "    - HID: nintendo: Wait longer for initial probe",
                            "    - NFS: check if suid/sgid was cleared after a write as needed",
                            "    - HID: quirks: Add ALWAYS_POLL quirk for VRS R295 steering wheel",
                            "    - io_uring: fix unexpected placement on same size resizing",
                            "    - HID: logitech-hidpp: Add HIDPP_QUIRK_RESET_HI_RES_SCROLL",
                            "    - ASoC: max98090/91: fixed max98091 ALSA widget powering up/down",
                            "    - ALSA: hda/realtek: Fix mute led for HP Omen 17-cb0xxx",
                            "    - ixgbe: handle IXGBE_VF_FEATURES_NEGOTIATE mbox cmd",
                            "    - wifi: ath11k: zero init info->status in wmi_process_mgmt_tx_comp()",
                            "    - selftests: net: local_termination: Wait for interfaces to come up",
                            "    - net: fec: correct rx_bytes statistic for the case SHIFT16 is set",
                            "    - net: phy: micrel: Introduce lanphy_modify_page_reg",
                            "    - net: phy: micrel: Replace hardcoded pages with defines",
                            "    - net: phy: micrel: lan8814 fix reset of the QSGMII interface",
                            "    - rust: Add -fno-isolate-erroneous-paths-dereference to",
                            "      bindgen_skip_c_flags",
                            "    - NFSD: Skip close replay processing if XDR encoding fails",
                            "    - Bluetooth: 6lowpan: fix BDADDR_LE vs ADDR_LE_DEV address type confusion",
                            "    - Bluetooth: 6lowpan: Don't hold spin lock over sleeping functions",
                            "    - Bluetooth: hci_conn: Fix not cleaning up PA_LINK connections",
                            "    - net: dsa: tag_brcm: do not mark link local traffic as offloaded",
                            "    - net/smc: fix mismatch between CLC header and proposal",
                            "    - net/handshake: Fix memory leak in tls_handshake_accept()",
                            "    - net: ethernet: ti: am65-cpsw-qos: fix IET verify/response timeout",
                            "    - net: ethernet: ti: am65-cpsw-qos: fix IET verify retry mechanism",
                            "    - net: mdio: fix resource leak in mdiobus_register_device()",
                            "    - wifi: mac80211: skip rate verification for not captured PSDUs",
                            "    - Bluetooth: hci_event: Fix not handling PA Sync Lost event",
                            "    - net/mlx5e: Fix missing error assignment in mlx5e_xfrm_add_state()",
                            "    - net/mlx5e: Fix maxrate wraparound in threshold between units",
                            "    - net/mlx5e: Fix wraparound in rate limiting for values above 255 Gbps",
                            "    - net/mlx5e: Fix potentially misleading debug message",
                            "    - net/mlx5: Fix typo of MLX5_EQ_DOORBEL_OFFSET",
                            "    - net/mlx5: Store the global doorbell in mlx5_priv",
                            "    - net/mlx5e: Prepare for using different CQ doorbells",
                            "    - net_sched: limit try_bulk_dequeue_skb() batches",
                            "    - wifi: iwlwifi: mvm: fix beacon template/fixed rate",
                            "    - wifi: iwlwifi: mld: always take beacon ies in link grading",
                            "    - virtio-net: fix incorrect flags recording in big mode",
                            "    - hsr: Fix supervision frame sending on HSRv0",
                            "    - hsr: Follow standard for HSRv0 supervision frames",
                            "    - ACPI: CPPC: Detect preferred core availability on online CPUs",
                            "    - ACPI: CPPC: Check _CPC validity for only the online CPUs",
                            "    - ACPI: CPPC: Perform fast check switch only for online CPUs",
                            "    - ACPI: CPPC: Limit perf ctrs in PCC check only to online CPUs",
                            "    - cpufreq: intel_pstate: Check IDA only before MSR_IA32_PERF_CTL writes",
                            "    - Bluetooth: L2CAP: export l2cap_chan_hold for modules",
                            "    - io_uring/rsrc: don't use blk_rq_nr_phys_segments() as number of bvecs",
                            "    - acpi,srat: Fix incorrect device handle check for Generic Initiator",
                            "    - regulator: fixed: fix GPIO descriptor leak on register failure",
                            "    - ASoC: cs4271: Fix regulator leak on probe failure",
                            "    - ASoC: codecs: va-macro: fix resource leak in probe error path",
                            "    - drm/vmwgfx: Restore Guest-Backed only cursor plane support",
                            "    - ASoC: tas2781: fix getting the wrong device number",
                            "    - pnfs: Fix TLS logic in _nfs4_pnfs_v3_ds_connect()",
                            "    - pnfs: Fix TLS logic in _nfs4_pnfs_v4_ds_connect()",
                            "    - pnfs: Set transport security policy to RPC_XPRTSEC_NONE unless using TLS",
                            "    - simplify nfs_atomic_open_v23()",
                            "    - NFSv2/v3: Fix error handling in nfs_atomic_open_v23()",
                            "    - NFS: sysfs: fix leak when nfs_client kobject add fails",
                            "    - NFSv4: Fix an incorrect parameter when calling nfs4_call_sync()",
                            "    - drm/amd/amdgpu: Ensure isp_kernel_buffer_alloc() creates a new BO",
                            "    - acpi/hmat: Fix lockdep warning for hmem_register_resource()",
                            "    - ASoC: rsnd: fix OF node reference leak in rsnd_ssiu_probe()",
                            "    - drm/client: fix MODULE_PARM_DESC string for \"active\"",
                            "    - irqchip/riscv-intc: Add missing free() callback in riscv_intc_domain_ops",
                            "    - lib/crypto: arm/curve25519: Disable on CPU_BIG_ENDIAN",
                            "    - hostfs: Fix only passing host root in boot stage with new mount",
                            "    - afs: Fix dynamic lookup to fail on cell lookup failure",
                            "    - mtd: onenand: Pass correct pointer to IRQ handler",
                            "    - virtio-fs: fix incorrect check for fsvq->kobj",
                            "    - fs/namespace: correctly handle errors returned by grab_requested_mnt_ns",
                            "    - perf header: Write bpf_prog (infos|btfs)_cnt to data file",
                            "    - perf build: Don't fail fast path feature detection when binutils-devel",
                            "      is not available",
                            "    - perf lock: Fix segfault due to missing kernel map",
                            "    - perf test shell lock_contention: Extra debug diagnostics",
                            "    - perf test: Fix lock contention test",
                            "    - arm64: dts: rockchip: Set correct pinctrl for I2S1 8ch TX on odroid-m1",
                            "    - arm64: dts: rockchip: Fix PCIe power enable pin for BigTreeTech CB2 and",
                            "      Pi2",
                            "    - arm64: dts: rockchip: Make RK3588 GPU OPP table naming less generic",
                            "    - ARM: dts: imx6ull-engicam-microgea-rmm: fix report-rate-hz value",
                            "    - ARM: dts: imx51-zii-rdu1: Fix audmux node names",
                            "    - arm64: dts: imx8-ss-img: Avoid gpio0_mipi_csi GPIOs being deferred",
                            "    - arm64: dts: imx8mp-kontron: Fix USB OTG role switching",
                            "    - HID: hid-ntrig: Prevent memory leak in ntrig_report_version()",
                            "    - ARM: dts: BCM53573: Fix address of Luxul XAP-1440's Ethernet PHY",
                            "    - arm64: dts: rockchip: Fix USB power enable pin for BTT CB2 and Pi2",
                            "    - arm64: dts: rockchip: drop reset from rk3576 i2c9 node",
                            "    - pwm: adp5585: Correct mismatched pwm chip info",
                            "    - HID: playstation: Fix memory leak in dualshock4_get_calibration_data()",
                            "    - HID: uclogic: Fix potential memory leak in error path",
                            "    - LoongArch: KVM: Restore guest PMU if it is enabled",
                            "    - LoongArch: KVM: Add delay until timer interrupt injected",
                            "    - LoongArch: KVM: Fix max supported vCPUs set with EIOINTC",
                            "    - KVM: arm64: Make all 32bit ID registers fully writable",
                            "    - KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated",
                            "    - KVM: nSVM: Always recalculate LBR MSR intercepts in svm_update_lbrv()",
                            "    - KVM: nSVM: Fix and simplify LBR virtualization handling with nested",
                            "    - KVM: VMX: Fix check for valid GVA on an EPT violation",
                            "    - nfsd: add missing FATTR4_WORD2_CLONE_BLKSIZE from supported attributes",
                            "    - gcov: add support for GCC 15",
                            "    - kho: warn and exit when unpreserved page wasn't preserved",
                            "    - strparser: Fix signed/unsigned mismatch bug",
                            "    - dma-mapping: benchmark: Restore padding to ensure uABI remained",
                            "      consistent",
                            "    - maple_tree: fix tracepoint string pointers",
                            "    - LoongArch: Consolidate early_ioremap()/ioremap_prot()",
                            "    - LoongArch: Use correct accessor to read FWPC/MWPC",
                            "    - LoongArch: Let {pte,pmd}_modify() record the status of _PAGE_DIRTY",
                            "    - mm/damon/sysfs: change next_update_jiffies to a global variable",
                            "    - selftests/tracing: Run sample events to clear page cache events",
                            "    - wifi: mac80211: reject address change while connecting",
                            "    - mm/huge_memory: preserve PG_has_hwpoisoned if a folio is split to >0",
                            "      order",
                            "    - mm/mm_init: fix hash table order logging in alloc_large_system_hash()",
                            "    - mm/damon/stat: change last_refresh_jiffies to a global variable",
                            "    - mm/kmsan: fix kmsan kmalloc hook when no stack depots are allocated yet",
                            "    - mm/shmem: fix THP allocation and fallback loop",
                            "    - mm/mremap: honour writable bit in mremap pte batching",
                            "    - mm/huge_memory: fix folio split check for anon folios in swapcache",
                            "    - mmc: sdhci-of-dwcmshc: Change DLL_STRBIN_TAPNUM_DEFAULT to 0x4",
                            "    - mmc: pxamci: Simplify pxamci_probe() error handling using devm APIs",
                            "    - mmc: dw_mmc-rockchip: Fix wrong internal phase calculate",
                            "    - ASoC: sdw_utils: fix device reference leak in is_sdca_endpoint_present()",
                            "    - crypto: hisilicon/qm - Fix device reference leak in qm_get_qos_value",
                            "    - smb: client: fix cifs_pick_channel when channel needs reconnect",
                            "    - spi: Try to get ACPI GPIO IRQ earlier",
                            "    - x86/microcode/AMD: Add Zen5 model 0x44, stepping 0x1 minrev",
                            "    - x86/CPU/AMD: Add additional fixed RDSEED microcode revisions",
                            "    - selftests/user_events: fix type cast for write_index packed member in",
                            "      perf_test",
                            "    - gendwarfksyms: Skip files with no exports",
                            "    - ftrace: Fix BPF fexit with livepatch",
                            "    - LoongArch: Consolidate max_pfn & max_low_pfn calculation",
                            "    - LoongArch: Use physical addresses for CSR_MERRENTRY/CSR_TLBRENTRY",
                            "    - EDAC/altera: Handle OCRAM ECC enable after warm reset",
                            "    - EDAC/altera: Use INTTEST register for Ethernet and USB SBE injection",
                            "    - PM: hibernate: Emit an error when image writing fails",
                            "    - PM: hibernate: Use atomic64_t for compressed_size variable",
                            "    - btrfs: zoned: fix conventional zone capacity calculation",
                            "    - btrfs: zoned: fix stripe width calculation",
                            "    - btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe()",
                            "    - btrfs: do not update last_log_commit when logging inode due to a new",
                            "      name",
                            "    - btrfs: release root after error in data_reloc_print_warning_inode()",
                            "    - drm/amdkfd: relax checks for over allocation of save area",
                            "    - drm/amdgpu: disable peer-to-peer access for DCC-enabled GC12 VRAM",
                            "      surfaces",
                            "    - drm/i915/psr: fix pipe to vblank conversion",
                            "    - drm/xe/xe3lpg: Extend Wa_15016589081 for xe3lpg",
                            "    - drm/xe/xe3: Extend wa_14023061436",
                            "    - drm/xe/xe3: Add WA_14024681466 for Xe3_LPG",
                            "    - pmdomain: imx: Fix reference count leak in imx_gpc_remove",
                            "    - pmdomain: samsung: plug potential memleak during probe",
                            "    - pmdomain: samsung: Rework legacy splash-screen handover workaround",
                            "    - selftests: mptcp: connect: fix fallback note due to OoO",
                            "    - selftests: mptcp: join: rm: set backup flag",
                            "    - selftests: mptcp: join: endpoints: longer transfer",
                            "    - selftests: mptcp: connect: trunc: read all recv data",
                            "    - selftests: mptcp: join: userspace: longer transfer",
                            "    - selftests: mptcp: join: properly kill background tasks",
                            "    - mm/huge_memory: do not change split_huge_page*() target order silently",
                            "    - mm/memory: do not populate page table entries beyond i_size",
                            "    - scripts/decode_stacktrace.sh: symbol: avoid trailing whitespaces",
                            "    - scripts/decode_stacktrace.sh: symbol: preserve alignment",
                            "    - scripts/decode_stacktrace.sh: fix build ID and PC source parsing",
                            "    - ASoC: da7213: Convert to DEFINE_RUNTIME_DEV_PM_OPS()",
                            "    - ASoC: da7213: Use component driver suspend/resume",
                            "    - KVM: x86: Rename local \"ecx\" variables to \"msr\" and \"pmc\" as appropriate",
                            "    - KVM: x86: Add support for RDMSR/WRMSRNS w/ immediate on Intel",
                            "    - KVM: VMX: Inject #UD if guest tries to execute SEAMCALL or TDCALL",
                            "    - isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe()",
                            "    - net: phy: micrel: Fix lan8814_config_init",
                            "    - Linux 6.17.9",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68204",
                            "    - pmdomain: arm: scmi: Fix genpd leak on provider registration failure",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68203",
                            "    - drm/amdgpu: fix lock warning in amdgpu_userq_fence_driver_process",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40267",
                            "    - io_uring/rw: ensure allocated iovec gets cleared for early failure",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68198",
                            "    - crash: fix crashkernel resource shrink",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68199",
                            "    - codetag: debug: handle existing CODETAG_EMPTY in mark_objexts_empty for",
                            "      slabobj_ext",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40268",
                            "    - cifs: client: fix memory leak in smb3_fs_context_parse_param",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40269",
                            "    - ALSA: usb-audio: Fix potential overflow of PCM transfer buffer",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68205",
                            "    - ALSA: hda/hdmi: Fix breakage at probing nvhdmi-mcp driver",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40270",
                            "    - mm, swap: fix potential UAF issue for VMA readahead",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40271",
                            "    - fs/proc: fix uaf in proc_readdir_de()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40272",
                            "    - mm/secretmem: fix use-after-free race in fault handler",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68245",
                            "    - net: netpoll: fix incorrect refcount handling causing incorrect cleanup",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68240",
                            "    - nilfs2: avoid having an active sc_timer before freeing sci",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68241",
                            "    - ipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68211",
                            "    - ksm: use range-walk function to jump over holes in",
                            "      scan_get_next_rmap_item",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68246",
                            "    - ksmbd: close accepted socket when per-IP limit rejects connection",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40273",
                            "    - NFSD: free copynotify stateid in nfs4_free_ol_stateid()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40212",
                            "    - nfsd: fix refcount leak in nfsd_set_fh_dentry()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40274",
                            "    - KVM: guest_memfd: Remove bindings on memslot deletion when gmem is dying",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68202",
                            "    - sched_ext: Fix unsafe locking in the scx_dump_state()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68239",
                            "    - binfmt_misc: restore write access before closing files opened by",
                            "      open_exec()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68247",
                            "    - posix-timers: Plug potential memory leak in do_timer_create()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68208",
                            "    - bpf: account for current allocated stack depth in",
                            "      widen_imprecise_scalars()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68200",
                            "    - bpf: Add bpf_prog_run_data_pointers()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40275",
                            "    - ALSA: usb-audio: Fix NULL pointer dereference in",
                            "      snd_usb_mixer_controls_badd",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68242",
                            "    - NFS: Fix LTP test failures when timestamps are delegated",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68243",
                            "    - NFS: Check the TLS certificate fields in nfs_match_client()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40276",
                            "    - drm/panthor: Flush shmem writes before mapping buffers CPU-uncached",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40277",
                            "    - drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68206",
                            "    - netfilter: nft_ct: add seqadj extension for natted connections",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68209",
                            "    - mlx5: Fix default values in create CQ",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40278",
                            "    - net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-",
                            "      infoleak",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40279",
                            "    - net: sched: act_connmark: initialize struct tc_ife to fix kernel leak",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40280",
                            "    - tipc: Fix use-after-free in tipc_mon_reinit_self().",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40281",
                            "    - sctp: prevent possible shift-out-of-bounds in sctp_transport_update_rto",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40282",
                            "    - Bluetooth: 6lowpan: reset link-local header on ipv6 recv path",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40283",
                            "    - Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40284",
                            "    - Bluetooth: MGMT: cancel mesh send timer when hdev removed",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68210",
                            "    - erofs: avoid infinite loop due to incomplete zstd-compressed data",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40285",
                            "    - smb/server: fix possible refcount leak in smb2_sess_setup()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40286",
                            "    - smb/server: fix possible memory leak in smb2_read()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40287",
                            "    - exfat: fix improper check of dentry.stream.valid_size",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40288",
                            "    - drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40289",
                            "    - drm/amdgpu: hide VRAM sysfs attributes on GPUs without VRAM",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68201",
                            "    - drm/amdgpu: remove two invalid BUG_ON()s",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68207",
                            "    - drm/xe/guc: Synchronize Dead CT worker with unbind",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68244",
                            "    - drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833)",
                            "    - Revert \"Bluetooth: L2CAP: convert timeouts to secs_to_jiffies()\"",
                            "    - sched_ext: Mark scx_bpf_dsq_move_set_[slice|vtime]() with KF_RCU",
                            "    - net: usb: asix_devices: Check return value of usbnet_get_endpoints",
                            "    - fbdev: atyfb: Check if pll_ops->init_pll failed",
                            "    - ACPI: button: Call input_free_device() on failing input device",
                            "      registration",
                            "    - ACPI: fan: Use platform device for devres-related actions",
                            "    - virtio-net: drop the multi-buffer XDP packet in zerocopy",
                            "    - batman-adv: Release references to inactive interfaces",
                            "    - Bluetooth: rfcomm: fix modem control handling",
                            "    - net: phy: dp83867: Disable EEE support as not implemented",
                            "    - fbdev: pvr2fb: Fix leftover reference to ONCHIP_NR_DMA_CHANNELS",
                            "    - fbdev: valkyriefb: Fix reference count leak in valkyriefb_init",
                            "    - mptcp: drop bogus optimization in __mptcp_check_push()",
                            "    - mptcp: restore window probe",
                            "    - ASoC: qdsp6: q6asm: do not sleep while atomic",
                            "    - ASoC: renesas: rz-ssi: Use proper dma_buffer_pos after resume",
                            "    - s390/pci: Restore IRQ unconditionally for the zPCI device",
                            "    - x86/build: Disable SSE4a",
                            "    - wifi: ath10k: Fix memory leak on unsupported WMI command",
                            "    - wifi: ath11k: Add missing platform IDs for quirk table",
                            "    - wifi: ath12k: free skb during idr cleanup callback",
                            "    - wifi: ath11k: avoid bit operation on key flags",
                            "    - drm/msm/a6xx: Fix GMU firmware parser",
                            "    - ALSA: usb-audio: fix control pipe direction",
                            "    - ASoC: cs-amp-lib-test: Fix missing include of kunit/test-bug.h",
                            "    - wifi: mac80211: reset FILS discovery and unsol probe resp intervals",
                            "    - wifi: mac80211: fix key tailroom accounting leak",
                            "    - wifi: nl80211: call kfree without a NULL check",
                            "    - kunit: test_dev_action: Correctly cast 'priv' pointer to long*",
                            "    - scsi: ufs: core: Initialize value of an attribute returned by uic cmd",
                            "    - scsi: core: Fix the unit attention counter implementation",
                            "    - bpf: Do not audit capability check in do_jit()",
                            "    - nvmet-auth: update sc_c in host response",
                            "    - crypto: s390/phmac - Do not modify the req->nbytes value",
                            "    - ASoC: Intel: avs: Unprepare a stream when XRUN occurs",
                            "    - ASoC: fsl_sai: fix bit order for DSD format",
                            "    - ASoC: fsl_micfil: correct the endian format for DSD",
                            "    - libbpf: Fix powerpc's stack register definition in bpf_tracing.h",
                            "    - ASoC: mediatek: Fix double pm_runtime_disable in remove functions",
                            "    - Bluetooth: ISO: Fix BIS connection dst_type handling",
                            "    - Bluetooth: btmtksdio: Add pmctrl handling for BT closed state during",
                            "      reset",
                            "    - Bluetooth: HCI: Fix tracking of advertisement set/instance 0x00",
                            "    - Bluetooth: ISO: Fix another instance of dst_type handling",
                            "    - Bluetooth: btintel_pcie: Fix event packet loss issue",
                            "    - Bluetooth: hci_conn: Fix connection cleanup with BIG with 2 or more BIS",
                            "    - Bluetooth: hci_core: Fix tracking of periodic advertisement",
                            "    - bpf: Conditionally include dynptr copy kfuncs",
                            "    - drm/msm: Ensure vm is created in VM_BIND ioctl",
                            "    - ALSA: usb-audio: add mono main switch to Presonus S1824c",
                            "    - ALSA: usb-audio: don't log messages meant for 1810c when initializing",
                            "      1824c",
                            "    - ACPI: MRRM: Check revision of MRRM table",
                            "    - drm/etnaviv: fix flush sequence logic",
                            "    - tools: ynl: fix string attribute length to include null terminator",
                            "    - net: hns3: return error code when function fails",
                            "    - sfc: fix potential memory leak in efx_mae_process_mport()",
                            "    - tools: ynl: avoid print_field when there is no reply",
                            "    - dpll: spec: add missing module-name and clock-id to pin-get reply",
                            "    - ASoC: fsl_sai: Fix sync error in consumer mode",
                            "    - ASoC: soc_sdw_utils: remove cs42l43 component_name",
                            "    - drm/amd/pm: fix smu table id bound check issue in smu_cmn_update_table()",
                            "    - drm/amd/pm/powerplay/smumgr: Fix PCIeBootLinkLevel value on Fiji",
                            "    - drm/amd/pm/powerplay/smumgr: Fix PCIeBootLinkLevel value on Iceland",
                            "    - drm/amdgpu: fix SPDX headers on amdgpu_cper.c/h",
                            "    - drm/amdgpu: fix SPDX header on amd_cper.h",
                            "    - drm/amdgpu: fix SPDX header on irqsrcs_vcn_5_0.h",
                            "    - ACPI: fan: Use ACPI handle when retrieving _FST",
                            "    - block: fix op_is_zone_mgmt() to handle REQ_OP_ZONE_RESET_ALL",
                            "    - block: make REQ_OP_ZONE_OPEN a write operation",
                            "    - dma-fence: Fix safe access wrapper to call timeline name method",
                            "    - kbuild: align modinfo section for Secureboot Authenticode EDK2 compat",
                            "    - regmap: irq: Correct documentation of wake_invert flag",
                            "    - [Config] Disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP for s390x",
                            "    - s390/mm: Fix memory leak in add_marker() when kvrealloc() fails",
                            "    - drm/xe: Do not wake device during a GT reset",
                            "    - drm/sched: avoid killing parent entity on child SIGKILL",
                            "    - drm/sched: Fix race in drm_sched_entity_select_rq()",
                            "    - drm/nouveau: Fix race in nouveau_sched_fini()",
                            "    - drm/i915/dmc: Clear HRR EVT_CTL/HTP to zero on ADL-S",
                            "    - drm/ast: Clear preserved bits from register output value",
                            "    - drm/amd: Check that VPE has reached DPM0 in idle handler",
                            "    - drm/amd/display: Fix incorrect return of vblank enable on unconfigured",
                            "      crtc",
                            "    - drm/amd/display: Don't program BLNDGAM_MEM_PWR_FORCE when CM low-power",
                            "      is disabled on DCN30",
                            "    - drm/amd/display: Add HDR workaround for a specific eDP",
                            "    - mptcp: leverage skb deferral free",
                            "    - mptcp: fix MSG_PEEK stream corruption",
                            "    - cpuidle: governors: menu: Rearrange main loop in menu_select()",
                            "    - cpuidle: governors: menu: Select polling state in some more cases",
                            "    - PM: hibernate: Combine return paths in power_down()",
                            "    - PM: sleep: Allow pm_restrict_gfp_mask() stacking",
                            "    - mfd: kempld: Switch back to earlier ->init() behavior",
                            "    - soc: aspeed: socinfo: Add AST27xx silicon IDs",
                            "    - firmware: qcom: scm: preserve assign_mem() error return value",
                            "    - soc: qcom: smem: Fix endian-unaware access of num_entries",
                            "    - spi: loopback-test: Don't use %pK through printk",
                            "    - spi: spi-qpic-snand: handle 'use_ecc' parameter of",
                            "      qcom_spi_config_cw_read()",
                            "    - soc: ti: pruss: don't use %pK through printk",
                            "    - bpf: Don't use %pK through printk",
                            "    - mmc: sdhci: Disable SD card clock before changing parameters",
                            "    - pinctrl: single: fix bias pull up/down handling in pin_config_set",
                            "    - mmc: host: renesas_sdhi: Fix the actual clock",
                            "    - memstick: Add timeout to prevent indefinite waiting",
                            "    - cpufreq: ti: Add support for AM62D2",
                            "    - bpf: Use tnums for JEQ/JNE is_branch_taken logic",
                            "    - firmware: ti_sci: Enable abort handling of entry to LPM",
                            "    - firewire: ohci: move self_id_complete tracepoint after validating",
                            "      register",
                            "    - irqchip/sifive-plic: Respect mask state when setting affinity",
                            "    - irqchip/loongson-eiointc: Route interrupt parsed from bios table",
                            "    - ACPI: sysfs: Use ACPI_FREE() for freeing an ACPI object",
                            "    - ACPI: video: force native for Lenovo 82K8",
                            "    - libbpf: Fix USDT SIB argument handling causing unrecognized register",
                            "      error",
                            "    - selftests/bpf: Fix bpf_prog_detach2 usage in test_lirc_mode2",
                            "    - arm64: versal-net: Update rtc calibration value",
                            "    - Revert \"UBUNTU: SAUCE: firmware: qcom: scm: Allow QSEECOM on Dell",
                            "      Inspiron 7441 / Latitude 7455\"",
                            "    - firmware: qcom: scm: Allow QSEECOM on Dell Inspiron 7441 / Latitude 7455",
                            "    - kselftest/arm64: tpidr2: Switch to waitpid() over wait4()",
                            "    - arc: Fix __fls() const-foldability via __builtin_clzl()",
                            "    - selftests/bpf: Upon failures, exit with code 1 in test_xsk.sh",
                            "    - irqchip/gic-v2m: Handle Multiple MSI base IRQ Alignment",
                            "    - ACPI: PRM: Skip handlers with NULL handler_address or NULL VA",
                            "    - ACPI: resource: Skip IRQ override on ASUS Vivobook Pro N6506CU",
                            "    - ACPI: scan: Add Intel CVS ACPI HIDs to acpi_ignore_dep_ids[]",
                            "    - thermal: gov_step_wise: Allow cooling level to be reduced earlier",
                            "    - thermal: intel: selftests: workload_hint: Mask unsupported types",
                            "    - power: supply: qcom_battmgr: add OOI chemistry",
                            "    - hwmon: (k10temp) Add thermal support for AMD Family 1Ah-based models",
                            "    - hwmon: (k10temp) Add device ID for Strix Halo",
                            "    - hwmon: (lenovo-ec-sensors) Update P8 supprt",
                            "    - hwmon: (sbtsi_temp) AMD CPU extended temperature range support",
                            "    - pinctrl: renesas: rzg2l: Add suspend/resume support for Schmitt control",
                            "      registers",
                            "    - pinctrl: keembay: release allocated memory in detach path",
                            "    - power: supply: sbs-charger: Support multiple devices",
                            "    - io_uring/rsrc: respect submitter_task in io_register_clone_buffers()",
                            "    - hwmon: sy7636a: add alias",
                            "    - selftests/bpf: Fix incorrect array size calculation",
                            "    - block: check for valid bio while splitting",
                            "    - irqchip/loongson-pch-lpc: Use legacy domain for PCH-LPC IRQ controller",
                            "    - cpufreq: ondemand: Update the efficient idle check for Intel extended",
                            "      Families",
                            "    - arm64: zynqmp: Disable coresight by default",
                            "    - arm64: zynqmp: Revert usb node drive strength and slew rate for zcu106",
                            "    - soc/tegra: fuse: Add Tegra114 nvmem cells and fuse lookups",
                            "    - ARM: tegra: p880: set correct touchscreen clipping",
                            "    - ARM: tegra: transformer-20: add missing magnetometer interrupt",
                            "    - ARM: tegra: transformer-20: fix audio-codec interrupt",
                            "    - firmware: qcom: tzmem: disable sc7180 platform",
                            "    - soc: ti: k3-socinfo: Add information for AM62L SR1.1",
                            "    - mmc: sdhci-msm: Enable tuning for SDR50 mode for SD card",
                            "    - pwm: pca9685: Use bulk write to atomicially update registers",
                            "    - ACPICA: dispatcher: Use acpi_ds_clear_operands() in",
                            "      acpi_ds_call_control_method()",
                            "    - tee: allow a driver to allocate a tee_device without a pool",
                            "    - kunit: Enable PCI on UML without triggering WARN()",
                            "    - selftests/bpf: Fix arena_spin_lock selftest failure",
                            "    - bpf: Do not limit bpf_cgroup_from_id to current's namespace",
                            "    - i3c: mipi-i3c-hci-pci: Add support for Intel Wildcat Lake-U I3C",
                            "    - rust: kunit: allow `cfg` on `test`s",
                            "    - video: backlight: lp855x_bl: Set correct EPROM start for LP8556",
                            "    - i3c: dw: Add shutdown support to dw_i3c_master driver",
                            "    - io_uring/zcrx: check all niovs filled with dma addresses",
                            "    - tools/cpupower: fix error return value in cpupower_write_sysfs()",
                            "    - io_uring/zcrx: account niov arrays to cgroup",
                            "    - pmdomain: apple: Add \"apple,t8103-pmgr-pwrstate\"",
                            "    - power: supply: qcom_battmgr: handle charging state change notifications",
                            "    - bpftool: Fix -Wuninitialized-const-pointer warnings with clang >= 21",
                            "    - cpuidle: Fail cpuidle device registration if there is one already",
                            "    - selftests/bpf: Fix selftest verifier_arena_large failure",
                            "    - selftests: ublk: fix behavior when fio is not installed",
                            "    - spi: rpc-if: Add resume support for RZ/G3E",
                            "    - ACPI: SPCR: Support Precise Baud Rate field",
                            "    - clocksource/drivers/vf-pit: Replace raw_readl/writel to readl/writel",
                            "    - clocksource/drivers/timer-rtl-otto: Work around dying timers",
                            "    - clocksource/drivers/timer-rtl-otto: Do not interfere with interrupts",
                            "    - riscv: bpf: Fix uninitialized symbol 'retval_off'",
                            "    - bpf: Clear pfmemalloc flag when freeing all fragments",
                            "    - selftests: drv-net: Pull data before parsing headers",
                            "    - nvme: Use non zero KATO for persistent discovery connections",
                            "    - uprobe: Do not emulate/sstep original instruction when ip is changed",
                            "    - hwmon: (asus-ec-sensors) increase timeout for locking ACPI mutex",
                            "    - hwmon: (dell-smm) Remove Dell Precision 490 custom config data",
                            "    - hwmon: (dell-smm) Add support for Dell OptiPlex 7040",
                            "    - tools/cpupower: Fix incorrect size in cpuidle_state_disable()",
                            "    - selftests/bpf: Fix flaky bpf_cookie selftest",
                            "    - tools/power turbostat: Fix incorrect sorting of PMT telemetry",
                            "    - tools/power x86_energy_perf_policy: Fix incorrect fopen mode usage",
                            "    - tools/power x86_energy_perf_policy: Enhance HWP enable",
                            "    - tools/power x86_energy_perf_policy: Prefer driver HWP limits",
                            "    - mfd: simple-mfd-i2c: Add compatible strings for Layerscape QIXIS FPGA",
                            "    - mfd: stmpe: Remove IRQ domain upon removal",
                            "    - mfd: stmpe-i2c: Add missing MODULE_LICENSE",
                            "    - mfd: qnap-mcu: Handle errors returned from qnap_mcu_write",
                            "    - mfd: qnap-mcu: Include linux/types.h in qnap-mcu.h shared header",
                            "    - mfd: madera: Work around false-positive -Wininitialized warning",
                            "    - mfd: da9063: Split chip variant reading in two bus transactions",
                            "    - mfd: macsmc: Add \"apple,t8103-smc\" compatible",
                            "    - mfd: core: Increment of_node's refcount before linking it to the",
                            "      platform device",
                            "    - mfd: cs42l43: Move IRQ enable/disable to encompass force suspend",
                            "    - mfd: intel-lpss: Add Intel Wildcat Lake LPSS PCI IDs",
                            "    - drm/xe/ptl: Apply Wa_16026007364",
                            "    - drm/xe/configfs: Enforce canonical device names",
                            "    - drm/amd/display: Update tiled to tiled copy command",
                            "    - drm/amd/display: fix condition for setting timing_adjust_pending",
                            "    - drm/amd/display: ensure committing streams is seamless",
                            "    - drm/amdgpu: add range check for RAS bad page address",
                            "    - drm/amdgpu: Check vcn sram load return value",
                            "    - drm/amd/display: Remove check DPIA HPD status for BW Allocation",
                            "    - drm/amd/display: Increase AUX Intra-Hop Done Max Wait Duration",
                            "    - drm/amd/display: Fix dmub_cmd header alignment",
                            "    - drm/xe/guc: Add more GuC load error status codes",
                            "    - drm/xe/pf: Don't resume device from restart worker",
                            "    - drm/amdgpu: Fix build error when CONFIG_SUSPEND is disabled",
                            "    - drm/amdgpu: Update IPID value for bad page threshold CPER",
                            "    - drm/amdgpu: Avoid rma causes GPU duplicate reset",
                            "    - drm/amdgpu: Effective health check before reset",
                            "    - drm/amd/amdgpu: Release xcp drm memory after unplug",
                            "    - drm/amdgpu: Fix vcn v5.0.1 poison irq call trace",
                            "    - drm/xe: Extend wa_13012615864 to additional Xe2 and Xe3 platforms",
                            "    - drm/amdgpu: Skip poison aca bank from UE channel",
                            "    - drm/amd/display: add more cyan skillfish devices",
                            "    - drm/amdgpu: Initialize jpeg v5_0_1 ras function",
                            "    - drm/amdgpu: skip mgpu fan boost for multi-vf",
                            "    - drm/amd/display: fix dmub access race condition",
                            "    - drm/amd/display: update dpp/disp clock from smu clock table",
                            "    - drm/amd/pm: Use cached metrics data on aldebaran",
                            "    - drm/amd/pm: Use cached metrics data on arcturus",
                            "    - accel/amdxdna: Unify pm and rpm suspend and resume callbacks",
                            "    - drm/amdgpu/jpeg: Hold pg_lock before jpeg poweroff",
                            "    - drm/xe/pf: Program LMTT directory pointer on all GTs within a tile",
                            "    - drm/nouveau: replace snprintf() with scnprintf() in nvkm_snprintbf()",
                            "    - ASoC: tas2781: Add keyword \"init\" in profile section",
                            "    - ASoC: mediatek: Use SND_JACK_AVOUT for HDMI/DP jacks",
                            "    - drm/amd/display: Reset apply_eamless_boot_optimization when dpms_off",
                            "    - drm/amdgpu: add to custom amdgpu_drm_release drm_dev_enter/exit",
                            "    - drm/amd/display: Wait until OTG enable state is cleared",
                            "    - drm/xe: rework PDE PAT index selection",
                            "    - docs: kernel-doc: avoid script crash on ancient Python",
                            "    - drm/sharp-memory: Do not access GEM-DMA vaddr directly",
                            "    - PCI: Disable MSI on RDC PCI to PCIe bridges",
                            "    - drm/nouveau: always set RMDevidCheckIgnore for GSP-RM",
                            "    - drm/panel-edp: Add SHP LQ134Z1 panel for Dell XPS 9345",
                            "    - selftests/net: Replace non-standard __WORDSIZE with sizeof(long) * 8",
                            "    - selftests/net: Ensure assert() triggers in psock_tpacket.c",
                            "    - wifi: rtw89: print just once for unknown C2H events",
                            "    - wifi: rtw88: sdio: use indirect IO for device registers before power-on",
                            "    - wifi: rtw89: add dummy C2H handlers for BCN resend and update done",
                            "    - drm/amdkfd: return -ENOTTY for unsupported IOCTLs",
                            "    - selftests: drv-net: devmem: add / correct the IPv6 support",
                            "    - selftests: drv-net: devmem: flip the direction of Tx tests",
                            "    - media: pci: ivtv: Don't create fake v4l2_fh",
                            "    - media: amphion: Delete v4l2_fh synchronously in .release()",
                            "    - drm/tidss: Use the crtc_* timings when programming the HW",
                            "    - drm/bridge: cdns-dsi: Fix REG_WAKEUP_TIME value",
                            "    - drm/bridge: cdns-dsi: Don't fail on MIPI_DSI_MODE_VIDEO_BURST",
                            "    - drm/tidss: Set crtc modesetting parameters with adjusted mode",
                            "    - drm/tidss: Remove early fb",
                            "    - RDMA/mana_ib: Drain send wrs of GSI QP",
                            "    - media: i2c: Kconfig: Ensure a dependency on HAVE_CLK for",
                            "      VIDEO_CAMERA_SENSOR",
                            "    - PCI/ERR: Update device error_state already after reset",
                            "    - x86/vsyscall: Do not require X86_PF_INSTR to emulate vsyscall",
                            "    - net: stmmac: Check stmmac_hw_setup() in stmmac_resume()",
                            "    - ice: Don't use %pK through printk or tracepoints",
                            "    - thunderbolt: Use is_pciehp instead of is_hotplug_bridge",
                            "    - ASoC: es8323: enable DAPM power widgets for playback DAC and output",
                            "    - powerpc/eeh: Use result of error_detected() in uevent",
                            "    - s390/pci: Use pci_uevent_ers() in PCI recovery",
                            "    - bridge: Redirect to backup port when port is administratively down",
                            "    - selftests: drv-net: wait for carrier",
                            "    - net: phy: mscc: report and configure in-band auto-negotiation for",
                            "      SGMII/QSGMII",
                            "    - scsi: ufs: host: mediatek: Fix auto-hibern8 timer configuration",
                            "    - scsi: ufs: host: mediatek: Fix PWM mode switch issue",
                            "    - scsi: ufs: host: mediatek: Assign power mode userdata before FASTAUTO",
                            "      mode change",
                            "    - scsi: ufs: host: mediatek: Change reset sequence for improved stability",
                            "    - scsi: ufs: host: mediatek: Fix invalid access in vccqx handling",
                            "    - gpu: nova-core: register: allow fields named `offset`",
                            "    - drm/panthor: Serialize GPU cache flush operations",
                            "    - HID: pidff: Use direction fix only for conditional effects",
                            "    - HID: pidff: PERMISSIVE_CONTROL quirk autodetection",
                            "    - drm/bridge: display-connector: don't set OP_DETECT for DisplayPorts",
                            "    - drm/amdkfd: Handle lack of READ permissions in SVM mapping",
                            "    - drm/amdgpu: refactor bad_page_work for corner case handling",
                            "    - hwrng: timeriomem - Use us_to_ktime() where appropriate",
                            "    - iio: adc: spear_adc: mask SPEAR_ADC_STATUS channel and avg sample before",
                            "      setting register",
                            "    - iio: adc: imx93_adc: load calibrated values even calibration failed",
                            "    - usb: gadget: f_ncm: Fix MAC assignment NCM ethernet",
                            "    - ASoC: es8323: remove DAC enablement write from es8323_probe",
                            "    - ASoC: es8323: add proper left/right mixer controls via DAPM",
                            "    - ASoC: codecs: wsa883x: Handle shared reset GPIO for WSA883x speakers",
                            "    - drm/xe: Make page size consistent in loop",
                            "    - wifi: rtw89: wow: remove notify during WoWLAN net-detect",
                            "    - wifi: rtw89: fix BSSID comparison for non-transmitted BSSID",
                            "    - wifi: rtw89: 8851b: rfk: update IQK TIA setting",
                            "    - dm error: mark as DM_TARGET_PASSES_INTEGRITY",
                            "    - char: misc: Make misc_register() reentry for miscdevice who wants",
                            "      dynamic minor",
                            "    - char: misc: Does not request module for miscdevice with dynamic minor",
                            "    - net: When removing nexthops, don't call synchronize_net if it is not",
                            "      necessary",
                            "    - net: Call trace_sock_exceed_buf_limit() for memcg failure with",
                            "      SK_MEM_RECV.",
                            "    - dmaengine: idxd: Add a new IAA device ID for Wildcat Lake family",
                            "      platforms",
                            "    - PCI/P2PDMA: Fix incorrect pointer usage in devm_kfree() call",
                            "    - bnxt_en: Add Hyper-V VF ID",
                            "    - tty: serial: Modify the use of dev_err_probe()",
                            "    - ALSA: usb-audio: Add validation of UAC2/UAC3 effect units",
                            "    - Octeontx2-af: Broadcast XON on all channels",
                            "    - idpf: do not linearize big TSO packets",
                            "    - drm/xe/pcode: Initialize data0 for pcode read routine",
                            "    - drm/panel: ilitek-ili9881c: turn off power-supply when init fails",
                            "    - drm/panel: ilitek-ili9881c: move display_on/_off dcs calls to",
                            "      (un-)prepare",
                            "    - rds: Fix endianness annotation for RDS_MPATH_HASH",
                            "    - net: wangxun: limit tx_max_coalesced_frames_irq",
                            "    - iio: imu: bmi270: Match PNP ID found on newer GPD firmware",
                            "    - media: ipu6: isys: Set embedded data type correctly for metadata formats",
                            "    - rpmsg: char: Export alias for RPMSG ID rpmsg-raw from table",
                            "    - net: ipv4: allow directed broadcast routes to use dst hint",
                            "    - scsi: mpi3mr: Fix device loss during enclosure reboot due to zero link",
                            "      speed",
                            "    - wifi: rtw89: coex: Limit Wi-Fi scan slot cost to avoid A2DP glitch",
                            "    - scsi: mpi3mr: Fix I/O failures during controller reset",
                            "    - scsi: mpi3mr: Fix controller init failure on fault during queue creation",
                            "    - scsi: pm80xx: Fix race condition caused by static variables",
                            "    - extcon: adc-jack: Fix wakeup source leaks on device unbind",
                            "    - extcon: fsa9480: Fix wakeup source leaks on device unbind",
                            "    - extcon: axp288: Fix wakeup source leaks on device unbind",
                            "    - drm/xe: Set GT as wedged before sending wedged uevent",
                            "    - remoteproc: wkup_m3: Use devm_pm_runtime_enable() helper",
                            "    - drm/xe/wcl: Extend L3bank mask workaround",
                            "    - net: phy: fixed_phy: let fixed_phy_unregister free the phy_device",
                            "    - selftests: drv-net: hds: restore hds settings",
                            "    - fuse: zero initialize inode private data",
                            "    - virtio_fs: fix the hash table using in virtio_fs_enqueue_req()",
                            "    - selftests: pci_endpoint: Skip IRQ test if IRQ is out of range.",
                            "    - drm/xe: Ensure GT is in C0 during resumes",
                            "    - misc: pci_endpoint_test: Skip IRQ tests if irq is out of range",
                            "    - drm/amdgpu: Correct the loss of aca bank reg info",
                            "    - drm/amdgpu: Correct the counts of nr_banks and nr_errors",
                            "    - drm/amdkfd: fix vram allocation failure for a special case",
                            "    - drm/amd/display: Support HW cursor 180 rot for any number of pipe splits",
                            "    - drm/amdkfd: Tie UNMAP_LATENCY to queue_preemption",
                            "    - drm/amd/display: wait for otg update pending latch before clock",
                            "      optimization",
                            "    - drm/amd/display: Consider sink max slice width limitation for dsc",
                            "    - drm/amdgpu/vpe: cancel delayed work in hw_fini",
                            "    - drm/xe: Cancel pending TLB inval workers on teardown",
                            "    - net: Prevent RPS table overwrite of active flows",
                            "    - eth: fbnic: Reset hw stats upon PCI error",
                            "    - wifi: iwlwifi: mld: trigger mlo scan only when not in EMLSR",
                            "    - platform/x86/intel-uncore-freq: Fix warning in partitioned system",
                            "    - drm/msm/dpu: Filter modes based on adjusted mode clock",
                            "    - drm/msm: Use of_reserved_mem_region_to_resource() for \"memory-region\"",
                            "    - selftests: drv-net: rss_ctx: fix the queue count check",
                            "    - media: fix uninitialized symbol warnings",
                            "    - media: pci: mgb4: Fix timings comparison in VIDIOC_S_DV_TIMINGS",
                            "    - ASoC: SOF: ipc4-pcm: Add fixup for channels",
                            "    - drm/amdgpu: Notify pmfw bad page threshold exceeded",
                            "    - drm/amd/display: Increase minimum clock for TMDS 420 with pipe splitting",
                            "    - drm/amdgpu: Avoid jpeg v5.0.1 poison irq call trace on sriov guest",
                            "    - drm/amd/display: incorrect conditions for failing dto calculations",
                            "    - drm/amdgpu: Avoid vcn v5.0.1 poison irq call trace on sriov guest",
                            "    - drm/amdgpu: Respect max pixel clock for HDMI and DVI-D (v2)",
                            "    - mips: lantiq: danube: add missing properties to cpu node",
                            "    - mips: lantiq: danube: add model to EASY50712 dts",
                            "    - mips: lantiq: danube: add missing device_type in pci node",
                            "    - mips: lantiq: xway: sysctrl: rename stp clock",
                            "    - mips: lantiq: danube: rename stp node on EASY50712 reference board",
                            "    - inet_diag: annotate data-races in inet_diag_bc_sk()",
                            "    - microchip: lan865x: add ndo_eth_ioctl handler to enable PHY ioctl",
                            "      support",
                            "    - crypto: qat - use kcalloc() in qat_uclo_map_objs_from_mof()",
                            "    - scsi: pm8001: Use int instead of u32 to store error codes",
                            "    - iio: adc: ad7124: do not require mclk",
                            "    - scsi: ufs: exynos: fsd: Gate ref_clk and put UFS device in reset on",
                            "      suspend",
                            "    - media: imx-mipi-csis: Only set clock rate when specified in DT",
                            "    - wifi: iwlwifi: pcie: remember when interrupts are disabled",
                            "    - drm/st7571-i2c: add support for inverted pixel format",
                            "    - ptp: Limit time setting of PTP clocks",
                            "    - dmaengine: sh: setup_xref error handling",
                            "    - dmaengine: mv_xor: match alloc_wc and free_wc",
                            "    - dmaengine: dw-edma: Set status for callback_result",
                            "    - netfilter: nf_tables: all transaction allocations can now sleep",
                            "    - drm/msm/dsi/phy: Toggle back buffer resync after preparing PLL",
                            "    - drm/msm/dsi/phy_7nm: Fix missing initial VCO rate",
                            "    - drm/amdgpu: Allow kfd CRIU with no buffer objects",
                            "    - drm/xe/guc: Increase GuC crash dump buffer size",
                            "    - drm/amd/pm: Increase SMC timeout on SI and warn (v3)",
                            "    - move_mount(2): take sanity checks in 'beneath' case into do_lock_mount()",
                            "    - selftests: drv-net: rss_ctx: make the test pass with few queues",
                            "    - ipv6: Add sanity checks on ipv6_devconf.rpl_seg_enabled",
                            "    - drm/xe: Extend Wa_22021007897 to Xe3 platforms",
                            "    - wifi: mac80211: count reg connection element in the size",
                            "    - drm/panthor: check bo offset alignment in vm bind",
                            "    - drm: panel-backlight-quirks: Make EDID match optional",
                            "    - ixgbe: reduce number of reads when getting OROM data",
                            "    - netlink: specs: fou: change local-v6/peer-v6 check",
                            "    - net: nfc: nci: Increase NCI_DATA_TIMEOUT to 3000 ms",
                            "    - media: adv7180: Add missing lock in suspend callback",
                            "    - media: adv7180: Do not write format to device in set_fmt",
                            "    - media: adv7180: Only validate format in querystd",
                            "    - media: verisilicon: Explicitly disable selection api ioctls for decoders",
                            "    - wifi: mac80211: Fix 6 GHz Band capabilities element advertisement in",
                            "      lower bands",
                            "    - platform/x86: think-lmi: Add extra TC BIOS error messages",
                            "    - platform/x86/intel-uncore-freq: Present unique domain ID per package",
                            "    - ALSA: usb-audio: apply quirk for MOONDROP Quark2",
                            "    - PCI: imx6: Enable the Vaux supply if available",
                            "    - drm/xe/guc: Set upper limit of H2G retries over CTB",
                            "    - net: call cond_resched() less often in __release_sock()",
                            "    - smsc911x: add second read of EEPROM mac when possible corruption seen",
                            "    - drm/xe: improve dma-resv handling for backup object",
                            "    - iommu/amd: Add support to remap/unmap IOMMU buffers for kdump",
                            "    - iommu/amd: Skip enabling command/event buffers for kdump",
                            "    - iommu/amd: Reuse device table for kdump",
                            "    - crypto: ccp: Skip SEV and SNP INIT for kdump boot",
                            "    - iommu/apple-dart: Clear stream error indicator bits for T8110 DARTs",
                            "    - bus: mhi: host: pci_generic: Add support for all Foxconn T99W696 SKU",
                            "      variants",
                            "    - drm/amdgpu: Correct info field of bad page threshold exceed CPER",
                            "    - drm/amd: add more cyan skillfish PCI ids",
                            "    - drm/amdgpu: don't enable SMU on cyan skillfish",
                            "    - drm/amdgpu: add support for cyan skillfish gpu_info",
                            "    - drm/amd/display: Fix pbn_div Calculation Error",
                            "    - drm/amd/display: dont wait for pipe update during medupdate/highirq",
                            "    - drm/amd/pm: refine amdgpu pm sysfs node error code",
                            "    - drm/amd/display: Indicate when custom brightness curves are in use",
                            "    - selftests: ncdevmem: don't retry EFAULT",
                            "    - net: dsa: felix: support phy-mode = \"10g-qxgmii\"",
                            "    - usb: gadget: f_hid: Fix zero length packet transfer",
                            "    - serial: qcom-geni: Add DFS clock mode support to GENI UART driver",
                            "    - serdev: Drop dev_pm_domain_detach() call",
                            "    - tty/vt: Add missing return value for VT_RESIZE in vt_ioctl()",
                            "    - eeprom: at25: support Cypress FRAMs without device ID",
                            "    - drm/msm/adreno: Add speedbins for A663 GPU",
                            "    - drm/msm: Fix 32b size truncation",
                            "    - dt-bindings: display/msm/gmu: Update Adreno 623 bindings",
                            "    - drm/msm: make sure to not queue up recovery more than once",
                            "    - char: Use list_del_init() in misc_deregister() to reinitialize list",
                            "      pointer",
                            "    - drm/msm/adreno: Add speedbin data for A623 GPU",
                            "    - drm/msm/adreno: Add fenced regwrite support",
                            "    - drm/msm/a6xx: Switch to GMU AO counter",
                            "    - idpf: link NAPIs to queues",
                            "    - selftests: net: make the dump test less sensitive to mem accounting",
                            "    - PCI: endpoint: pci-epf-test: Limit PCIe BAR size for fixed BARs",
                            "    - wifi: rtw89: Add USB ID 2001:332a for D-Link AX9U rev. A1",
                            "    - wifi: rtw89: Add USB ID 2001:3327 for D-Link AX18U rev. A1",
                            "    - wifi: iwlwifi: fw: Add ASUS to PPAG and TAS list",
                            "    - drm/xe/i2c: Enable bus mastering",
                            "    - media: ov08x40: Fix the horizontal flip control",
                            "    - media: i2c: og01a1b: Specify monochrome media bus format instead of",
                            "      Bayer",
                            "    - media: qcom: camss: csiphy-3ph: Add CSIPHY 2ph DPHY v2.0.1 init sequence",
                            "    - drm/bridge: write full Audio InfoFrame",
                            "    - drm/xe/guc: Always add CT disable action during second init step",
                            "    - f2fs: fix wrong layout information on 16KB page",
                            "    - selftests: mptcp: join: allow more time to send ADD_ADDR",
                            "    - scsi: ufs: host: mediatek: Enhance recovery on resume failure",
                            "    - scsi: ufs: ufs-qcom: Align programming sequence of Shared ICE for UFS",
                            "      controller v5",
                            "    - scsi: ufs: host: mediatek: Fix unbalanced IRQ enable issue",
                            "    - scsi: ufs: host: mediatek: Enhance recovery on hibernation exit failure",
                            "    - net: phy: marvell: Fix 88e1510 downshift counter errata",
                            "    - scsi: ufs: host: mediatek: Correct system PM flow",
                            "    - scsi: ufs: host: mediatek: Disable auto-hibern8 during power mode",
                            "      changes",
                            "    - scsi: ufs: host: mediatek: Fix adapt issue after PA_Init",
                            "    - wifi: cfg80211: update the time stamps in hidden ssid",
                            "    - wifi: mac80211: Fix HE capabilities element check",
                            "    - fbcon: Use screen info to find primary device",
                            "    - phy: cadence: cdns-dphy: Enable lower resolutions in dphy",
                            "    - Fix access to video_is_primary_device() when compiled without",
                            "      CONFIG_VIDEO",
                            "    - phy: renesas: r8a779f0-ether-serdes: add new step added to latest",
                            "      datasheet",
                            "    - phy: rockchip: phy-rockchip-inno-csidphy: allow writes to grf register 0",
                            "    - drm/msm/registers: Generate _HI/LO builders for reg64",
                            "    - net: sh_eth: Disable WoL if system can not suspend",
                            "    - selftests: net: replace sleeps in fcnal-test with waits",
                            "    - media: redrat3: use int type to store negative error codes",
                            "    - platform/x86/amd/pmf: Fix the custom bios input handling mechanism",
                            "    - selftests: traceroute: Use require_command()",
                            "    - selftests: traceroute: Return correct value on failure",
                            "    - openrisc: Add R_OR1K_32_PCREL relocation type module support",
                            "    - netfilter: nf_reject: don't reply to icmp error messages",
                            "    - x86/kvm: Prefer native qspinlock for dedicated vCPUs irrespective of",
                            "      PV_UNHALT",
                            "    - x86/virt/tdx: Use precalculated TDVPR page physical address",
                            "    - selftests: Disable dad for ipv6 in fcnal-test.sh",
                            "    - eth: 8139too: Make 8139TOO_PIO depend on !NO_IOPORT_MAP",
                            "    - [Config] No longer enable `CONFIG_8139TOO_PIO` for armhf",
                            "    - selftests: Replace sleep with slowwait",
                            "    - net: devmem: expose tcp_recvmsg_locked errors",
                            "    - selftests: net: lib.sh: Don't defer failed commands",
                            "    - HID: asus: add Z13 folio to generic group for multitouch to work",
                            "    - watchdog: s3c2410_wdt: Fix max_timeout being calculated larger",
                            "    - crypto: sun8i-ce - remove channel timeout field",
                            "    - PCI: dwc: Verify the single eDMA IRQ in dw_pcie_edma_irq_verify()",
                            "    - crypto: ccp - Fix incorrect payload size calculation in",
                            "      psp_poulate_hsti()",
                            "    - crypto: caam - double the entropy delay interval for retry",
                            "    - can: rcar_canfd: Update bit rate constants for RZ/G3E and R-Car Gen4",
                            "    - net: mana: Reduce waiting time if HWC not responding",
                            "    - ionic: use int type for err in ionic_get_module_eeprom_by_page",
                            "    - net/cls_cgroup: Fix task_get_classid() during qdisc run",
                            "    - wifi: mt76: mt7921: Add 160MHz beamformee capability for mt7922 device",
                            "    - wifi: mt76: mt7925: add pci restore for hibernate",
                            "    - wifi: mt76: mt7996: Fix mt7996_reverse_frag0_hdr_trans for MLO",
                            "    - wifi: mt76: mt7996: Set def_wcid pointer in mt7996_mac_sta_init_link()",
                            "    - wifi: mt76: mt7996: Temporarily disable EPCS",
                            "    - wifi: mt76: mt7996: support writing MAC TXD for AddBA Request",
                            "    - wifi: mt76: mt76_eeprom_override to int",
                            "    - ALSA: serial-generic: remove shared static buffer",
                            "    - wifi: mt76: mt7996: fix memory leak on mt7996_mcu_sta_key_tlv error",
                            "    - wifi: mt76: mt7996: disable promiscuous mode by default",
                            "    - wifi: mt76: use altx queue for offchannel tx on connac+",
                            "    - wifi: mt76: improve phy reset on hw restart",
                            "    - drm/amdgpu: Use memdup_array_user in amdgpu_cs_wait_fences_ioctl",
                            "    - drm/amdgpu: Release hive reference properly",
                            "    - drm/amd/display: Fix DMCUB loading sequence for DCN3.2",
                            "    - drm/amd/display: Set up pixel encoding for YCBCR422",
                            "    - drm/amd/display: fix dml ms order of operations",
                            "    - drm/amd/display: Don't use non-registered VUPDATE on DCE 6",
                            "    - drm/amd/display: Keep PLL0 running on DCE 6.0 and 6.4",
                            "    - drm/amd/display: Fix DVI-D/HDMI adapters",
                            "    - drm/amd/display: Disable VRR on DCE 6",
                            "    - drm/amd/display/dml2: Guard dml21_map_dc_state_into_dml_display_cfg with",
                            "      DC_FP_START",
                            "    - net: phy: clear EEE runtime state in PHY_HALTED/PHY_ERROR",
                            "    - ethernet: Extend device_get_mac_address() to use NVMEM",
                            "    - scsi: ufs: ufs-qcom: Disable lane clocks during phy hibern8",
                            "    - HID: i2c-hid: Resolve touchpad issues on Dell systems during S4",
                            "    - hinic3: Queue pair endianness improvements",
                            "    - hinic3: Fix missing napi->dev in netif_queue_set_napi",
                            "    - tools: ynl-gen: validate nested arrays",
                            "    - drm/xe/guc: Return an error code if the GuC load fails",
                            "    - drm/amdgpu: reject gang submissions under SRIOV",
                            "    - selftests/Makefile: include $(INSTALL_DEP_TARGETS) in clean target to",
                            "      clean net/lib dependency",
                            "    - scsi: ufs: core: Disable timestamp functionality if not supported",
                            "    - scsi: lpfc: Clean up allocated queues when queue setup mbox commands",
                            "      fail",
                            "    - scsi: lpfc: Decrement ndlp kref after FDISC retries exhausted",
                            "    - scsi: lpfc: Check return status of lpfc_reset_flush_io_context during",
                            "      TGT_RESET",
                            "    - scsi: lpfc: Remove ndlp kref decrement clause for F_Port_Ctrl in",
                            "      lpfc_cleanup",
                            "    - scsi: lpfc: Define size of debugfs entry for xri rebalancing",
                            "    - scsi: lpfc: Ensure PLOGI_ACC is sent prior to PRLI in Point to Point",
                            "      topology",
                            "    - allow finish_no_open(file, ERR_PTR(-E...))",
                            "    - usb: mon: Increase BUFF_MAX to 64 MiB to support multi-MB URBs",
                            "    - usb: xhci: plat: Facilitate using autosuspend for xhci plat devices",
                            "    - wifi: rtw89: disable RTW89_PHYSTS_IE09_FTR_0 for ppdu status",
                            "    - wifi: rtw89: obtain RX path from ppdu status IE00",
                            "    - wifi: rtw89: renew a completion for each H2C command waiting C2H event",
                            "    - usb: xhci-pci: add support for hosts with zero USB3 ports",
                            "    - ipv6: np->rxpmtu race annotation",
                            "    - RDMA/irdma: Update Kconfig",
                            "    - IB/ipoib: Ignore L3 master device",
                            "    - bnxt_en: Add fw log trace support for 5731X/5741X chips",
                            "    - mei: make a local copy of client uuid in connect",
                            "    - ASoC: qcom: sc8280xp: explicitly set S16LE format in",
                            "      sc8280xp_be_hw_params_fixup()",
                            "    - net: phy: clear link parameters on admin link down",
                            "    - net: ethernet: microchip: sparx5: make it selectable for ARCH_LAN969X",
                            "    - bus: mhi: core: Improve mhi_sync_power_up handling for SYS_ERR state",
                            "    - iommu/vt-d: Replace snprintf with scnprintf in dmar_latency_snapshot()",
                            "    - wifi: ath10k: Fix connection after GTK rekeying",
                            "    - iommu/vt-d: Remove LPIG from page group response descriptor",
                            "    - wifi: mac80211: Get the correct interface for non-netdev skb status",
                            "    - wifi: mac80211: Track NAN interface start/stop",
                            "    - net: intel: fm10k: Fix parameter idx set but not used",
                            "    - sparc/module: Add R_SPARC_UA64 relocation handling",
                            "    - sparc64: fix prototypes of reads[bwl]()",
                            "    - vfio: return -ENOTTY for unsupported device feature",
                            "    - ptp_ocp: make ptp_ocp driver compatible with PTP_EXTTS_REQUEST2",
                            "    - crypto: hisilicon/qm - invalidate queues in use",
                            "    - crypto: hisilicon/qm - clear all VF configurations in the hardware",
                            "    - ASoC: ops: improve snd_soc_get_volsw",
                            "    - PCI/PM: Skip resuming to D0 if device is disconnected",
                            "    - selftests: forwarding: Reorder (ar)ping arguments to obey POSIX getopt",
                            "    - remoteproc: qcom: q6v5: Avoid handling handover twice",
                            "    - wifi: ath12k: Increase DP_REO_CMD_RING_SIZE to 256",
                            "    - net: dsa: microchip: Set SPI as bus interface during reset for KSZ8463",
                            "    - bng_en: make bnge_alloc_ring() self-unwind on failure",
                            "    - ALSA: usb-audio: don't apply interface quirk to Presonus S1824c",
                            "    - tcp: Update bind bucket state on port release",
                            "    - ovl: make sure that ovl_create_real() returns a hashed dentry",
                            "    - drm/amd/display: Add missing post flip calls",
                            "    - drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream",
                            "    - drm/amd/display: Add fast sync field in ultra sleep more for DMUB",
                            "    - drm/amd/display: Init dispclk from bootup clock for DCN314",
                            "    - drm/amd/display: Fix for test crash due to power gating",
                            "    - drm/amd/display: change dc stream color settings only in atomic commit",
                            "    - NFSv4: handle ERR_GRACE on delegation recalls",
                            "    - NFSv4.1: fix mount hang after CREATE_SESSION failure",
                            "    - net: bridge: Install FDB for bridge MAC on VLAN 0",
                            "    - net: phy: dp83640: improve phydev and driver removal handling",
                            "    - scsi: ufs: core: Change MCQ interrupt enable flow",
                            "    - scsi: libfc: Fix potential buffer overflow in fc_ct_ms_fill()",
                            "    - accel/habanalabs/gaudi2: fix BMON disable configuration",
                            "    - scsi: mpt3sas: Add support for 22.5 Gbps SAS link rate",
                            "    - accel/habanalabs: return ENOMEM if less than requested pages were pinned",
                            "    - accel/habanalabs/gaudi2: read preboot status after recovering from dirty",
                            "      state",
                            "    - ASoC: renesas: msiof: add .symmetric_xxx on snd_soc_dai_driver",
                            "    - ASoC: renesas: msiof: use reset controller",
                            "    - ASoC: renesas: msiof: tidyup DMAC stop timing",
                            "    - ASoC: renesas: msiof: set SIFCTR register",
                            "    - ext4: increase IO priority of fastcommit",
                            "    - drm/amdgpu: Add fallback to pipe reset if KCQ ring reset fails",
                            "    - drm/amdgpu: Fix fence signaling race condition in userqueue",
                            "    - ASoC: stm32: sai: manage context in set_sysclk callback",
                            "    - ASoC: tlv320aic3x: Fix class-D initialization for tlv320aic3007",
                            "    - ACPI: scan: Update honor list for RPMI System MSI",
                            "    - platform/x86: x86-android-tablets: Stop using EPROBE_DEFER",
                            "    - vfio/pci: Fix INTx handling on legacy non-PCI 2.3 devices",
                            "    - vfio/nvgrace-gpu: Add GB300 SKU to the devid table",
                            "    - selftest: net: Fix error message if empty variable",
                            "    - net/mlx5e: Don't query FEC statistics when FEC is disabled",
                            "    - Bluetooth: btintel: Add support for BlazarIW core",
                            "    - net: macb: avoid dealing with endianness in macb_set_hwaddr()",
                            "    - Bluetooth: btusb: Add new VID/PID 13d3/3627 for MT7925",
                            "    - Bluetooth: btintel_pcie: Define hdev->wakeup() callback",
                            "    - Bluetooth: ISO: Don't initiate CIS connections if there are no buffers",
                            "    - Bluetooth: btusb: Check for unexpected bytes when defragmenting HCI",
                            "      frames",
                            "    - Bluetooth: ISO: Use sk_sndtimeo as conn_timeout",
                            "    - Bluetooth: btusb: Add new VID/PID 13d3/3633 for MT7922",
                            "    - net: stmmac: est: Drop frames causing HLBS error",
                            "    - exfat: limit log print for IO error",
                            "    - 6pack: drop redundant locking and refcounting",
                            "    - page_pool: Clamp pool size to max 16K pages",
                            "    - net/mlx5e: Prevent entering switchdev mode with inconsistent netns",
                            "    - ksmbd: use sock_create_kern interface to create kernel socket",
                            "    - smb: client: update cfid->last_access_time in",
                            "      open_cached_dir_by_dentry()",
                            "    - smb: client: transport: avoid reconnects triggered by pending task work",
                            "    - usb: xhci-pci: Fix USB2-only root hub registration",
                            "    - drm/amd/display: Add fallback path for YCBCR422",
                            "    - ACPICA: Update dsmethod.c to get rid of unused variable warning",
                            "    - RDMA/bnxt_re: Fix a potential memory leak in destroy_gsi_sqp",
                            "    - RDMA/irdma: Fix SD index calculation",
                            "    - RDMA/irdma: Remove unused struct irdma_cq fields",
                            "    - RDMA/irdma: Set irdma_cq cq_num field during CQ create",
                            "    - RDMA/uverbs: Fix umem release in UVERBS_METHOD_CQ_CREATE",
                            "    - RDMA/hns: Fix recv CQ and QP cache affinity",
                            "    - RDMA/hns: Fix the modification of max_send_sge",
                            "    - RDMA/hns: Fix wrong WQE data when QP wraps around",
                            "    - btrfs: mark dirty extent range for out of bound prealloc extents",
                            "    - clk: qcom: gcc-ipq6018: rework nss_port5 clock to multiple conf",
                            "    - clk: renesas: rzv2h: Re-assert reset on deassert timeout",
                            "    - clk: samsung: exynos990: Add missing USB clock registers to HSI0",
                            "    - fs/hpfs: Fix error code for new_inode() failure in",
                            "      mkdir/create/mknod/symlink",
                            "    - clocksource: hyper-v: Skip unnecessary checks for the root partition",
                            "    - hyperv: Add missing field to hv_output_map_device_interrupt",
                            "    - um: Fix help message for ssl-non-raw",
                            "    - clk: sunxi-ng: sun6i-rtc: Add A523 specifics",
                            "    - rtc: pcf2127: clear minute/second interrupt",
                            "    - ARM: at91: pm: save and restore ACR during PLL disable/enable",
                            "    - clk: at91: add ACR in all PLL settings",
                            "    - clk: at91: sam9x7: Add peripheral clock id for pmecc",
                            "    - clk: at91: clk-master: Add check for divide by 3",
                            "    - clk: at91: clk-sam9x60-pll: force write to PLL_UPDT register",
                            "    - clk: ti: am33xx: keep WKUP_DEBUGSS_CLKCTRL enabled",
                            "    - clk: scmi: Add duty cycle ops only when duty cycle is supported",
                            "    - clk: clocking-wizard: Fix output clock register offset for Versal",
                            "      platforms",
                            "    - NTB: epf: Allow arbitrary BAR mapping",
                            "    - 9p: fix /sys/fs/9p/caches overwriting itself",
                            "    - cpufreq: tegra186: Initialize all cores to max frequencies",
                            "    - 9p: sysfs_init: don't hardcode error to ENOMEM",
                            "    - scsi: ufs: core: Include UTP error in INT_FATAL_ERRORS",
                            "    - fbdev: core: Fix ubsan warning in pixel_to_pat",
                            "    - ACPI: property: Return present device nodes only on fwnode interface",
                            "    - LoongArch: Handle new atomic instructions for probes",
                            "    - tools bitmap: Add missing asm-generic/bitsperlong.h include",
                            "    - tools: lib: thermal: don't preserve owner in install",
                            "    - tools: lib: thermal: use pkg-config to locate libnl3",
                            "    - ALSA: hda/realtek: Add quirk for ASUS ROG Zephyrus Duo",
                            "    - rtc: zynqmp: Restore alarm functionality after kexec transition",
                            "    - rtc: pcf2127: fix watchdog interrupt mask on pcf2131",
                            "    - net: wwan: t7xx: add support for HP DRMR-H01",
                            "    - kbuild: uapi: Strip comments before size type check",
                            "    - ASoC: meson: aiu-encoder-i2s: fix bit clock polarity",
                            "    - ASoC: rt722: add settings for rt722VB",
                            "    - drm/amdgpu: Report individual reset error",
                            "    - ceph: add checking of wait_for_completion_killable() return value",
                            "    - ceph: fix potential race condition in ceph_ioctl_lazyio()",
                            "    - ceph: refactor wake_up_bit() pattern of calling",
                            "    - x86: uaccess: don't use runtime-const rewriting in modules",
                            "    - rust: condvar: fix broken intra-doc link",
                            "    - rust: devres: fix private intra-doc link",
                            "    - rust: kbuild: workaround `rustdoc` doctests modifier bug",
                            "    - rust: kbuild: treat `build_error` and `rustdoc` as kernel objects",
                            "    - media: uvcvideo: Use heuristic to find stream entity",
                            "    - Revert \"wifi: ath10k: avoid unnecessary wait for service ready message\"",
                            "    - tracing: tprobe-events: Fix to register tracepoint correctly",
                            "    - tracing: tprobe-events: Fix to put tracepoint_user when disable the",
                            "      tprobe",
                            "    - net: libwx: fix device bus LAN ID",
                            "    - scsi: ufs: core: Fix a race condition related to the \"hid\" attribute",
                            "      group",
                            "    - riscv: ptdump: use seq_puts() in pt_dump_seq_puts() macro",
                            "    - Revert \"wifi: ath12k: Fix missing station power save configuration\"",
                            "    - scsi: ufs: core: Revert \"Make HID attributes visible\"",
                            "    - Bluetooth: btrtl: Fix memory leak in rtlbt_parse_firmware_v2()",
                            "    - net: dsa: tag_brcm: legacy: fix untagged rx on unbridged ports for",
                            "      bcm63xx",
                            "    - selftests/net: fix out-of-order delivery of FIN in gro:tcp test",
                            "    - selftests/net: use destination options instead of hop-by-hop",
                            "    - selftests: netdevsim: Fix ethtool-coalesce.sh fail by installing",
                            "      ethtool-common.sh",
                            "    - net: vlan: sync VLAN features with lower device",
                            "    - net: dsa: b53: fix resetting speed and pause on forced link",
                            "    - net: dsa: b53: fix bcm63xx RGMII port link adjustment",
                            "    - net: dsa: b53: fix enabling ip multicast",
                            "    - net: dsa: b53: stop reading ARL entries if search is done",
                            "    - net: dsa: b53: properly bound ARL searches for < 4 ARL bin chips",
                            "    - sctp: Hold RCU read lock while iterating over address list",
                            "    - sctp: Hold sock lock while iterating over address list",
                            "    - net: ionic: add dma_wmb() before ringing TX doorbell",
                            "    - net: ionic: map SKB after pseudo-header checksum prep",
                            "    - octeontx2-pf: Fix devm_kcalloc() error checking",
                            "    - bnxt_en: Fix a possible memory leak in bnxt_ptp_init",
                            "    - bnxt_en: Always provide max entry and entry size in coredump segments",
                            "    - bnxt_en: Fix warning in bnxt_dl_reload_down()",
                            "    - wifi: mac80211_hwsim: Limit destroy_on_close radio removal to netgroup",
                            "    - io_uring: fix types for region size calulation",
                            "    - net/mlx5e: Fix return value in case of module EEPROM read error",
                            "    - net: ti: icssg-prueth: Fix fdb hash size configuration",
                            "    - net/mlx5e: SHAMPO, Fix header mapping for 64K pages",
                            "    - net/mlx5e: SHAMPO, Fix skb size check for 64K pages",
                            "    - net/mlx5e: SHAMPO, Fix header formulas for higher MTUs and 64K pages",
                            "    - net: wan: framer: pef2256: Switch to devm_mfd_add_devices()",
                            "    - net: dsa: microchip: Fix reserved multicast address table programming",
                            "    - net: bridge: fix MST static key usage",
                            "    - selftests/vsock: avoid false-positives when checking dmesg",
                            "    - tracing: Fix memory leaks in create_field_var()",
                            "    - drm/amd/display: Enable mst when it's detected but yet to be initialized",
                            "    - wifi: cfg80211: add an hrtimer based delayed work item",
                            "    - wifi: mac80211: use wiphy_hrtimer_work for ml_reconf_work",
                            "    - wifi: mac80211: use wiphy_hrtimer_work for ttlm_work",
                            "    - wifi: mac80211: use wiphy_hrtimer_work for csa.switch_work",
                            "    - riscv: Fix memory leak in module_frob_arch_sections()",
                            "    - rtc: rx8025: fix incorrect register reference",
                            "    - x86/microcode/AMD: Add more known models to entry sign checking",
                            "    - smb: client: validate change notify buffer before copy",
                            "    - x86/amd_node: Fix AMD root device caching",
                            "    - xfs: fix delalloc write failures in software-provided atomic writes",
                            "    - xfs: fix various problems in xfs_atomic_write_cow_iomap_begin",
                            "    - x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode",
                            "    - drm: define NVIDIA DRM format modifiers for GB20x",
                            "    - drm/nouveau: Advertise correct modifiers on GB20x",
                            "    - drm/amdgpu/smu: Handle S0ix for vangogh",
                            "    - drm/amdkfd: Don't clear PT after process killed",
                            "    - virtio_net: fix alignment for virtio_net_hdr_v1_hash",
                            "    - lib/crypto: curve25519-hacl64: Fix older clang KASAN workaround for GCC",
                            "    - scsi: ufs: ufs-pci: Fix S0ix/S3 for Intel controllers",
                            "    - scsi: ufs: ufs-pci: Set UFSHCD_QUIRK_PERFORM_LINK_STARTUP_ONCE for Intel",
                            "      ADL",
                            "    - scsi: ufs: core: Add a quirk to suppress link_startup_again",
                            "    - drm/amd/display: update color on atomic commit time",
                            "    - extcon: adc-jack: Cleanup wakeup source only if it was enabled",
                            "    - kunit: Extend kconfig help text for KUNIT_UML_PCI",
                            "    - ALSA: hda/tas2781: Enable init_profile_id for device initialization",
                            "    - ACPI: SPCR: Check for table version when using precise baudrate",
                            "    - kbuild: Strip trailing padding bytes from modules.builtin.modinfo",
                            "    - drm/amdgpu: Fix unintended error log in VCN5_0_0",
                            "    - drm/amd/display: Fix vupdate_offload_work doc",
                            "    - drm/amdgpu: Fix function header names in amdgpu_connectors.c",
                            "    - drm/amdgpu/userq: assign an error code for invalid userq va",
                            "    - drm/msm/dpu: Fix adjusted mode clock check for 3d merge",
                            "    - drm/amd/display: Reject modes with too high pixel clock on DCE6-10",
                            "    - drm/amd/display: use GFP_NOWAIT for allocation in interrupt handler",
                            "    - drm/amd/display: Fix black screen with HDMI outputs",
                            "    - selftests: drv-net: Reload pkt pointer after calling filter_udphdr",
                            "    - dt-bindings: eeprom: at25: use \"size\" for FRAMs without device ID",
                            "    - Linux 6.17.8",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68316",
                            "    - scsi: ufs: core: Fix invalid probe error return value",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40292",
                            "    - virtio-net: fix received length check in big packets",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68180",
                            "    - drm/amd/display: Fix NULL deref in debugfs odm_combine_segments",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40327",
                            "    - perf/core: Fix system hang caused by cpu-clock usage",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40328",
                            "    - smb: client: fix potential UAF in smb2_close_cached_fid()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40291",
                            "    - io_uring: fix regbuf vector size truncation",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68322",
                            "    - parisc: Avoid crash due to unaligned access in unwinder",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40293",
                            "    - iommufd: Don't overflow during division for dirty tracking",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40294",
                            "    - Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40329",
                            "    - drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40295",
                            "    - fscrypt: fix left shift underflow when inode->i_blkbits > PAGE_SHIFT",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40296",
                            "    - platform/x86: int3472: Fix double free of GPIO device during unregister",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40297",
                            "    - net: bridge: fix use-after-free due to MST port state bypass",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68320",
                            "    - lan966x: Fix sleeping in atomic context",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68169",
                            "    - netpoll: Fix deadlock in memory allocation under spinlock",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68197",
                            "    - bnxt_en: Fix null pointer dereference in bnxt_bs_trace_check_wrap()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40330",
                            "    - bnxt_en: Shutdown FW DMA in bnxt_shutdown()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68192",
                            "    - net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40331",
                            "    - sctp: Prevent TOCTOU out-of-bounds write",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68187",
                            "    - net: mdio: Check regmap pointer returned by device_node_to_regmap()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68167",
                            "    - gpiolib: fix invalid pointer access in debugfs",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68319",
                            "    - netconsole: Acquire su_mutex before navigating configs hierarchy",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40298",
                            "    - gve: Implement settime64 with -EOPNOTSUPP",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40299",
                            "    - gve: Implement gettimex64 with -EOPNOTSUPP",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40301",
                            "    - Bluetooth: hci_event: validate skb length for unknown CC opcode",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40358",
                            "    - riscv: stacktrace: Disable KASAN checks for non-current tasks",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68186",
                            "    - ring-buffer: Do not warn in ring_buffer_map_get_reader() when reader",
                            "      catches up",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68184",
                            "    - drm/mediatek: Disable AFBC support on Mediatek DRM driver",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40302",
                            "    - media: videobuf2: forbid remove_bufs when legacy fileio is active",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40303",
                            "    - btrfs: ensure no dirty metadata is written back for an fs with errors",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40362",
                            "    - ceph: fix multifs mds auth caps issue",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40332",
                            "    - drm/amdkfd: Fix mmap write lock not release",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40304",
                            "    - fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40305",
                            "    - 9p/trans_fd: p9_fd_request: kick rx thread if EPOLLIN",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68318",
                            "    - clk: thead: th1520-ap: set all AXI clocks to CLK_IS_CRITICAL",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40209",
                            "    - btrfs: fix memory leak of qgroup_list in btrfs_add_qgroup_relation",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68183",
                            "    - ima: don't clear IMA_DIGSIG flag when setting or removing non-IMA xattr",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68173",
                            "    - ftrace: Fix softlockup in ftrace_module_enable",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40306",
                            "    - orangefs: fix xattr related buffer overflow...",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40307",
                            "    - exfat: validate cluster allocation bits of the allocation bitmap",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40308",
                            "    - Bluetooth: bcsp: receive data only if registered",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40309",
                            "    - Bluetooth: SCO: Fix UAF on sco_conn_free",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68174",
                            "    - amd/amdkfd: enhance kfd process check in switch partition",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40310",
                            "    - amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40361",
                            "    - fs: ext4: change GFP_KERNEL to GFP_NOFS to avoid deadlock",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40311",
                            "    - accel/habanalabs: support mapping cb with vmalloc-backed coherent memory",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68185",
                            "    - nfs4_setup_readdir(): insufficient locking for ->d_parent->d_inode",
                            "      dereferencing",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68176",
                            "    - PCI: cadence: Check for the existence of cdns_pcie::ops before using it",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68190",
                            "    - drm/amdgpu/atom: Check kcalloc() for WS buffer in",
                            "      amdgpu_atom_execute_table_locked()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68168",
                            "    - jfs: fix uninitialized waitqueue in transaction manager",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40312",
                            "    - jfs: Verify inode mode when loading from disk",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40333",
                            "    - f2fs: fix infinite loop in __insert_extent_tree()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68321",
                            "    - page_pool: always add GFP_NOWARN for ATOMIC allocations",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40334",
                            "    - drm/amdgpu: validate userq buffer virtual address and size",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68191",
                            "    - udp_tunnel: use netdev_warn() instead of netdev_WARN()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68309",
                            "    - PCI/AER: Fix NULL pointer access by aer_info",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40313",
                            "    - ntfs3: pretend $Extend records as regular files",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40335",
                            "    - drm/amdgpu: validate userq input args",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40314",
                            "    - usb: cdns3: gadget: Use-after-free during failed initialization and exit",
                            "      of cdnsp gadget",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40336",
                            "    - drm/gpusvm: fix hmm_pfn_to_map_order() usage",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68193",
                            "    - drm/xe/guc: Add devm release action to safely tear down CT",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68175",
                            "    - media: nxp: imx8-isi: Fix streaming cleanup on release",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68188",
                            "    - tcp: use dst_dev_rcu() in tcp_fastopen_active_disable_ofo_check()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68315",
                            "    - f2fs: fix to detect potential corrupted nid in free_nid_list",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40337",
                            "    - net: stmmac: Correctly handle Rx checksum offload errors",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40338",
                            "    - ASoC: Intel: avs: Do not share the name pointer between components",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40339",
                            "    - drm/amdgpu: fix nullptr err of vm_handle_moved",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68194",
                            "    - media: imon: make send_packet() more robust",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40363",
                            "    - net: ipv6: fix field-spanning memcpy warning in AH output",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68311",
                            "    - tty: serial: ip22zilog: Use platform device for probing",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40340",
                            "    - drm/xe: Fix oops in xe_gem_fault when running core_hotunplug test.",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68196",
                            "    - drm/amd/display: Cache streams targeting link when performing LT",
                            "      automation",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68178",
                            "    - blk-cgroup: fix possible deadlock while configuring policy",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40341",
                            "    - futex: Don't leak robust_list pointer on exec race",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40342",
                            "    - nvme-fc: use lock accessing port_state and rport state",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40343",
                            "    - nvmet-fc: avoid scheduling association deletion twice",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68177",
                            "    - cpufreq/longhaul: handle NULL policy in longhaul_exit",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68317",
                            "    - io_uring/zctx: check chained notif contexts",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40315",
                            "    - usb: gadget: f_fs: Fix epfile null pointer access after ep enable.",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40316",
                            "    - drm/mediatek: Fix device use-after-free on unbind",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40360",
                            "    - drm/sysfb: Do not dereference NULL pointer in plane reset",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68179",
                            "    - s390: Disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68310",
                            "    - s390/pci: Avoid deadlock between PCI error recovery and mlx5 crdump",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40317",
                            "    - regmap: slimbus: fix bus_context pointer in regmap init calls",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40359",
                            "    - perf/x86/intel: Fix KASAN global-out-of-bounds warning",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68181",
                            "    - drm/radeon: Remove calls to drm_put_dev()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68170",
                            "    - drm/radeon: Do not kfree() devres managed rdev",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40213",
                            "    - Bluetooth: MGMT: fix crash in set_mesh_sync and set_mesh_complete",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40318",
                            "    - Bluetooth: hci_sync: fix race in hci_cmd_sync_dequeue_once",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68312",
                            "    - usbnet: Prevents free active kevent",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40344",
                            "    - ASoC: Intel: avs: Disable periods-elapsed work when closing PCM",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68172",
                            "    - crypto: aspeed - fix double free caused by devm",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40319",
                            "    - bpf: Sync pending IRQ work before freeing ring buffer",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68182",
                            "    - wifi: iwlwifi: fix potential use after free in iwl_mld_remove_link()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68314",
                            "    - drm/msm: make sure last_fence is always updated",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68189",
                            "    - drm/msm: Fix GEM free for imported dma-bufs",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68171",
                            "    - x86/fpu: Ensure XFD state on signal delivery",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68313",
                            "    - x86/CPU/AMD: Add RDSEED fix for Zen5",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40320",
                            "    - smb: client: fix potential cfid UAF in smb2_query_info_compound",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40321",
                            "    - wifi: brcmfmac: fix crash while sending Action Frames in standalone AP",
                            "      Mode",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40322",
                            "    - fbdev: bitblit: bound-check glyph index in bit_putcs*",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40211",
                            "    - ACPI: video: Fix use-after-free in acpi_video_switch_brightness()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40323",
                            "    - fbcon: Set fb_display[i]->mode to NULL when the mode is released",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40210",
                            "    - Revert \"NFSD: Remove the cap on number of operations per NFSv4 COMPOUND\"",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40324",
                            "    - NFSD: Fix crash in nfsd4_read_release()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40326",
                            "    - NFSD: Define actions for the new time_deleg FATTR4 attributes",
                            "  * Questing update: v6.17.7 upstream stable release (LP: #2136813)",
                            "    - sched_ext: Move internal type and accessor definitions to ext_internal.h",
                            "    - sched_ext: Put event_stats_cpu in struct scx_sched_pcpu",
                            "    - sched_ext: Sync error_irq_work before freeing scx_sched",
                            "    - timekeeping: Fix aux clocks sysfs initialization loop bound",
                            "    - x86/bugs: Report correct retbleed mitigation status",
                            "    - x86/bugs: Qualify RETBLEED_INTEL_MSG",
                            "    - genirq/chip: Add buslock back in to irq_set_handler()",
                            "    - genirq/manage: Add buslock back in to __disable_irq_nosync()",
                            "    - genirq/manage: Add buslock back in to enable_irq()",
                            "    - audit: record fanotify event regardless of presence of rules",
                            "    - EDAC/ie31200: Add two more Intel Alder Lake-S SoCs for EDAC support",
                            "    - perf/x86/intel: Add ICL_FIXED_0_ADAPTIVE bit into INTEL_FIXED_BITS_MASK",
                            "    - perf: Use current->flags & PF_KTHREAD|PF_USER_WORKER instead of",
                            "      current->mm == NULL",
                            "    - perf: Have get_perf_callchain() return NULL if crosstask and user are",
                            "      set",
                            "    - perf: Skip user unwind if the task is a kernel thread",
                            "    - EDAC: Fix wrong executable file modes for C source files",
                            "    - seccomp: passthrough uprobe systemcall without filtering",
                            "    - sched_ext: Keep bypass on between enable failure and",
                            "      scx_disable_workfn()",
                            "    - x86/bugs: Add attack vector controls for VMSCAPE",
                            "    - x86/bugs: Fix reporting of LFENCE retpoline",
                            "    - EDAC/mc_sysfs: Increase legacy channel support to 16",
                            "    - cpuset: Use new excpus for nocpu error check when enabling root",
                            "      partition",
                            "    - btrfs: abort transaction on specific error places when walking log tree",
                            "    - btrfs: abort transaction in the process_one_buffer() log tree walk",
                            "      callback",
                            "    - btrfs: zoned: return error from btrfs_zone_finish_endio()",
                            "    - btrfs: zoned: refine extent allocator hint selection",
                            "    - btrfs: scrub: replace max_t()/min_t() with clamp() in",
                            "      scrub_throttle_dev_io()",
                            "    - btrfs: always drop log root tree reference in btrfs_replay_log()",
                            "    - btrfs: use level argument in log tree walk callback replay_one_buffer()",
                            "    - btrfs: abort transaction if we fail to update inode in log replay dir",
                            "      fixup",
                            "    - btrfs: tree-checker: add inode extref checks",
                            "    - btrfs: use smp_mb__after_atomic() when forcing COW in",
                            "      create_pending_snapshot()",
                            "    - sched_ext: Make qmap dump operation non-destructive",
                            "    - arch: Add the macro COMPILE_OFFSETS to all the asm-offsets.c",
                            "    - btrfs: tree-checker: fix bounds check in check_inode_extref()",
                            "    - Linux 6.17.7",
                            "  * [UBUNTU 24.04] KVM: s390: improve interrupt cpu for wakeup (LP: #2132317)",
                            "    - KVM: s390: improve interrupt cpu for wakeup",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982)",
                            "    - sched/fair: Block delayed tasks on throttled hierarchy during dequeue",
                            "    - vfio/cdx: update driver to build without CONFIG_GENERIC_MSI_IRQ",
                            "    - expfs: Fix exportfs_can_encode_fh() for EXPORT_FH_FID",
                            "    - cgroup/misc: fix misc_res_type kernel-doc warning",
                            "    - dlm: move to rinfo for all middle conversion cases",
                            "    - exec: Fix incorrect type for ret",
                            "    - s390/pkey: Forward keygenflags to ep11_unwrapkey",
                            "    - hfs: clear offset and space out of valid records in b-tree node",
                            "    - hfs: make proper initalization of struct hfs_find_data",
                            "    - hfs: validate record offset in hfsplus_bmap_alloc",
                            "    - hfsplus: fix KMSAN uninit-value issue in hfsplus_delete_cat()",
                            "    - dlm: check for defined force value in dlm_lockspace_release",
                            "    - hfsplus: return EIO when type of hidden directory mismatch in",
                            "      hfsplus_fill_super()",
                            "    - PCI: Test for bit underflow in pcie_set_readrq()",
                            "    - lkdtm: fortify: Fix potential NULL dereference on kmalloc failure",
                            "    - arm64: sysreg: Correct sign definitions for EIESB and DoubleLock",
                            "    - m68k: bitops: Fix find_*_bit() signatures",
                            "    - powerpc/32: Remove PAGE_KERNEL_TEXT to fix startup failure",
                            "    - riscv: mm: Return intended SATP mode for noXlvl options",
                            "    - riscv: mm: Use mmu-type from FDT to limit SATP mode",
                            "    - riscv: cpufeature: add validation for zfa, zfh and zfhmin",
                            "    - drivers/perf: hisi: Relax the event ID check in the framework",
                            "    - s390/mm: Use __GFP_ACCOUNT for user page table allocations",
                            "    - smb: client: queue post_recv_credits_work also if the peer raises the",
                            "      credit target",
                            "    - smb: client: limit the range of info->receive_credit_target",
                            "    - smb: client: make use of ib_wc_status_msg() and skip IB_WC_WR_FLUSH_ERR",
                            "      logging",
                            "    - smb: server: let smb_direct_flush_send_list() invalidate a remote key",
                            "      first",
                            "    - Unbreak 'make tools/*' for user-space targets",
                            "    - platform/mellanox: mlxbf-pmc: add sysfs_attr_init() to count_clock init",
                            "    - cpufreq/amd-pstate: Fix a regression leading to EPP 0 after hibernate",
                            "    - net/mlx5e: Return 1 instead of 0 in invalid case in",
                            "      mlx5e_mpwrq_umr_entry_size()",
                            "    - rtnetlink: Allow deleting FDB entries in user namespace",
                            "    - net: enetc: fix the deadlock of enetc_mdio_lock",
                            "    - net: enetc: correct the value of ENETC_RXB_TRUESIZE",
                            "    - dpaa2-eth: fix the pointer passed to PTR_ALIGN on Tx path",
                            "    - net: phy: realtek: fix rtl8221b-vm-cg name",
                            "    - can: bxcan: bxcan_start_xmit(): use can_dev_dropped_skb() instead of",
                            "      can_dropped_invalid_skb()",
                            "    - can: esd: acc_start_xmit(): use can_dev_dropped_skb() instead of",
                            "      can_dropped_invalid_skb()",
                            "    - can: rockchip-canfd: rkcanfd_start_xmit(): use can_dev_dropped_skb()",
                            "      instead of can_dropped_invalid_skb()",
                            "    - selftests: net: fix server bind failure in sctp_vrf.sh",
                            "    - net/mlx5e: RX, Fix generating skb from non-linear xdp_buff for legacy RQ",
                            "    - net/mlx5e: RX, Fix generating skb from non-linear xdp_buff for striding",
                            "      RQ",
                            "    - net/smc: fix general protection fault in __smc_diag_dump",
                            "    - net: ethernet: ti: am65-cpts: fix timestamp loss due to race conditions",
                            "    - arm64, mm: avoid always making PTE dirty in pte_mkwrite()",
                            "    - erofs: avoid infinite loops due to corrupted subpage compact indexes",
                            "    - net: hibmcge: select FIXED_PHY",
                            "    - ptp: ocp: Fix typo using index 1 instead of i in SMA initialization loop",
                            "    - net: hsr: prevent creation of HSR device with slaves from another netns",
                            "    - espintcp: use datagram_poll_queue for socket readiness",
                            "    - net: datagram: introduce datagram_poll_queue for custom receive queues",
                            "    - ovpn: use datagram_poll_queue for socket readiness in TCP",
                            "    - net: bonding: fix possible peer notify event loss or dup issue",
                            "    - hung_task: fix warnings caused by unaligned lock pointers",
                            "    - mm: don't spin in add_stack_record when gfp flags don't allow",
                            "    - dma-debug: don't report false positives with",
                            "      DMA_BOUNCE_UNALIGNED_KMALLOC",
                            "    - arch_topology: Fix incorrect error check in",
                            "      topology_parse_cpu_capacity()",
                            "    - riscv: hwprobe: Fix stale vDSO data for late-initialized keys at boot",
                            "    - io_uring/sqpoll: switch away from getrusage() for CPU accounting",
                            "    - io_uring/sqpoll: be smarter on when to update the stime usage",
                            "    - btrfs: send: fix duplicated rmdir operations when using extrefs",
                            "    - btrfs: ref-verify: fix IS_ERR() vs NULL check in btrfs_build_ref_tree()",
                            "    - gpio: pci-idio-16: Define maximum valid register address offset",
                            "    - gpio: 104-idio-16: Define maximum valid register address offset",
                            "    - xfs: fix locking in xchk_nlinks_collect_dir",
                            "    - platform/x86: alienware-wmi-wmax: Add AWCC support to Dell G15 5530",
                            "    - Revert \"cpuidle: menu: Avoid discarding useful information\"",
                            "    - riscv: cpufeature: avoid uninitialized variable in",
                            "      has_thead_homogeneous_vlenb()",
                            "    - rust: device: fix device context of Device::parent()",
                            "    - slab: Avoid race on slab->obj_exts in alloc_slab_obj_exts",
                            "    - slab: Fix obj_ext mistakenly considered NULL due to race condition",
                            "    - smb: client: get rid of d_drop() in cifs_do_rename()",
                            "    - ACPICA: Work around bogus -Wstringop-overread warning since GCC 11",
                            "    - arm64: mte: Do not warn if the page is already tagged in copy_highpage()",
                            "    - can: netlink: can_changelink(): allow disabling of automatic restart",
                            "    - cifs: Fix TCP_Server_Info::credits to be signed",
                            "    - devcoredump: Fix circular locking dependency with devcd->mutex.",
                            "    - hwmon: (pmbus/max34440) Update adpm12160 coeff due to latest FW",
                            "    - MIPS: Malta: Fix keyboard resource preventing i8042 driver from",
                            "      registering",
                            "    - rv: Make rtapp/pagefault monitor depends on CONFIG_MMU",
                            "    - net: bonding: update the slave array for broadcast mode",
                            "    - net: stmmac: dwmac-rk: Fix disabling set_clock_selection",
                            "    - net: usb: rtl8150: Fix frame padding",
                            "    - net: ravb: Enforce descriptor type ordering",
                            "    - net: ravb: Ensure memory write completes before ringing TX doorbell",
                            "    - mptcp: pm: in-kernel: C-flag: handle late ADD_ADDR",
                            "    - selftests: mptcp: join: mark 'flush re-add' as skipped if not supported",
                            "    - selftests: mptcp: join: mark implicit tests as skipped if not supported",
                            "    - selftests: mptcp: join: mark 'delete re-add signal' as skipped if not",
                            "      supported",
                            "    - mm/mremap: correctly account old mapping after MREMAP_DONTUNMAP remap",
                            "    - drm/xe: Check return value of GGTT workqueue allocation",
                            "    - drm/amd/display: increase max link count and fix link->enc NULL pointer",
                            "      access",
                            "    - mm/damon/core: use damos_commit_quota_goal() for new goal commit",
                            "    - mm/damon/core: fix list_add_tail() call on damon_call()",
                            "    - spi: rockchip-sfc: Fix DMA-API usage",
                            "    - firmware: arm_ffa: Add support for IMPDEF value in the memory access",
                            "      descriptor",
                            "    - spi: spi-nxp-fspi: add the support for sample data from DQS pad",
                            "    - spi: spi-nxp-fspi: re-config the clock rate when operation require new",
                            "      clock rate",
                            "    - spi: spi-nxp-fspi: add extra delay after dll locked",
                            "    - spi: spi-nxp-fspi: limit the clock rate for different sample clock",
                            "      source selection",
                            "    - spi: cadence-quadspi: Fix pm_runtime unbalance on dma EPROBE_DEFER",
                            "    - arm64: dts: broadcom: bcm2712: Add default GIC address cells",
                            "    - arm64: dts: broadcom: bcm2712: Define VGIC interrupt",
                            "    - include: trace: Fix inflight count helper on failed initialization",
                            "    - firmware: arm_scmi: Fix premature SCMI_XFER_FLAG_IS_RAW clearing in raw",
                            "      mode",
                            "    - spi: airoha: return an error for continuous mode dirmap creation cases",
                            "    - spi: airoha: add support of dual/quad wires spi modes to exec_op()",
                            "      handler",
                            "    - spi: airoha: switch back to non-dma mode in the case of error",
                            "    - spi: airoha: fix reading/writing of flashes with more than one plane per",
                            "      lun",
                            "    - sysfs: check visibility before changing group attribute ownership",
                            "    - RISC-V: Define pgprot_dmacoherent() for non-coherent devices",
                            "    - RISC-V: Don't print details of CPUs disabled in DT",
                            "    - riscv: hwprobe: avoid uninitialized variable use in hwprobe_arch_id()",
                            "    - hwmon: (pmbus/isl68137) Fix child node reference leak on early return",
                            "    - hwmon: (sht3x) Fix error handling",
                            "    - io_uring: fix incorrect unlikely() usage in io_waitid_prep()",
                            "    - nbd: override creds to kernel when calling sock_{send,recv}msg()",
                            "    - drm/panic: Fix drawing the logo on a small narrow screen",
                            "    - drm/panic: Fix qr_code, ensure vmargin is positive",
                            "    - drm/panic: Fix 24bit pixel crossing page boundaries",
                            "    - of/irq: Convert of_msi_map_id() callers to of_msi_xlate()",
                            "    - of/irq: Add msi-parent check to of_msi_xlate()",
                            "    - block: require LBA dma_alignment when using PI",
                            "    - gpio: ljca: Fix duplicated IRQ mapping",
                            "    - io_uring: correct __must_hold annotation in io_install_fixed_file",
                            "    - sched: Remove never used code in mm_cid_get()",
                            "    - USB: serial: option: add UNISOC UIS7720",
                            "    - USB: serial: option: add Quectel RG255C",
                            "    - USB: serial: option: add Telit FN920C04 ECM compositions",
                            "    - usb/core/quirks: Add Huawei ME906S to wakeup quirk",
                            "    - usb: raw-gadget: do not limit transfer length",
                            "    - xhci: dbc: enable back DbC in resume if it was enabled before suspend",
                            "    - xhci: dbc: fix bogus 1024 byte prefix if ttyDBC read races with stall",
                            "      event",
                            "    - x86/microcode: Fix Entrysign revision check for Zen1/Naples",
                            "    - binder: remove \"invalid inc weak\" check",
                            "    - mei: me: add wildcat lake P DID",
                            "    - objtool/rust: add one more `noreturn` Rust function",
                            "    - nvmem: rcar-efuse: add missing MODULE_DEVICE_TABLE",
                            "    - misc: fastrpc: Fix dma_buf object leak in fastrpc_map_lookup",
                            "    - most: usb: hdm_probe: Fix calling put_device() before device",
                            "      initialization",
                            "    - tcpm: switch check for role_sw device with fw_node",
                            "    - dt-bindings: serial: sh-sci: Fix r8a78000 interrupts",
                            "    - dt-bindings: usb: dwc3-imx8mp: dma-range is required only for imx8mp",
                            "    - dt-bindings: usb: qcom,snps-dwc3: Fix bindings for X1E80100",
                            "    - serial: 8250_dw: handle reset control deassert error",
                            "    - serial: 8250_exar: add support for Advantech 2 port card with Device ID",
                            "      0x0018",
                            "    - serial: 8250_mtk: Enable baud clock and manage in runtime PM",
                            "    - serial: sc16is7xx: remove useless enable of enhanced features",
                            "    - staging: gpib: Fix device reference leak in fmh_gpib driver",
                            "    - staging: gpib: Fix no EOI on 1 and 2 byte writes",
                            "    - staging: gpib: Return -EINTR on device clear",
                            "    - staging: gpib: Fix sending clear and trigger events",
                            "    - mm/migrate: remove MIGRATEPAGE_UNMAP",
                            "    - treewide: remove MIGRATEPAGE_SUCCESS",
                            "    - vmw_balloon: indicate success when effectively deflating during",
                            "      migration",
                            "    - xfs: always warn about deprecated mount options",
                            "    - gpio: regmap: Allow to allocate regmap-irq device",
                            "    - gpio: regmap: add the .fixed_direction_output configuration parameter",
                            "    - gpio: idio-16: Define fixed direction of the GPIO lines",
                            "    - Linux 6.17.6",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40084",
                            "    - ksmbd: transport_ipc: validate payload size before reading handle",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40222",
                            "    - tty: serial: sh-sci: fix RSCI FIFO overrun handling",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40223",
                            "    - most: usb: Fix use-after-free in hdm_disconnect",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40106",
                            "    - comedi: fix divide-by-zero in comedi_buf_munge()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40224",
                            "    - hwmon: (cgbc-hwmon) Add missing NULL check after devm_kzalloc()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40225",
                            "    - drm/panthor: Fix kernel panic on partial unmap of a GPU VA region",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40226",
                            "    - firmware: arm_scmi: Account for failed debug initialization",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40227",
                            "    - mm/damon/sysfs: dealloc commit test ctx always",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40228",
                            "    - mm/damon/sysfs: catch commit test ctx alloc failure",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40229",
                            "    - mm/damon/core: fix potential memory leak by cleaning ops_filter in",
                            "      damon_destroy_scheme",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40230",
                            "    - mm: prevent poison consumption when splitting THP",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40231",
                            "    - vsock: fix lock inversion in vsock_assign_transport()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40233",
                            "    - ocfs2: clear extent cache after moving/defragmenting extents",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40235",
                            "    - btrfs: directly free partially initialized fs_info in",
                            "      btrfs_check_leaked_roots()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40236",
                            "    - virtio-net: zero unused hash fields",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40237",
                            "    - fs/notify: call exportfs_encode_fid with s_umount",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40238",
                            "    - net/mlx5: Fix IPsec cleanup over MPV device",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40239",
                            "    - net: phy: micrel: always set shared->phydev for LAN8814",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40240",
                            "    - sctp: avoid NULL dereference when chunk data buffer is missing",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40241",
                            "    - erofs: fix crafted invalid cases for encoded extents",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40242",
                            "    - gfs2: Fix unlikely race in gdlm_put_lock",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40243",
                            "    - hfs: fix KMSAN uninit-value issue in hfs_find_set_zero_bits()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40244",
                            "    - hfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40245",
                            "    - nios2: ensure that memblock.current_limit is set when setting pfn limits",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557)",
                            "    - docs: kdoc: handle the obsolescensce of docutils.ErrorString()",
                            "    - Revert \"fs: make vfs_fileattr_[get|set] return -EOPNOTSUPP\"",
                            "    - PCI: vmd: Override irq_startup()/irq_shutdown() in",
                            "      vmd_init_dev_msi_info()",
                            "    - ata: libata-core: relax checks in ata_read_log_directory()",
                            "    - arm64/sysreg: Fix GIC CDEOI instruction encoding",
                            "    - ixgbevf: fix getting link speed data for E610 devices",
                            "    - rust: cfi: only 64-bit arm and x86 support CFI_CLANG",
                            "    - x86/CPU/AMD: Prevent reset reasons from being retained across reboot",
                            "    - slab: reset slab->obj_ext when freeing and it is OBJEXTS_ALLOC_FAIL",
                            "    - Revert \"io_uring/rw: drop -EOPNOTSUPP check in",
                            "      __io_complete_rw_common()\"",
                            "    - io_uring: protect mem region deregistration",
                            "    - Revert \"drm/amd/display: Only restore backlight after amdgpu_dm_init or",
                            "      dm_resume\"",
                            "    - r8152: add error handling in rtl8152_driver_init",
                            "    - net: usb: lan78xx: Fix lost EEPROM write timeout error(-ETIMEDOUT) in",
                            "      lan78xx_write_raw_eeprom",
                            "    - f2fs: fix wrong block mapping for multi-devices",
                            "    - gve: Check valid ts bit on RX descriptor before hw timestamping",
                            "    - jbd2: ensure that all ongoing I/O complete before freeing blocks",
                            "    - ext4: wait for ongoing I/O to complete before freeing blocks",
                            "    - btrfs: fix clearing of BTRFS_FS_RELOC_RUNNING if relocation already",
                            "      running",
                            "    - btrfs: fix memory leak on duplicated memory in the qgroup assign ioctl",
                            "    - btrfs: only set the device specific options after devices are opened",
                            "    - btrfs: fix incorrect readahead expansion length",
                            "    - can: gs_usb: gs_make_candev(): populate net_device->dev_port",
                            "    - can: gs_usb: increase max interface to U8_MAX",
                            "    - cxl/acpi: Fix setup of memory resource in cxl_acpi_set_cache_size()",
                            "    - ALSA: hda/intel: Add MSI X870E Tomahawk to denylist",
                            "    - ALSA: hda/realtek: Add quirk entry for HP ZBook 17 G6",
                            "    - drm/amdgpu: use atomic functions with memory barriers for vm fault info",
                            "    - drm/amdgpu: fix gfx12 mes packet status return check",
                            "    - drm/xe: Increase global invalidation timeout to 1000us",
                            "    - perf/core: Fix address filter match with backing files",
                            "    - perf/core: Fix MMAP event path names with backing files",
                            "    - perf/core: Fix MMAP2 event device with backing files",
                            "    - drm/amd: Check whether secure display TA loaded successfully",
                            "    - PM: hibernate: Add pm_hibernation_mode_is_suspend()",
                            "    - drm/amd: Fix hybrid sleep",
                            "    - usb: gadget: Store endpoint pointer in usb_request",
                            "    - usb: gadget: Introduce free_usb_request helper",
                            "    - HID: multitouch: fix sticky fingers",
                            "    - dax: skip read lock assertion for read-only filesystems",
                            "    - coredump: fix core_pattern input validation",
                            "    - can: m_can: m_can_plat_remove(): add missing pm_runtime_disable()",
                            "    - can: m_can: m_can_handle_state_errors(): fix CAN state transition to",
                            "      Error Active",
                            "    - can: m_can: m_can_chip_config(): bring up interface in correct state",
                            "    - can: m_can: fix CAN state in system PM",
                            "    - net: mtk: wed: add dma mask limitation and GFP_DMA32 for device with",
                            "      more than 4GB DRAM",
                            "    - net: dlink: handle dma_map_single() failure properly",
                            "    - doc: fix seg6_flowlabel path",
                            "    - can: j1939: add missing calls in NETDEV_UNREGISTER notification handler",
                            "    - dpll: zl3073x: Refactor DPLL initialization",
                            "    - dpll: zl3073x: Handle missing or corrupted flash configuration",
                            "    - r8169: fix packet truncation after S4 resume on RTL8168H/RTL8111H",
                            "    - net: phy: bcm54811: Fix GMII/MII/MII-Lite selection",
                            "    - net: phy: realtek: Avoid PHYCR2 access if PHYCR2 not present",
                            "    - amd-xgbe: Avoid spurious link down messages during interface toggle",
                            "    - Octeontx2-af: Fix missing error code in cgx_probe()",
                            "    - tcp: fix tcp_tso_should_defer() vs large RTT",
                            "    - net: airoha: Take into account out-of-order tx completions in",
                            "      airoha_dev_xmit()",
                            "    - selftests: net: check jq command is supported",
                            "    - net: core: fix lockdep splat on device unregister",
                            "    - ksmbd: fix recursive locking in RPC handle list access",
                            "    - tg3: prevent use of uninitialized remote_adv and local_adv variables",
                            "    - tls: trim encrypted message to match the plaintext on short splice",
                            "    - tls: wait for async encrypt in case of error during latter iterations of",
                            "      sendmsg",
                            "    - tls: always set record_type in tls_process_cmsg",
                            "    - tls: don't rely on tx_work during send()",
                            "    - netdevsim: set the carrier when the device goes up",
                            "    - net: usb: lan78xx: fix use of improperly initialized dev->chipid in",
                            "      lan78xx_reset",
                            "    - drm/panthor: Ensure MCU is disabled on suspend",
                            "    - nvme-multipath: Skip nr_active increments in RETRY disposition",
                            "    - riscv: kprobes: Fix probe address validation",
                            "    - drm/bridge: lt9211: Drop check for last nibble of version register",
                            "    - powerpc/fadump: skip parameter area allocation when fadump is disabled",
                            "    - ASoC: codecs: Fix gain setting ranges for Renesas IDT821034 codec",
                            "    - ASoC: nau8821: Cancel jdet_work before handling jack ejection",
                            "    - ASoC: nau8821: Generalize helper to clear IRQ status",
                            "    - ASoC: nau8821: Consistently clear interrupts before unmasking",
                            "    - ASoC: nau8821: Add DMI quirk to bypass jack debounce circuit",
                            "    - drm/i915/guc: Skip communication warning on reset in progress",
                            "    - drm/i915/frontbuffer: Move bo refcounting",
                            "      intel_frontbuffer_{get,release}()",
                            "    - drm/i915/fb: Fix the set_tiling vs. addfb race, again",
                            "    - drm/amdgpu: add ip offset support for cyan skillfish",
                            "    - drm/amdgpu: add support for cyan skillfish without IP discovery",
                            "    - drm/amdgpu: fix handling of harvesting for ip_discovery firmware",
                            "    - drm/amdgpu: handle wrap around in reemit handling",
                            "    - drm/amdgpu: set an error on all fences from a bad context",
                            "    - drm/amdgpu: drop unused structures in amdgpu_drm.h",
                            "    - drm/amd/powerplay: Fix CIK shutdown temperature",
                            "    - drm/xe: Enable media sampler power gating",
                            "    - drm/draw: fix color truncation in drm_draw_fill24",
                            "    - drm/rockchip: vop2: use correct destination rectangle height check",
                            "    - HID: intel-thc-hid: Intel-quickspi: switch first interrupt from level to",
                            "      edge detection",
                            "    - sched/fair: Fix pelt lost idle time detection",
                            "    - ALSA: firewire: amdtp-stream: fix enum kernel-doc warnings",
                            "    - accel/qaic: Synchronize access to DBC request queue head & tail pointer",
                            "    - nvme-auth: update sc_c in host response",
                            "    - cxl/trace: Subtract to find an hpa_alias0 in cxl_poison events",
                            "    - selftests/bpf: make arg_parsing.c more robust to crashes",
                            "    - blk-mq: fix stale tag depth for shared sched tags in",
                            "      blk_mq_update_nr_requests()",
                            "    - block: Remove elevator_lock usage from blkg_conf frozen operations",
                            "    - HID: hid-input: only ignore 0 battery events for digitizers",
                            "    - HID: multitouch: fix name of Stylus input devices",
                            "    - drm/xe/evict: drop bogus assert",
                            "    - selftests: arg_parsing: Ensure data is flushed to disk before reading.",
                            "    - nvme/tcp: handle tls partially sent records in write_space()",
                            "    - rust: cpufreq: fix formatting",
                            "    - arm64: debug: always unmask interrupts in el0_softstp()",
                            "    - arm64: cputype: Add Neoverse-V3AE definitions",
                            "    - arm64: errata: Apply workarounds for Neoverse-V3AE",
                            "    - xfs: rename the old_crc variable in xlog_recover_process",
                            "    - xfs: fix log CRC mismatches between i386 and other architectures",
                            "    - NFSD: Rework encoding and decoding of nfsd4_deviceid",
                            "    - NFSD: Minor cleanup in layoutcommit processing",
                            "    - NFSD: Implement large extent array support in pNFS",
                            "    - NFSD: Fix last write offset handling in layoutcommit",
                            "    - phy: cdns-dphy: Store hs_clk_rate and return it",
                            "    - phy: cadence: cdns-dphy: Fix PLL lock and O_CMN_READY polling",
                            "    - x86/resctrl: Refactor resctrl_arch_rmid_read()",
                            "    - x86/resctrl: Fix miscount of bandwidth event when reactivating",
                            "      previously unavailable RMID",
                            "    - cxl: Fix match_region_by_range() to use region_res_match_cxl_range()",
                            "    - phy: cadence: cdns-dphy: Update calibration wait time for startup state",
                            "      machine",
                            "    - drm/xe: Use devm_ioremap_wc for VRAM mapping and drop manual unmap",
                            "    - drm/xe: Use dynamic allocation for tile and device VRAM region",
                            "      structures",
                            "    - drm/xe: Move struct xe_vram_region to a dedicated header",
                            "    - drm/xe: Unify the initialization of VRAM regions",
                            "    - drm/xe: Move rebar to be done earlier",
                            "    - PM: hibernate: Fix pm_hibernation_mode_is_suspend() build breakage",
                            "    - drm/xe: Fix an IS_ERR() vs NULL bug in xe_tile_alloc_vram()",
                            "    - Linux 6.17.5",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40086",
                            "    - drm/xe: Don't allow evicting of BOs in same VM in array of VM binds",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40087",
                            "    - NFSD: Define a proc_layoutcommit for the FlexFiles layout type",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40088",
                            "    - hfsplus: fix slab-out-of-bounds read in hfsplus_strcasecmp()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40162",
                            "    - ASoC: amd/sdw_utils: avoid NULL deref when devm_kasprintf() fails",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40085",
                            "    - ALSA: usb-audio: Fix NULL pointer deference in try_to_register_card",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40172",
                            "    - accel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40177",
                            "    - accel/qaic: Fix bootlog initialization ordering",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40163",
                            "    - sched/deadline: Stop dl_server before CPU goes offline",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40174",
                            "    - x86/mm: Fix SMP ordering in switch_mm_irqs_off()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40089",
                            "    - cxl/features: Add check for no entries in cxl_feature_info",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40176",
                            "    - tls: wait for pending async decryptions if tls_strp_msg_hold fails",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40164",
                            "    - usbnet: Fix using smp_processor_id() in preemptible code warnings",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40091",
                            "    - ixgbe: fix too early devlink_free() in ixgbe_remove()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40175",
                            "    - idpf: cleanup remaining SKBs in PTP flows",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40173",
                            "    - net/ip6_tunnel: Prevent perpetual tunnel growth",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40092",
                            "    - usb: gadget: f_ncm: Refactor bind path to use __free()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40093",
                            "    - usb: gadget: f_ecm: Refactor bind path to use __free()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40094",
                            "    - usb: gadget: f_acm: Refactor bind path to use __free()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40095",
                            "    - usb: gadget: f_rndis: Refactor bind path to use __free()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40165",
                            "    - media: nxp: imx8-isi: m2m: Fix streaming cleanup on release",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40096",
                            "    - drm/sched: Fix potential double free in",
                            "      drm_sched_job_add_resv_dependencies",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40097",
                            "    - ALSA: hda: Fix missing pointer check in hda_component_manager_init",
                            "      function",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40098",
                            "    - ALSA: hda: cs35l41: Fix NULL pointer dereference in",
                            "      cs35l41_get_acpi_mute_state()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40099",
                            "    - cifs: parse_dfs_referrals: prevent oob on malformed input",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40100",
                            "    - btrfs: do not assert we found block group item when creating free space",
                            "      tree",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40101",
                            "    - btrfs: fix memory leaks when rejecting a non SINGLE data profile without",
                            "      an RST",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40167",
                            "    - ext4: detect invalid INLINE_DATA + EXTENTS flag combination",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40102",
                            "    - KVM: arm64: Prevent access to vCPU events before init",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40103",
                            "    - smb: client: Fix refcount leak for cifs_sb_tlink",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40104",
                            "    - ixgbevf: fix mailbox API compatibility by negotiating supported features",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40166",
                            "    - drm/xe/guc: Check GuC running state before deregistering exec queue",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40105",
                            "    - vfs: Don't leak disconnected dentries on umount",
                            "  * The machine didn’t go into suspend and got stuck (LP: #2132095)",
                            "    - platform/x86: alienware-wmi-wmax: Fix NULL pointer dereference in sleep",
                            "      handlers",
                            "  * CAP_PERFMON insufficient to get perf data (LP: #2131046)",
                            "    - SAUCE: perf/core: Allow CAP_PERFMON for paranoid level 4",
                            "  * Poweroff not working consistently after upgrading kernel 6.14.0-17.17 or",
                            "    later (LP: #2115860)",
                            "    - drm/amd: Unify shutdown() callback behavior",
                            "    - drm/amd: Stop exporting amdgpu_device_ip_suspend() outside amdgpu_device",
                            "    - drm/amd: Remove comment about handling errors in",
                            "      amdgpu_device_ip_suspend_phase1()",
                            "    - drm/amd: Don't always set IP block HW status to false",
                            "    - drm/amd: Pass IP suspend errors up to callers",
                            "    - drm/amd: Avoid evicting resources at S5",
                            "  * Re-enable INTEL_SKL_INT3472 for kernels >= 6.16 for Intel IPU camera",
                            "    (LP: #2128792)",
                            "    - Revert \"UBUNTU: [Config] FTBFS: disable INTEL_SKL_INT3472\"",
                            "    - Revert \"UBUNTU: SAUCE: platform/x86: int3472: Add handshake GPIO",
                            "      function\"",
                            "  * Support Samsung S5K3J1 sensor for Intel MIPI camera (LP: #2121852)",
                            "    - SAUCE: media: ipu-bridge: Support s5k3j1 sensor",
                            "  * Questing update: v6.17.4 upstream stable release (LP: #2131259)",
                            "    - fs: always return zero on success from replace_fd()",
                            "    - fscontext: do not consume log entries when returning -EMSGSIZE",
                            "    - btrfs: fix the incorrect max_bytes value for find_lock_delalloc_range()",
                            "    - arm64: map [_text, _stext) virtual address range non-executable+read-",
                            "      only",
                            "    - rseq: Protect event mask against membarrier IPI",
                            "    - statmount: don't call path_put() under namespace semaphore",
                            "    - listmount: don't call path_put() under namespace semaphore",
                            "    - clocksource/drivers/clps711x: Fix resource leaks in error paths",
                            "    - memcg: skip cgroup_file_notify if spinning is not allowed",
                            "    - page_pool: Fix PP_MAGIC_MASK to avoid crashing on some 32-bit arches",
                            "    - PM: runtime: Update kerneldoc return codes",
                            "    - dma-mapping: fix direction in dma_alloc direction traces",
                            "    - cpufreq: Make drivers using CPUFREQ_ETERNAL specify transition latency",
                            "    - nfsd: unregister with rpcbind when deleting a transport",
                            "    - KVM: x86: Add helper to retrieve current value of user return MSR",
                            "    - KVM: SVM: Emulate PERF_CNTR_GLOBAL_STATUS_SET for PerfMonV2",
                            "    - iio: frequency: adf4350: Fix ADF4350_REG3_12BIT_CLKDIV_MODE",
                            "    - media: v4l2-subdev: Fix alloc failure check in",
                            "      v4l2_subdev_call_state_try()",
                            "    - asm-generic/io.h: Skip trace helpers if rwmmio events are disabled",
                            "    - clk: npcm: select CONFIG_AUXILIARY_BUS",
                            "    - clk: thead: th1520-ap: describe gate clocks with clk_gate",
                            "    - clk: thead: th1520-ap: fix parent of padctrl0 clock",
                            "    - clk: thead: Correct parent for DPU pixel clocks",
                            "    - clk: renesas: r9a08g045: Add MSTOP for GPIO",
                            "    - perf disasm: Avoid undefined behavior in incrementing NULL",
                            "    - perf test trace_btf_enum: Skip if permissions are insufficient",
                            "    - perf evsel: Avoid container_of on a NULL leader",
                            "    - libperf event: Ensure tracing data is multiple of 8 sized",
                            "    - clk: qcom: common: Fix NULL vs IS_ERR() check in qcom_cc_icc_register()",
                            "    - clk: qcom: Select the intended config in QCS_DISPCC_615",
                            "    - perf parse-events: Handle fake PMUs in CPU terms",
                            "    - clk: at91: peripheral: fix return value",
                            "    - clk: renesas: cpg-mssr: Fix memory leak in cpg_mssr_reserved_init()",
                            "    - perf: Completely remove possibility to override MAX_NR_CPUS",
                            "    - perf drm_pmu: Fix fd_dir leaks in for_each_drm_fdinfo_in_dir()",
                            "    - perf util: Fix compression checks returning -1 as bool",
                            "    - rtc: x1205: Fix Xicor X1205 vendor prefix",
                            "    - rtc: optee: fix memory leak on driver removal",
                            "    - perf arm_spe: Correct setting remote access",
                            "    - perf arm_spe: Correct memory level for remote access",
                            "    - perf vendor events arm64 AmpereOneX: Fix typo - should be",
                            "      l1d_cache_access_prefetches",
                            "    - perf test: AMD IBS swfilt skip kernel tests if paranoia is >1",
                            "    - perf test shell lbr: Avoid failures with perf event paranoia",
                            "    - perf trace: Fix IS_ERR() vs NULL check bug",
                            "    - perf session: Fix handling when buffer exceeds 2 GiB",
                            "    - perf test: Don't leak workload gopipe in PERF_RECORD_*",
                            "    - perf evsel: Fix uniquification when PMU given without suffix",
                            "    - perf test: Avoid uncore_imc/clockticks in uniquification test",
                            "    - perf evsel: Ensure the fallback message is always written to",
                            "    - perf build-id: Ensure snprintf string is empty when size is 0",
                            "    - clk: mediatek: mt8195-infra_ao: Fix parent for infra_ao_hdmi_26m",
                            "    - clk: mediatek: clk-mux: Do not pass flags to",
                            "      clk_mux_determine_rate_flags()",
                            "    - clk: nxp: lpc18xx-cgu: convert from round_rate() to determine_rate()",
                            "    - clk: nxp: Fix pll0 rate check condition in LPC18xx CGU driver",
                            "    - clk: tegra: do not overallocate memory for bpmp clocks",
                            "    - nfsd: fix assignment of ia_ctime.tv_nsec on delegated mtime update",
                            "    - nfsd: ignore ATTR_DELEG when checking ia_valid before notify_change()",
                            "    - vfs: add ATTR_CTIME_SET flag",
                            "    - nfsd: use ATTR_CTIME_SET for delegated ctime updates",
                            "    - nfsd: track original timestamps in nfs4_delegation",
                            "    - nfsd: fix SETATTR updates for delegated timestamps",
                            "    - nfsd: fix timestamp updates in CB_GETATTR",
                            "    - tracing: Fix the bug where bpf_get_stackid returns -EFAULT on the ARM64",
                            "    - PM: core: Annotate loops walking device links as _srcu",
                            "    - PM: core: Add two macros for walking device links",
                            "    - PM: sleep: Do not wait on SYNC_STATE_ONLY device links",
                            "    - cpufreq: tegra186: Set target frequency for all cpus in policy",
                            "    - scsi: mvsas: Fix use-after-free bugs in mvs_work_queue",
                            "    - perf bpf-filter: Fix opts declaration on older libbpfs",
                            "    - scsi: ufs: sysfs: Make HID attributes visible",
                            "    - mshv: Handle NEED_RESCHED_LAZY before transferring to guest",
                            "    - perf bpf_counter: Fix handling of cpumap fixing hybrid",
                            "    - ASoC: SOF: ipc4-topology: Correct the minimum host DMA buffer size",
                            "    - ASoC: SOF: ipc4-topology: Account for different ChainDMA host buffer",
                            "      size",
                            "    - ASoC: SOF: Intel: hda-pcm: Place the constraint on period time instead",
                            "      of buffer time",
                            "    - LoongArch: Add cflag -fno-isolate-erroneous-paths-dereference",
                            "    - LoongArch: Fix build error for LTO with LLVM-18",
                            "    - LoongArch: Init acpi_gbl_use_global_lock to false",
                            "    - ASoC: SOF: Intel: Read the LLP via the associated Link DMA channel",
                            "    - net: usb: lan78xx: Fix lost EEPROM read timeout error(-ETIMEDOUT) in",
                            "      lan78xx_read_raw_eeprom",
                            "    - net/mlx4: prevent potential use after free in mlx4_en_do_uc_filter()",
                            "    - drm/xe/hw_engine_group: Fix double write lock release in error path",
                            "    - drm/xe/i2c: Don't rely on d3cold.allowed flag in system PM path",
                            "    - s390/cio: Update purge function to unregister the unused subchannels",
                            "    - drm/vmwgfx: Fix a null-ptr access in the cursor snooper",
                            "    - drm/vmwgfx: Fix Use-after-free in validation",
                            "    - drm/vmwgfx: Fix copy-paste typo in validation",
                            "    - net/sctp: fix a null dereference in sctp_disposition",
                            "      sctp_sf_do_5_1D_ce()",
                            "    - tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request().",
                            "    - net: mscc: ocelot: Fix use-after-free caused by cyclic delayed work",
                            "    - selftest: net: ovpn: Fix uninit return values",
                            "    - ice: ice_adapter: release xa entry on adapter allocation failure",
                            "    - net: fsl_pq_mdio: Fix device node reference leak in fsl_pq_mdio_probe",
                            "    - tools build: Align warning options with perf",
                            "    - perf python: split Clang options when invoking Popen",
                            "    - tcp: take care of zero tp->window_clamp in tcp_set_rcvlowat()",
                            "    - mailbox: zynqmp-ipi: Remove redundant mbox_controller_unregister() call",
                            "    - mailbox: zynqmp-ipi: Remove dev.parent check in zynqmp_ipi_free_mboxes",
                            "    - mailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop",
                            "    - mailbox: zynqmp-ipi: Fix SGI cleanup on unbind",
                            "    - bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}",
                            "    - net: mdio: mdio-i2c: Hold the i2c bus lock during smbus transactions",
                            "    - net: sparx5/lan969x: fix flooding configuration on bridge join/leave",
                            "    - net/mlx5: Prevent tunnel mode conflicts between FDB and NIC IPsec tables",
                            "    - net/mlx5e: Prevent tunnel reformat when tunnel mode not allowed",
                            "    - mailbox: mtk-cmdq: Remove pm_runtime APIs from cmdq_mbox_send_data()",
                            "    - drm/amdgpu: Add additional DCE6 SCL registers",
                            "    - drm/amd/display: Add missing DCE6 SCL_HORZ_FILTER_INIT* SRIs",
                            "    - drm/amd/display: Properly clear SCL_*_FILTER_CONTROL on DCE6",
                            "    - drm/amd/display: Properly disable scaling on DCE6",
                            "    - drm/amd/display: Disable scaling on DCE6 for now",
                            "    - drm/amdkfd: Fix kfd process ref leaking when userptr unmapping",
                            "    - net: pse-pd: tps23881: Fix current measurement scaling",
                            "    - crypto: skcipher - Fix reqsize handling",
                            "    - netfilter: nft_objref: validate objref and objrefmap expressions",
                            "    - bridge: br_vlan_fill_forward_path_pvid: use br_vlan_group_rcu()",
                            "    - selftests: netfilter: nft_fib.sh: fix spurious test failures",
                            "    - selftests: netfilter: query conntrack state to check for port clash",
                            "      resolution",
                            "    - io_uring/zcrx: increment fallback loop src offset",
                            "    - net: airoha: Fix loopback mode configuration for GDM2 port",
                            "    - cifs: Fix copy_to_iter return value check",
                            "    - smb: client: fix missing timestamp updates after utime(2)",
                            "    - rtc: isl12022: Fix initial enable_irq/disable_irq balance",
                            "    - cifs: Query EA $LXMOD in cifs_query_path_info() for WSL reparse points",
                            "    - tpm_tis: Fix incorrect arguments in tpm_tis_probe_irq_single",
                            "    - gpio: wcd934x: mark the GPIO controller as sleeping",
                            "    - bpf: Avoid RCU context warning when unpinning htab with internal structs",
                            "    - kbuild: always create intermediate vmlinux.unstripped",
                            "    - kbuild: keep .modinfo section in vmlinux.unstripped",
                            "    - kbuild: Restore pattern to avoid stripping .rela.dyn from vmlinux",
                            "    - kbuild: Add '.rel.*' strip pattern for vmlinux",
                            "    - s390: vmlinux.lds.S: Reorder sections",
                            "    - s390/vmlinux.lds.S: Move .vmlinux.info to end of allocatable sections",
                            "    - ACPICA: acpidump: drop ACPI_NONSTRING attribute from file_name",
                            "    - ACPI: property: Fix buffer properties extraction for subnodes",
                            "    - ACPI: TAD: Add missing sysfs_remove_group() for ACPI_TAD_RT",
                            "    - ACPICA: Debugger: drop ACPI_NONSTRING attribute from name_seg",
                            "    - ACPI: debug: fix signedness issues in read/write helpers",
                            "    - ACPI: battery: Add synchronization between interface updates",
                            "    - arm64: dts: qcom: msm8916: Add missing MDSS reset",
                            "    - arm64: dts: qcom: msm8939: Add missing MDSS reset",
                            "    - arm64: dts: qcom: sdm845: Fix slimbam num-channels/ees",
                            "    - Revert \"UBUNTU: SAUCE: arm64: dts: qcom: x1e80100-pmics: Disable pm8010",
                            "      by default\"",
                            "    - arm64: dts: qcom: x1e80100-pmics: Disable pm8010 by default",
                            "    - arm64: dts: ti: k3-am62a-main: Fix main padcfg length",
                            "    - arm64: dts: ti: k3-am62p: Fix supported hardware for 1GHz OPP",
                            "    - arm64: kprobes: call set_memory_rox() for kprobe page",
                            "    - arm64: mte: Do not flag the zero page as PG_mte_tagged",
                            "    - ARM: AM33xx: Implement TI advisory 1.0.36 (EMU0/EMU1 pins state on",
                            "      reset)",
                            "    - ARM: OMAP2+: pm33xx-core: ix device node reference leaks in",
                            "      amx3_idle_init",
                            "    - firmware: arm_scmi: quirk: Prevent writes to string constants",
                            "    - perf/arm-cmn: Fix CMN S3 DTM offset",
                            "    - KVM: s390: Fix to clear PTE when discarding a swapped page",
                            "    - KVM: arm64: Fix debug checking for np-guests using huge mappings",
                            "    - KVM: arm64: Fix page leak in user_mem_abort()",
                            "    - x86/kvm: Force legacy PCI hole to UC when overriding MTRRs for TDX/SNP",
                            "    - KVM: SVM: Re-load current, not host, TSC_AUX on #VMEXIT from SEV-ES",
                            "      guest",
                            "    - KVM: TDX: Fix uninitialized error code for __tdx_bringup()",
                            "    - dt-bindings: phy: rockchip-inno-csi-dphy: make power-domains non-",
                            "      required",
                            "    - xen: take system_transition_mutex on suspend",
                            "    - xen/events: Cleanup find_virq() return codes",
                            "    - xen/manage: Fix suspend error path",
                            "    - xen/events: Return -EEXIST for bound VIRQs",
                            "    - xen/events: Update virq_to_irq on migration",
                            "    - firmware: exynos-acpm: fix PMIC returned errno",
                            "    - firmware: meson_sm: fix device leak at probe",
                            "    - media: cec: extron-da-hd-4k-plus: drop external-module make commands",
                            "    - media: cx18: Add missing check after DMA map",
                            "    - media: i2c: mt9p031: fix mbus code initialization",
                            "    - media: i2c: mt9v111: fix incorrect type for ret",
                            "    - media: mc: Fix MUST_CONNECT handling for pads with no links",
                            "    - media: pci: ivtv: Add missing check after DMA map",
                            "    - media: pci: mg4b: fix uninitialized iio scan data",
                            "    - media: platform: mtk-mdp3: Add missing MT8188 compatible to comp_dt_ids",
                            "    - media: s5p-mfc: remove an unused/uninitialized variable",
                            "    - media: staging/ipu7: fix isys device runtime PM usage in firmware",
                            "      closing",
                            "    - media: uvcvideo: Avoid variable shadowing in uvc_ctrl_cleanup_fh",
                            "    - media: venus: firmware: Use correct reset sequence for IRIS2",
                            "    - media: venus: pm_helpers: add fallback for the opp-table",
                            "    - media: vivid: fix disappearing <Vendor Command With ID> messages",
                            "    - media: vsp1: Export missing vsp1_isp_free_buffer symbol",
                            "    - media: ti: j721e-csi2rx: Use devm_of_platform_populate",
                            "    - media: ti: j721e-csi2rx: Fix source subdev link creation",
                            "    - media: lirc: Fix error handling in lirc_register()",
                            "    - drm/exynos: exynos7_drm_decon: remove ctx->suspended",
                            "    - drm/panthor: Fix memory leak in panthor_ioctl_group_create()",
                            "    - drm/msm/a6xx: Fix PDC sleep sequence",
                            "    - drm/rcar-du: dsi: Fix 1/2/3 lane support",
                            "    - drm/nouveau: fix bad ret code in nouveau_bo_move_prep",
                            "    - drm/xe/uapi: loosen used tracking restriction",
                            "    - drm/amd/display: Incorrect Mirror Cositing",
                            "    - drm/amd/display: Enable Dynamic DTBCLK Switch",
                            "    - drm/amd/display: Fix unsafe uses of kernel mode FPU",
                            "    - blk-crypto: fix missing blktrace bio split events",
                            "    - btrfs: avoid potential out-of-bounds in btrfs_encode_fh()",
                            "    - bus: mhi: ep: Fix chained transfer handling in read path",
                            "    - bus: mhi: host: Do not use uninitialized 'dev' pointer in",
                            "      mhi_init_irq_setup()",
                            "    - cdx: Fix device node reference leak in cdx_msi_domain_init",
                            "    - clk: qcom: tcsrcc-x1e80100: Set the bi_tcxo as parent to eDP refclk",
                            "    - clk: samsung: exynos990: Use PLL_CON0 for PLL parent muxes",
                            "    - clk: samsung: exynos990: Fix CMU_TOP mux/div bit widths",
                            "    - clk: samsung: exynos990: Replace bogus divs with fixed-factor clocks",
                            "    - copy_sighand: Handle architectures where sizeof(unsigned long) <",
                            "      sizeof(u64)",
                            "    - cpufreq: CPPC: Avoid using CPUFREQ_ETERNAL as transition delay",
                            "    - cpufreq: intel_pstate: Fix object lifecycle issue in",
                            "      update_qos_request()",
                            "    - crypto: aspeed - Fix dma_unmap_sg() direction",
                            "    - crypto: atmel - Fix dma_unmap_sg() direction",
                            "    - crypto: rockchip - Fix dma_unmap_sg() nents value",
                            "    - eventpoll: Replace rwlock with spinlock",
                            "    - fbdev: Fix logic error in \"offb\" name match",
                            "    - fs/ntfs3: Fix a resource leak bug in wnd_extend()",
                            "    - fs: quota: create dedicated workqueue for quota_release_work",
                            "    - fsnotify: pass correct offset to fsnotify_mmap_perm()",
                            "    - fuse: fix possibly missing fuse_copy_finish() call in fuse_notify()",
                            "    - fuse: fix livelock in synchronous file put from fuseblk workers",
                            "    - gpio: mpfs: fix setting gpio direction to output",
                            "    - i3c: Fix default I2C adapter timeout value",
                            "    - iio/adc/pac1934: fix channel disable configuration",
                            "    - iio: dac: ad5360: use int type to store negative error codes",
                            "    - iio: dac: ad5421: use int type to store negative error codes",
                            "    - iio: frequency: adf4350: Fix prescaler usage.",
                            "    - iio: xilinx-ams: Fix AMS_ALARM_THR_DIRECT_MASK",
                            "    - iio: xilinx-ams: Unmask interrupts after updating alarms",
                            "    - init: handle bootloader identifier in kernel parameters",
                            "    - iio: imu: inv_icm42600: Simplify pm_runtime setup",
                            "    - iio: imu: inv_icm42600: Drop redundant pm_runtime reinitialization in",
                            "      resume",
                            "    - iio: imu: inv_icm42600: Avoid configuring if already pm_runtime",
                            "      suspended",
                            "    - iommu/vt-d: PRS isn't usable if PDS isn't supported",
                            "    - ipmi: Rework user message limit handling",
                            "    - ipmi:msghandler:Change seq_lock to a mutex",
                            "    - kernel/sys.c: fix the racy usage of task_lock(tsk->group_leader) in",
                            "      sys_prlimit64() paths",
                            "    - KEYS: trusted_tpm1: Compare HMAC values in constant time",
                            "    - kho: only fill kimage if KHO is finalized",
                            "    - lib/genalloc: fix device leak in of_gen_pool_get()",
                            "    - loop: fix backing file reference leak on validation error",
                            "    - md: fix mssing blktrace bio split events",
                            "    - of: unittest: Fix device reference count leak in",
                            "      of_unittest_pci_node_verify",
                            "    - openat2: don't trigger automounts with RESOLVE_NO_XDEV",
                            "    - padata: Reset next CPU when reorder sequence wraps around",
                            "    - parisc: don't reference obsolete termio struct for TC* constants",
                            "    - parisc: Remove spurious if statement from raw_copy_from_user()",
                            "    - nvme-pci: Add TUXEDO IBS Gen8 to Samsung sleep quirk",
                            "    - pinctrl: samsung: Drop unused S3C24xx driver data",
                            "    - PM: EM: Fix late boot with holes in CPU topology",
                            "    - PM: hibernate: Fix hybrid-sleep",
                            "    - PM: hibernate: Restrict GFP mask in power_down()",
                            "    - power: supply: max77976_charger: fix constant current reporting",
                            "    - powerpc/powernv/pci: Fix underflow and leak issue",
                            "    - powerpc/pseries/msi: Fix potential underflow and leak issue",
                            "    - pwm: berlin: Fix wrong register in suspend/resume",
                            "    - pwm: Fix incorrect variable used in error message",
                            "    - Revert \"ipmi: fix msg stack when IPMI is disconnected\"",
                            "    - sched/deadline: Fix race in push_dl_task()",
                            "    - scsi: hpsa: Fix potential memory leak in hpsa_big_passthru_ioctl()",
                            "    - scsi: sd: Fix build warning in sd_revalidate_disk()",
                            "    - sctp: Fix MAC comparison to be constant-time",
                            "    - smb client: fix bug with newly created file in cached dir",
                            "    - sparc64: fix hugetlb for sun4u",
                            "    - sparc: fix error handling in scan_one_device()",
                            "    - xtensa: simdisk: add input size check in proc_write_simdisk",
                            "    - xsk: Harden userspace-supplied xdp_desc validation",
                            "    - mtd: rawnand: fsmc: Default to autodetect buswidth",
                            "    - mtd: nand: raw: gpmi: fix clocks when CONFIG_PM=N",
                            "    - mmc: core: SPI mode remove cmd7",
                            "    - mmc: mmc_spi: multiple block read remove read crc ack",
                            "    - memory: samsung: exynos-srom: Fix of_iomap leak in exynos_srom_probe",
                            "    - memory: stm32_omm: Fix req2ack update test",
                            "    - rtc: interface: Ensure alarm irq is enabled when UIE is enabled",
                            "    - rtc: interface: Fix long-standing race when setting alarm",
                            "    - rseq/selftests: Use weak symbol reference, not definition, to link with",
                            "      glibc",
                            "    - PCI: xilinx-nwl: Fix ECAM programming",
                            "    - PCI: tegra: Convert struct tegra_msi mask_lock into raw spinlock",
                            "    - PCI/sysfs: Ensure devices are powered for config reads",
                            "    - PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV",
                            "    - PCI/ERR: Fix uevent on failure to recover",
                            "    - PCI/AER: Fix missing uevent on recovery when a reset is requested",
                            "    - PCI/AER: Support errors introduced by PCIe r6.0",
                            "    - PCI: Ensure relaxed tail alignment does not increase min_align",
                            "    - PCI: Fix failure detection during resource resize",
                            "    - PCI: j721e: Fix module autoloading",
                            "    - PCI: j721e: Fix programming sequence of \"strap\" settings",
                            "    - PCI: keystone: Use devm_request_irq() to free \"ks-pcie-error-irq\" on",
                            "      exit",
                            "    - PCI: rcar-gen4: Fix PHY initialization",
                            "    - PCI: rcar-host: Drop PMSR spinlock",
                            "    - PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock",
                            "    - PCI: tegra194: Fix broken tegra_pcie_ep_raise_msi_irq()",
                            "    - PCI: tegra194: Handle errors in BPMP response",
                            "    - PCI: tegra194: Reset BARs when running in PCIe endpoint mode",
                            "    - PCI/pwrctrl: Fix device leak at registration",
                            "    - PCI/pwrctrl: Fix device and OF node leak at bus scan",
                            "    - PCI/pwrctrl: Fix device leak at device stop",
                            "    - spi: cadence-quadspi: Flush posted register writes before INDAC access",
                            "    - spi: cadence-quadspi: Flush posted register writes before DAC access",
                            "    - spi: cadence-quadspi: Fix cqspi_setup_flash()",
                            "    - xfs: use deferred intent items for reaping crosslinked blocks",
                            "    - x86/fred: Remove ENDBR64 from FRED entry points",
                            "    - x86/umip: Check that the instruction opcode is at least two bytes",
                            "    - x86/umip: Fix decoding of register forms of 0F 01 (SGDT and SIDT",
                            "      aliases)",
                            "    - mptcp: pm: in-kernel: usable client side with C-flag",
                            "    - mptcp: reset blackhole on success with non-loopback ifaces",
                            "    - selftests: mptcp: join: validate C-flag + def limit",
                            "    - s390/cio/ioasm: Fix __xsch() condition code handling",
                            "    - s390/dasd: enforce dma_alignment to ensure proper buffer validation",
                            "    - s390/dasd: Return BLK_STS_INVAL for EINVAL from do_dasd_request",
                            "    - s390: Add -Wno-pointer-sign to KBUILD_CFLAGS_DECOMPRESSOR",
                            "    - slab: prevent warnings when slab obj_exts vector allocation fails",
                            "    - slab: mark slab->obj_exts allocation failures unconditionally",
                            "    - wifi: ath11k: HAL SRNG: don't deinitialize and re-initialize again",
                            "    - wifi: iwlwifi: Fix dentry reference leak in iwl_mld_add_link_debugfs",
                            "    - wifi: rtw89: avoid possible TX wait initialization race",
                            "    - wifi: mt76: mt7925u: Add VID/PID for Netgear A9000",
                            "    - wifi: mt76: mt7921u: Add VID/PID for Netgear A7500",
                            "    - mm/thp: fix MTE tag mismatch when replacing zero-filled subpages",
                            "    - mm/rmap: fix soft-dirty and uffd-wp bit loss when remapping zero-filled",
                            "      mTHP subpage to shared zeropage",
                            "    - mm/page_alloc: only set ALLOC_HIGHATOMIC for __GPF_HIGH allocations",
                            "    - mm/hugetlb: early exit from hugetlb_pages_alloc_boot() when",
                            "      max_huge_pages=0",
                            "    - mm/damon/vaddr: do not repeat pte_offset_map_lock() until success",
                            "    - mm/damon/lru_sort: use param_ctx for damon_attrs staging",
                            "    - nfsd: decouple the xprtsec policy check from check_nfsd_access()",
                            "    - NFSD: Fix destination buffer size in nfsd4_ssc_setup_dul()",
                            "    - nfsd: nfserr_jukebox in nlm_fopen should lead to a retry",
                            "    - media: iris: Call correct power off callback in cleanup path",
                            "    - media: iris: Fix firmware reference leak and unmap memory after load",
                            "    - media: iris: fix module removal if firmware download failed",
                            "    - media: iris: vpu3x: Add MNoC low power handshake during hardware power-",
                            "      off",
                            "    - media: iris: Fix port streaming handling",
                            "    - media: iris: Fix buffer count reporting in internal buffer check",
                            "    - media: iris: Allow substate transition to load resources during output",
                            "      streaming",
                            "    - media: iris: Always destroy internal buffers on firmware release",
                            "      response",
                            "    - media: iris: Simplify session stop logic by relying on vb2 checks",
                            "    - media: iris: Update vbuf flags before v4l2_m2m_buf_done",
                            "    - media: iris: Send dummy buffer address for all codecs during drain",
                            "    - media: iris: Fix missing LAST flag handling during drain",
                            "    - media: iris: Fix format check for CAPTURE plane in try_fmt",
                            "    - media: iris: Allow stop on firmware only if start was issued.",
                            "    - ext4: add ext4_sb_bread_nofail() helper function for",
                            "      ext4_free_branches()",
                            "    - ext4: fail unaligned direct IO write with EINVAL",
                            "    - ext4: verify orphan file size is not too big",
                            "    - ext4: increase i_disksize to offset + len in",
                            "      ext4_update_disksize_before_punch()",
                            "    - ext4: correctly handle queries for metadata mappings",
                            "    - ext4: avoid potential buffer over-read in parse_apply_sb_mount_options()",
                            "    - ext4: fix an off-by-one issue during moving extents",
                            "    - ext4: guard against EA inode refcount underflow in xattr update",
                            "    - ext4: validate ea_ino and size in check_xattrs",
                            "    - ACPICA: Allow to skip Global Lock initialization",
                            "    - ext4: free orphan info with kvfree",
                            "    - ipmi: Fix handling of messages with provided receive message pointer",
                            "    - Squashfs: add additional inode sanity checking",
                            "    - Squashfs: reject negative file sizes in squashfs_read_inode()",
                            "    - mm/ksm: fix incorrect KSM counter handling in mm_struct during fork",
                            "    - media: mc: Clear minor number before put device",
                            "    - arm64: dts: qcom: qcs615: add missing dt property in QUP SEs",
                            "    - ACPI: property: Disregard references in data-only subnode lists",
                            "    - ACPI: property: Add code comments explaining what is going on",
                            "    - ACPI: property: Do not pass NULL handles to acpi_attach_data()",
                            "    - irqchip/sifive-plic: Avoid interrupt ID 0 handling during suspend/resume",
                            "    - copy_file_range: limit size if in compat mode",
                            "    - minixfs: Verify inode mode when loading from disk",
                            "    - pid: Add a judgment for ns null in pid_nr_ns",
                            "    - fs: Add 'initramfs_options' to set initramfs mount options",
                            "    - cramfs: Verify inode mode when loading from disk",
                            "    - nsfs: validate extensible ioctls",
                            "    - mnt_ns_tree_remove(): DTRT if mnt_ns had never been added to mnt_ns_list",
                            "    - writeback: Avoid softlockup when switching many inodes",
                            "    - writeback: Avoid excessively long inode switching times",
                            "    - iomap: error out on file IO when there is no inline_data buffer",
                            "    - pidfs: validate extensible ioctls",
                            "    - mount: handle NULL values in mnt_ns_release()",
                            "    - Linux 6.17.4",
                            "  * Questing update: v6.17.4 upstream stable release (LP: #2131259) // Race",
                            "    condition in perf build causes build failure due to missing unistd_64.h",
                            "    header on arm64 (LP: #2131702)",
                            "    - perf tools: Fix arm64 libjvmti build by generating unistd_64.h",
                            "  * Questing update: v6.17.3 upstream stable release (LP: #2129610)",
                            "    - arch: copy_thread: pass clone_flags as u64",
                            "    - filelock: add FL_RECLAIM to show_fl_flags() macro",
                            "    - init: INITRAMFS_PRESERVE_MTIME should depend on BLK_DEV_INITRD",
                            "    - pid: use ns_capable_noaudit() when determining net sysctl permissions",
                            "    - Fix CC_HAS_ASM_GOTO_OUTPUT on non-x86 architectures",
                            "    - [Config]: Update CC configs for v6.17.3",
                            "    - seccomp: Fix a race with WAIT_KILLABLE_RECV if the tracer replies too",
                            "      fast",
                            "    - kbuild: Add missing $(objtree) prefix to powerpc crtsavres.o artifact",
                            "    - selftests: arm64: Check fread return value in exec_target",
                            "    - selftests: arm64: Fix -Waddress warning in tpidr2 test",
                            "    - kselftest/arm64/gcs: Correctly check return value when disabling GCS",
                            "    - hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()",
                            "    - gfs2: Fix GLF_INVALIDATE_IN_PROGRESS flag clearing in do_xmote",
                            "    - gfs2: Remove space before newline",
                            "    - gfs2: Further sanitize lock_dlm.c",
                            "    - gfs2: Fix LM_FLAG_TRY* logic in add_to_queue",
                            "    - gfs2: Remove duplicate check in do_xmote",
                            "    - gfs2: Get rid of GLF_INVALIDATE_IN_PROGRESS",
                            "    - gfs2: do_xmote cleanup",
                            "    - gfs2: Add proper lockspace locking",
                            "    - powerpc/8xx: Remove left-over instruction and comments in",
                            "      DataStoreTLBMiss handler",
                            "    - powerpc/603: Really copy kernel PGD entries into all PGDIRs",
                            "    - powerpc/ftrace: ensure ftrace record ops are always set for NOPs",
                            "    - powerpc64/modules: correctly iterate over stubs in",
                            "      setup_ftrace_ool_stubs",
                            "    - uprobes: uprobe_warn should use passed task",
                            "    - raid6: riscv: Clean up unused header file inclusion",
                            "    - coresight: trbe: Prevent overflow in PERF_IDX2OFF()",
                            "    - perf: arm_spe: Prevent overflow in PERF_IDX2OFF()",
                            "    - erofs: avoid reading more for fragment maps",
                            "    - smb: client: fix sending the iwrap custom IRD/ORD negotiation messages",
                            "    - smb: server: fix IRD/ORD negotiation with the client",
                            "    - perf/x86/intel: Use early_initcall() to hook bts_init()",
                            "    - perf/x86/intel: Fix IA32_PMC_x_CFG_B MSRs access error",
                            "    - x86/vdso: Fix output operand size of RDPID",
                            "    - selftests: cgroup: Make test_pids backwards compatible",
                            "    - sched/fair: Get rid of sched_domains_curr_level hack for tl->cpumask()",
                            "    - [Config]: Update CONFIG_SCHED_MC for v6.17.3",
                            "    - lsm: CONFIG_LSM can depend on CONFIG_SECURITY",
                            "    - cpuset: fix failure to enable isolated partition when containing",
                            "      isolcpus",
                            "    - btrfs: return any hit error from extent_writepage_io()",
                            "    - btrfs: fix symbolic link reading when bs > ps",
                            "    - pinctrl: renesas: rzg2l: Fix invalid unsigned return in rzg3s_oen_read()",
                            "    - arm64: dts: renesas: rzg2lc-smarc: Disable CAN-FD channel0",
                            "    - bpf: Tidy verifier bug message",
                            "    - regmap: Remove superfluous check for !config in __regmap_init()",
                            "    - selftests/bpf: Copy test_kmods when installing selftest",
                            "    - rust: cpumask: Mark CpumaskVar as transparent",
                            "    - bpf/selftests: Fix test_tcpnotify_user",
                            "    - bpf: Remove migrate_disable in kprobe_multi_link_prog_run",
                            "    - libbpf: Fix reuse of DEVMAP",
                            "    - tools/nolibc: fix error return value of clock_nanosleep()",
                            "    - ARM: dts: renesas: porter: Fix CAN pin group",
                            "    - leds: max77705: Function return instead of variable assignment",
                            "    - leds: flash: leds-qcom-flash: Update torch current clamp setting",
                            "    - s390/bpf: Do not write tail call counter into helper and kfunc frames",
                            "    - s390/bpf: Write back tail call counter for BPF_PSEUDO_CALL",
                            "    - s390/bpf: Write back tail call counter for BPF_TRAMP_F_CALL_ORIG",
                            "    - cpufreq: scmi: Account for malformed DT in scmi_dev_used_by_cpus()",
                            "    - arm64: dts: renesas: sparrow-hawk: Invert microSD voltage selector on",
                            "      EVTB1",
                            "    - arm64: dts: renesas: sparrow-hawk: Set VDDQ18_25_AVB voltage on EVTB1",
                            "    - libbpf: Export bpf_object__prepare symbol",
                            "    - firmware: arm_scmi: Mark VirtIO ready before registering",
                            "      scmi_virtio_driver",
                            "    - arm64: dts: imx93-kontron: Fix GPIO for panel regulator",
                            "    - arm64: dts: imx93-kontron: Fix USB port assignment",
                            "    - arm64: dts: imx95: Correct the lpuart7 and lpuart8 srcid",
                            "    - bpf: Remove preempt_disable in bpf_try_get_buffers",
                            "    - ACPI: processor: idle: Fix memory leak when register cpuidle device",
                            "      failed",
                            "    - genirq: Add irq_chip_(startup/shutdown)_parent()",
                            "    - PCI/MSI: Add startup/shutdown for per device domains",
                            "    - irqchip/sg2042-msi: Fix broken affinity setting",
                            "    - scripts/misc-check: update export checks for EXPORT_SYMBOL_FOR_MODULES()",
                            "    - soc: qcom: rpmh-rsc: Unconditionally clear _TRIGGER bit for TCS",
                            "    - pinctrl: meson-gxl: add missing i2c_d pinmux",
                            "    - blk-mq: check kobject state_in_sysfs before deleting in",
                            "      blk_mq_unregister_hctx",
                            "    - selftests/futex: Remove the -g parameter from futex_priv_hash",
                            "    - ARM: at91: pm: fix MCKx restore routine",
                            "    - arm64: dts: apple: t8103-j457: Fix PCIe ethernet iommu-map",
                            "    - regulator: scmi: Use int type to store negative error codes",
                            "    - selftests/futex: Fix some futex_numa_mpol subtests",
                            "    - tools/nolibc: avoid error in dup2() if old fd equals new fd",
                            "    - selftests/nolibc: fix EXPECT_NZ macro",
                            "    - leds: leds-lp55xx: Use correct address for memory programming",
                            "    - PCI/MSI: Check MSI_FLAG_PCI_MSI_MASK_PARENT in",
                            "      cond_[startup|shutdown]_parent()",
                            "    - block: use int to store blk_stack_limits() return value",
                            "    - ARM: dts: stm32: stm32mp151c-plyaqm: Use correct dai-format property",
                            "    - dt-bindings: vendor-prefixes: Add undocumented vendor prefixes",
                            "    - genirq/test: Fix depth tests on architectures with NOREQUEST by default.",
                            "    - genirq/test: Select IRQ_DOMAIN",
                            "    - genirq/test: Depend on SPARSE_IRQ",
                            "    - genirq/test: Drop CONFIG_GENERIC_IRQ_MIGRATION assumptions",
                            "    - genirq/test: Ensure CPU 1 is online for hotplug test",
                            "    - selftests/bpf: Fix count write in testapp_xdp_metadata_copy()",
                            "    - vdso/datastore: Gate time data behind CONFIG_GENERIC_GETTIMEOFDAY",
                            "    - PM: sleep: core: Clear power.must_resume in noirq suspend error path",
                            "    - blk-mq: fix elevator depth_updated method",
                            "    - vdso: Add struct __kernel_old_timeval forward declaration to gettime.h",
                            "    - ARM: dts: ti: omap: am335x-baltos: Fix ti,en-ck32k-xtal property in DTS",
                            "      to use correct boolean syntax",
                            "    - ARM: dts: ti: omap: omap3-devkit8000-lcd: Fix ti,keep-vref-on property",
                            "      to use correct boolean syntax in DTS",
                            "    - ARM: dts: omap: am335x-cm-t335: Remove unused mcasp num-serializer",
                            "      property",
                            "    - PM / devfreq: mtk-cci: Fix potential error pointer dereference in",
                            "      probe()",
                            "    - power: supply: cw2015: Fix a alignment coding style issue",
                            "    - hwmon: (asus-ec-sensors) Narrow lock for X870E-CREATOR WIFI",
                            "    - pinctrl: renesas: Use int type to store negative error codes",
                            "    - pinctrl: eswin: Fix regulator error check and Kconfig dependency",
                            "    - null_blk: Fix the description of the cache_size module argument",
                            "    - blk-throttle: fix access race during throttle policy activation",
                            "    - selftests: vDSO: Fix -Wunitialized in powerpc VDSO_CALL() wrapper",
                            "    - selftests: vDSO: vdso_test_abi: Correctly skip whole test with missing",
                            "      vDSO",
                            "    - irqchip/gic-v5: Fix loop in gicv5_its_create_itt_two_level() cleanup",
                            "      path",
                            "    - irqchip/gic-v5: Fix error handling in gicv5_its_irq_domain_alloc()",
                            "    - tick: Do not set device to detached state in tick_shutdown()",
                            "    - arm64: dts: mediatek: mt8195: Remove suspend-breaking reset from pcie0",
                            "    - arm64: dts: mediatek: mt8183: Fix out of range pull values",
                            "    - nbd: restrict sockets to TCP and UDP",
                            "    - PM / devfreq: rockchip-dfi: double count on RK3588",
                            "    - firmware: firmware: meson-sm: fix compile-test default",
                            "    - dts: arm: amlogic: fix pwm node for c3",
                            "    - soc: mediatek: mtk-svs: fix device leaks on mt8183 probe failure",
                            "    - soc: mediatek: mtk-svs: fix device leaks on mt8192 probe failure",
                            "    - cpuidle: qcom-spm: fix device and OF node leaks at probe",
                            "    - block: cleanup bio_issue",
                            "    - block: initialize bio issue time in blk_mq_submit_bio()",
                            "    - block: factor out a helper bio_submit_split_bioset()",
                            "    - block: skip unnecessary checks for split bio",
                            "    - block: fix ordering of recursive split IO",
                            "    - blk-mq: remove useless checkings in blk_mq_update_nr_requests()",
                            "    - blk-mq: check invalid nr_requests in queue_requests_store()",
                            "    - blk-mq: convert to serialize updating nr_requests with",
                            "      update_nr_hwq_lock",
                            "    - blk-mq: cleanup shared tags case in blk_mq_update_nr_requests()",
                            "    - blk-mq: split bitmap grow and resize case in blk_mq_update_nr_requests()",
                            "    - blk-mq-sched: add new parameter nr_requests in blk_mq_alloc_sched_tags()",
                            "    - blk-mq: fix potential deadlock while nr_requests grown",
                            "    - arm64: dts: allwinner: a527: cubie-a5e: Add ethernet PHY reset setting",
                            "    - arm64: dts: allwinner: t527: avaota-a1: Add ethernet PHY reset setting",
                            "    - arm64: dts: rockchip: Add RTC on rk3576-evb1-v10",
                            "    - arm64: dts: rockchip: Add WiFi on rk3576-evb1-v10",
                            "    - arm64: dts: rockchip: Fix network on rk3576 evb1 board",
                            "    - arm64: dts: ti: k3-j742s2-mcu-wakeup: Override firmware-name for MCU R5F",
                            "      cores",
                            "    - arm64: dts: ti: k3: Rename rproc reserved-mem nodes to 'memory@addr'",
                            "    - Revert \"arm64: dts: ti: k3-j721e-sk: Fix reversed C6x carveout",
                            "      locations\"",
                            "    - Revert \"arm64: dts: ti: k3-j721e-beagleboneai64: Fix reversed C6x",
                            "      carveout locations\"",
                            "    - arm64: dts: mediatek: mt8188: Change efuse fallback compatible to mt8186",
                            "    - arm64: dts: mediatek: mt8186-tentacruel: Fix touchscreen model",
                            "    - arm64: dts: ti: k3-pinctrl: Fix the bug in existing macros",
                            "    - arm64: dts: renesas: r9a09g047e57-smarc: Fix gpio key's pin control node",
                            "    - arm64: dts: mediatek: mt6331: Fix pmic, regulators, rtc, keys node names",
                            "    - mmc: core: Fix variable shadowing in mmc_route_rpmb_frames()",
                            "    - arm64: dts: mediatek: mt6795-xperia-m5: Fix mmc0 latch-ck value",
                            "    - arm64: dts: mediatek: mt7986a: Fix PCI-Express T-PHY node address",
                            "    - arm64: dts: mediatek: mt8395-kontron-i1200: Fix MT6360 regulator nodes",
                            "    - arm64: dts: mediatek: mt8516-pumpkin: Fix machine compatible",
                            "    - arm64: dts: allwinner: a527: cubie-a5e: Add LEDs",
                            "    - arm64: dts: allwinner: a527: cubie-a5e: Drop external 32.768 KHz crystal",
                            "    - arm64: dts: allwinner: t527: avaota-a1: hook up external 32k crystal",
                            "    - arm64: dts: allwinner: t527: orangepi-4a: hook up external 32k crystal",
                            "    - pwm: tiehrpwm: Don't drop runtime PM reference in .free()",
                            "    - pwm: tiehrpwm: Make code comment in .free() more useful",
                            "    - pwm: tiehrpwm: Fix various off-by-one errors in duty-cycle calculation",
                            "    - pwm: tiehrpwm: Fix corner case in clock divisor calculation",
                            "    - ACPICA: Apply ACPI_NONSTRING",
                            "    - ACPICA: Fix largest possible resource descriptor index",
                            "    - riscv, bpf: Sign extend struct ops return values properly",
                            "    - nvme-auth: update bi_directional flag",
                            "    - nvmet-fc: move lsop put work to nvmet_fc_ls_req_op",
                            "    - nvmet-fcloop: call done callback even when remote port is gone",
                            "    - nvme-tcp: send only permitted commands for secure concat",
                            "    - i3c: master: svc: Use manual response for IBI events",
                            "    - i3c: master: svc: Recycle unused IBI slot",
                            "    - block: update validation of atomic writes boundary for stacked devices",
                            "    - block: fix stacking of atomic writes when atomics are not supported",
                            "    - selftests: watchdog: skip ping loop if WDIOF_KEEPALIVEPING not supported",
                            "    - selftests/kselftest_harness: Add harness-selftest.expected to TEST_FILES",
                            "    - blk-throttle: fix throtl_data leak during disk release",
                            "    - bpf: Explicitly check accesses to bpf_sock_addr",
                            "    - mmc: select REGMAP_MMIO with MMC_LOONGSON2",
                            "    - selftests/futex: Fix futex_wait() for 32bit ARM",
                            "    - selftest/futex: Make the error check more precise for futex_numa_mpol",
                            "    - selftest/futex: Compile also with libnuma < 2.0.16",
                            "    - bpf: dont report verifier bug for missing bpf_scc_visit on speculative",
                            "      path",
                            "    - bpf, arm64: Call bpf_jit_binary_pack_finalize() in bpf_jit_free()",
                            "    - arm64: dts: apple: t600x: Add missing WiFi properties",
                            "    - arm64: dts: apple: t600x: Add bluetooth device nodes",
                            "    - arm64: dts: apple: Add ethernet0 alias for J375 template",
                            "    - selftests: always install UAPI headers to the correct directory",
                            "    - smp: Fix up and expand the smp_call_function_many() kerneldoc",
                            "    - mfd: max77705: max77705_charger: move active discharge setting to mfd",
                            "      parent",
                            "    - power: supply: max77705_charger: refactoring: rename charger to chg",
                            "    - power: supply: max77705_charger: use regfields for config registers",
                            "    - power: supply: max77705_charger: rework interrupts",
                            "    - tools/nolibc: make time_t robust if __kernel_old_time_t is missing in",
                            "      host headers",
                            "    - spi: fix return code when spi device has too many chipselects",
                            "    - clocksource/drivers/timer-tegra186: Avoid 64-bit divide operation",
                            "    - clocksource/drivers/tegra186: Avoid 64-bit division",
                            "    - bpf: Mark kfuncs as __noclone",
                            "    - once: fix race by moving DO_ONCE to separate section",
                            "    - hwmon: (mlxreg-fan) Separate methods of fan setting coming from",
                            "      different subsystems",
                            "    - tools/nolibc: add stdbool.h to nolibc includes",
                            "    - thermal/drivers/qcom: Make LMH select QCOM_SCM",
                            "    - thermal/drivers/qcom/lmh: Add missing IRQ includes",
                            "    - i2c: mediatek: fix potential incorrect use of I2C_MASTER_WRRD",
                            "    - i2c: spacemit: ensure bus release check runs when wait_bus_idle() fails",
                            "    - i2c: spacemit: remove stop function to avoid bus error",
                            "    - i2c: spacemit: disable SDA glitch fix to avoid restart delay",
                            "    - i2c: spacemit: check SDA instead of SCL after bus reset",
                            "    - i2c: spacemit: ensure SDA is released after bus reset",
                            "    - i2c: designware: Fix clock issue when PM is disabled",
                            "    - i2c: designware: Add disabling clocks when probe fails",
                            "    - libbpf: Fix error when st-prefix_ops and ops from differ btf",
                            "    - bpf: Enforce expected_attach_type for tailcall compatibility",
                            "    - i3c: fix big-endian FIFO transfers",
                            "    - mfd: max77705: Setup the core driver as an interrupt controller",
                            "    - drm/sched: Fix a race in DRM_GPU_SCHED_STAT_NO_HANG test",
                            "    - drm/panel-edp: Add disable to 100ms for MNB601LS1-4",
                            "    - drm/display: bridge-connector: correct CEC bridge pointers in",
                            "      drm_bridge_connector_init",
                            "    - drm/panel-edp: Add 50ms disable delay for four panels",
                            "    - drm/vmwgfx: fix missing assignment to ts",
                            "    - drm/amd/display: Reduce Stack Usage by moving 'audio_output' into",
                            "      'stream_res' v4",
                            "    - drm/panel: novatek-nt35560: Fix invalid return value",
                            "    - drm/amdgpu: fix link error for !PM_SLEEP",
                            "    - drm/amdgpu: Fix jpeg v4.0.3 poison irq call trace on sriov guest",
                            "    - drm/amdgpu: Fix vcn v4.0.3 poison irq call trace on sriov guest",
                            "    - PCI: endpoint: pci-ep-msi: Fix NULL vs IS_ERR() check in",
                            "      pci_epf_write_msi_msg()",
                            "    - PCI: xgene-msi: Return negative -EINVAL in xgene_msi_handler_setup()",
                            "    - drm/radeon/r600_cs: clean up of dead code in r600_cs",
                            "    - f2fs: fix condition in __allow_reserved_blocks()",
                            "    - f2fs: fix to avoid overflow while left shift operation",
                            "    - f2fs: fix to zero data after EOF for compressed file correctly",
                            "    - drm/bridge: it6505: select REGMAP_I2C",
                            "    - wifi: rtw88: Lock rtwdev->mutex before setting the LED",
                            "    - HID: steelseries: refactor probe() and remove()",
                            "    - media: zoran: Remove zoran_fh structure",
                            "    - phy: rockchip: naneng-combphy: Enable U3 OTG port for RK3568",
                            "    - drm/bridge: cdns-dsi: Fix the _atomic_check()",
                            "    - usb: host: max3421-hcd: Fix error pointer dereference in probe cleanup",
                            "    - usb: misc: qcom_eud: Access EUD_MODE_MANAGER2 through secure calls",
                            "    - PCI/pwrctrl: Fix double cleanup on devm_add_action_or_reset() failure",
                            "    - misc: pci_endpoint_test: Fix array underflow in",
                            "      pci_endpoint_test_ioctl()",
                            "    - serial: max310x: Add error checking in probe()",
                            "    - drm/amd/display: Remove redundant semicolons",
                            "    - drm/amd/display: Add NULL pointer checks in dc_stream cursor attribute",
                            "      functions",
                            "    - crypto: keembay - Add missing check after sg_nents_for_len()",
                            "    - hwrng: nomadik - add ARM_AMBA dependency",
                            "    - docs: iio: ad3552r: Fix malformed code-block directive",
                            "    - fwctl/mlx5: Fix memory alloc/free in mlx5ctl_fw_rpc()",
                            "    - scsi: pm80xx: Restore support for expanders",
                            "    - scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod",
                            "    - scsi: libsas: Add dev_parent_is_expander() helper",
                            "    - scsi: pm80xx: Use dev_parent_is_expander() helper",
                            "    - scsi: pm80xx: Add helper function to get the local phy id",
                            "    - scsi: pm80xx: Fix pm8001_abort_task() for chip_8006 when using an",
                            "      expander",
                            "    - mptcp: Fix up subflow's memcg when CONFIG_SOCK_CGROUP_DATA=n.",
                            "    - scsi: myrs: Fix dma_alloc_coherent() error check",
                            "    - f2fs: fix to clear unusable_cap for checkpoint=enable",
                            "    - f2fs: fix to avoid NULL pointer dereference in",
                            "      f2fs_check_quota_consistency()",
                            "    - f2fs: fix to allow removing qf_name",
                            "    - Revert \"UBUNTU: SAUCE: drm/dp: drm_edp_backlight_set_level: do not",
                            "      always send 3-byte commands\"",
                            "    - drm/dp: drm_edp_backlight_set_level: do not always send 3-byte commands",
                            "    - crypto: octeontx2 - Call strscpy() with correct size argument",
                            "    - drm: re-allow no-op changes on non-primary planes in async flips",
                            "    - media: rj54n1cb0c: Fix memleak in rj54n1_probe()",
                            "    - media: staging/ipu7: convert to use pci_alloc_irq_vectors() API",
                            "    - media: staging/ipu7: Don't set name for IPU7 PCI device",
                            "    - media: staging/ipu7: cleanup the MMU correctly in IPU7 driver release",
                            "    - media: i2c: vd55g1: Fix duster register address",
                            "    - drm/panel: Allow powering on panel follower after panel is enabled",
                            "    - HID: i2c-hid: Make elan touch controllers power on after panel is",
                            "      enabled",
                            "    - RDMA/mlx5: Better estimate max_qp_wr to reflect WQE count",
                            "    - RDMA/mlx5: Fix vport loopback forcing for MPV device",
                            "    - wifi: rtw88: Use led->brightness_set_blocking for PCI too",
                            "    - net: phy: introduce phy_id_compare_vendor() PHY ID helper",
                            "    - net: phy: as21xxx: better handle PHY HW reset on soft-reboot",
                            "    - PCI: rcar-host: Pass proper IRQ domain to generic_handle_domain_irq()",
                            "    - fuse: remove unneeded offset assignment when filling write pages",
                            "    - PCI: qcom: Restrict port parsing only to PCIe bridge child nodes",
                            "    - cdx: don't select CONFIG_GENERIC_MSI_IRQ",
                            "    - PCI/ACPI: Fix pci_acpi_preserve_config() memory leak",
                            "    - HID: i2c-hid: Fix test in i2c_hid_core_register_panel_follower()",
                            "    - ALSA: lx_core: use int type to store negative error codes",
                            "    - media: st-delta: avoid excessive stack usage",
                            "    - drm/amdgpu/vcn: Add regdump helper functions",
                            "    - drm/amdgpu/vcn: Hold pg_lock before vcn power off",
                            "    - drm/amdgpu: Check vcn state before profile switch",
                            "    - accel/amdxdna: Use int instead of u32 to store error codes",
                            "    - efi: Explain OVMF acronym in OVMF_DEBUG_LOG help text",
                            "    - net: dst: introduce dst->dev_rcu",
                            "    - ipv6: mcast: Add ip6_mc_find_idev() helper",
                            "    - ipv6: start using dst_dev_rcu()",
                            "    - ipv6: use RCU in ip6_xmit()",
                            "    - ipv6: use RCU in ip6_output()",
                            "    - net: use dst_dev_rcu() in sk_setup_caps()",
                            "    - tcp_metrics: use dst_dev_net_rcu()",
                            "    - ipv4: start using dst_dev_rcu()",
                            "    - crypto: hisilicon/zip - remove unnecessary validation for high-",
                            "      performance mode configurations",
                            "    - crypto: hisilicon - re-enable address prefetch after device resuming",
                            "    - crypto: hisilicon - check the sva module status while enabling or",
                            "      disabling address prefetch",
                            "    - crypto: hisilicon/qm - check whether the input function and PF are on",
                            "      the same device",
                            "    - crypto: hisilicon/qm - request reserved interrupt for virtual function",
                            "    - inet: ping: check sock_net() in ping_get_port() and ping_lookup()",
                            "    - dmaengine: Fix dma_async_tx_descriptor->tx_submit documentation",
                            "    - coresight: trbe: Add ISB after TRBLIMITR write",
                            "    - coresight: Fix missing include for FIELD_GET",
                            "    - coresight: Only register perf symlink for sinks with alloc_buffer",
                            "    - drm/amdgpu: Power up UVD 3 for FW validation (v2)",
                            "    - drm/amd/pm: Disable ULV even if unsupported (v3)",
                            "    - drm/amd/pm: Fix si_upload_smc_data (v3)",
                            "    - drm/amd/pm: Adjust si_upload_smc_data register programming (v3)",
                            "    - drm/amd/pm: Treat zero vblank time as too short in si_dpm (v3)",
                            "    - drm/amd/pm: Disable MCLK switching with non-DC at 120 Hz+ (v2)",
                            "    - drm/amd/pm: Disable SCLK switching on Oland with high pixel clocks (v3)",
                            "    - wifi: mac80211: Make CONNECTION_MONITOR optional for MLO sta",
                            "    - wifi: mwifiex: send world regulatory domain to driver",
                            "    - wifi: brcmfmac: fix 43752 SDIO FWVID incorrectly labelled as Cypress",
                            "      (CYW)",
                            "    - drm/msm: Do not validate SSPP when it is not ready",
                            "    - PCI: tegra: Fix devm_kcalloc() argument order for port->phys allocation",
                            "    - wifi: mac80211: consider links for validating SCAN_FLAG_AP in scan",
                            "      request during MLO",
                            "    - PCI: qcom: Add equalization settings for 8.0 GT/s and 32.0 GT/s",
                            "    - tcp: fix __tcp_close() to only send RST when required",
                            "    - fanotify: Validate the return value of mnt_ns_from_dentry() before",
                            "      dereferencing",
                            "    - drm/amdkfd: Fix error code sign for EINVAL in svm_ioctl()",
                            "    - usb: phy: twl6030: Fix incorrect type for ret",
                            "    - usb: gadget: configfs: Correctly set use_os_string at bind",
                            "    - tty: n_gsm: Don't block input queue by waiting MSC",
                            "    - misc: genwqe: Fix incorrect cmd field being reported in error",
                            "    - pps: fix warning in pps_register_cdev when register device fail",
                            "    - drm/msm: Fix obj leak in VM_BIND error path",
                            "    - drm/msm: Fix missing VM_BIND offset/range validation",
                            "    - wifi: iwlwifi: Remove redundant header files",
                            "    - drm/msm/mdp4: stop supporting no-IOMMU configuration",
                            "    - drm/msm: stop supporting no-IOMMU configuration",
                            "    - idpf: fix Rx descriptor ready check barrier in splitq",
                            "    - ASoC: Intel: bytcht_es8316: Fix invalid quirk input mapping",
                            "    - ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping",
                            "    - ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping",
                            "    - ipv6: snmp: do not use SNMP_MIB_SENTINEL anymore",
                            "    - ipv6: snmp: do not track per idev ICMP6_MIB_RATELIMITHOST",
                            "    - drm/msm: Fix bootup splat with separate_gpu_drm modparam",
                            "    - drm/msm/dpu: fix incorrect type for ret",
                            "    - wifi: mac80211: fix reporting of all valid links in sta_set_sinfo()",
                            "    - fs: ntfs3: Fix integer overflow in run_unpack()",
                            "    - fs/ntfs3: reject index allocation if $BITMAP is empty but blocks exist",
                            "    - iio: consumers: Fix handling of negative channel scale in",
                            "      iio_convert_raw_to_processed()",
                            "    - iio: consumers: Fix offset handling in iio_convert_raw_to_processed()",
                            "    - mm/slub: Fix cmp_loc_by_count() to return 0 when counts are equal",
                            "    - tools: ynl: fix undefined variable name",
                            "    - RDMA/mlx5: Fix page size bitmap calculation for KSM mode",
                            "    - netfilter: ipset: Remove unused htable_bits in macro ahash_region",
                            "    - ipvs: Use READ_ONCE/WRITE_ONCE for ipvs->enable",
                            "    - HID: steelseries: Fix STEELSERIES_SRWS1 handling in steelseries_remove()",
                            "    - watchdog: intel_oc_wdt: Do not try to write into const memory",
                            "    - watchdog: mpc8xxx_wdt: Reload the watchdog timer when enabling the",
                            "      watchdog",
                            "    - PCI: endpoint: pci-epf-test: Fix doorbell test support",
                            "    - drivers/base/node: handle error properly in register_one_node()",
                            "    - RDMA/cm: Rate limit destroy CM ID timeout error message",
                            "    - wifi: mt76: mt7996: Fix mt7996_mcu_sta_ba wcid configuration",
                            "    - wifi: mt76: mt7996: Fix mt7996_mcu_bss_mld_tlv routine",
                            "    - wifi: mt76: fix potential memory leak in mt76_wmac_probe()",
                            "    - wifi: mt76: mt7996: Use proper link_id in link_sta_rc_update callback",
                            "    - wifi: mt76: mt7996: Check phy before init msta_link in",
                            "      mt7996_mac_sta_add_links()",
                            "    - wifi: mt76: mt7996: Fix tx-queues initialization for second phy on",
                            "      mt7996",
                            "    - wifi: mt76: mt7996: Fix RX packets configuration for primary WED device",
                            "    - wifi: mt76: mt7996: Convert mt7996_wed_rro_addr to LE",
                            "    - wifi: mt76: mt7915: fix mt7981 pre-calibration",
                            "    - wifi: mt76: mt7996: remove redundant per-phy mac80211 calls during",
                            "      restart",
                            "    - ASoC: Intel: hda-sdw-bpt: set persistent_buffer false",
                            "    - srcu/tiny: Remove preempt_disable/enable() in srcu_gp_start_if_needed()",
                            "    - drm/amdgpu: Fix allocating extra dwords for rings (v2)",
                            "    - f2fs: fix to update map->m_next_extent correctly in f2fs_map_blocks()",
                            "    - f2fs: fix to truncate first page in error path of f2fs_truncate()",
                            "    - f2fs: fix to avoid migrating empty section",
                            "    - f2fs: fix to mitigate overhead of f2fs_zero_post_eof_page()",
                            "    - RISC-V: KVM: Write hgatp register with valid mode bits",
                            "    - ALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on",
                            "      PREEMPT_RT",
                            "    - ACPI: NFIT: Fix incorrect ndr_desc being reportedin dev_err message",
                            "    - scsi: qla2xxx: edif: Fix incorrect sign of error code",
                            "    - scsi: qla2xxx: Fix incorrect sign of error code in START_SP_W_RETRIES()",
                            "    - scsi: qla2xxx: Fix incorrect sign of error code in qla_nvme_xmt_ls_rsp()",
                            "    - HID: hidraw: tighten ioctl command parsing",
                            "    - f2fs: fix zero-sized extent for precache extents",
                            "    - smc: Fix use-after-free in __pnet_find_base_ndev().",
                            "    - smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().",
                            "    - smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().",
                            "    - smc: Use __sk_dst_get() and dst_dev_rcu() in smc_vlan_by_tcpsk().",
                            "    - tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().",
                            "    - mptcp: Call dst_release() in mptcp_active_enable().",
                            "    - mptcp: Use __sk_dst_get() and dst_dev_rcu() in mptcp_active_enable().",
                            "    - Revert \"usb: xhci: Avoid Stop Endpoint retry loop if the endpoint seems",
                            "      Running\"",
                            "    - RDMA/core: Resolve MAC of next-hop device without ARP support",
                            "    - IB/sa: Fix sa_local_svc_timeout_ms read race",
                            "    - Documentation: trace: historgram-design: Separate sched_waking histogram",
                            "      section heading and the following diagram",
                            "    - ASoC: SOF: ipc4-pcm: Fix incorrect comparison with number of tdm_slots",
                            "    - wifi: ath12k: initialize eirp_power before use",
                            "    - wifi: ath12k: fix overflow warning on num_pwr_levels",
                            "    - wifi: ath12k: fix signal in radiotap for WCN7850",
                            "    - wifi: ath12k: fix HAL_PHYRX_COMMON_USER_INFO handling in monitor mode",
                            "    - wifi: ath12k: fix the fetching of combined rssi",
                            "    - wifi: ath12k: Add fallback for invalid channel number in PHY metadata",
                            "    - wifi: ath12k: fix wrong logging ID used for CE",
                            "    - wifi: ath10k: avoid unnecessary wait for service ready message",
                            "    - iommu/vt-d: debugfs: Fix legacy mode page table dump logic",
                            "    - wifi: mac80211: fix Rx packet handling when pubsta information is not",
                            "      available",
                            "    - ASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback",
                            "    - sparc: fix accurate exception reporting in copy_{from_to}_user for",
                            "      UltraSPARC",
                            "    - sparc: fix accurate exception reporting in copy_{from_to}_user for",
                            "      UltraSPARC III",
                            "    - sparc: fix accurate exception reporting in copy_{from_to}_user for",
                            "      Niagara",
                            "    - sparc: fix accurate exception reporting in copy_to_user for Niagara 4",
                            "    - sparc: fix accurate exception reporting in copy_{from,to}_user for M7",
                            "    - vfio/pds: replace bitmap_free with vfree",
                            "    - crypto: comp - Use same definition of context alloc and free ops",
                            "    - crypto: hisilicon/qm - set NULL to qm->debug.qm_diff_regs",
                            "    - wifi: ath12k: Fix peer lookup in ath12k_dp_mon_rx_deliver_msdu()",
                            "    - rpmsg: qcom_smd: Fix fallback to qcom,ipc parse",
                            "    - remoteproc: qcom_q6v5_mss: support loading MBN file on msm8974",
                            "    - RDMA/rxe: Fix race in do_task() when draining",
                            "    - selftests/mm: fix va_high_addr_switch.sh failure on x86_64",
                            "    - wifi: rtw89: fix leak in rtw89_core_send_nullfunc()",
                            "    - wifi: rtw89: avoid circular locking dependency in ser_state_run()",
                            "    - PCI: tegra194: Fix duplicate PLL disable in",
                            "      pex_ep_event_pex_rst_assert()",
                            "    - remoteproc: qcom: q6v5: Avoid disabling handover IRQ twice",
                            "    - remoteproc: qcom: pas: Shutdown lite ADSP DTB on X1E",
                            "    - wifi: ath12k: Refactor RX TID deletion handling into helper function",
                            "    - wifi: ath12k: Fix flush cache failure during RX queue update",
                            "    - wifi: cfg80211: fix width unit in cfg80211_radio_chandef_valid()",
                            "    - dm vdo: return error on corrupted metadata in start_restoring_volume",
                            "      functions",
                            "    - coresight: fix indentation error in cscfg_remove_owned_csdev_configs()",
                            "    - coresight-etm4x: Conditionally access register TRCEXTINSELR",
                            "    - coresight: tmc: Support atclk",
                            "    - coresight: catu: Support atclk",
                            "    - coresight: etm4x: Support atclk",
                            "    - coresight: Appropriately disable programming clocks",
                            "    - coresight: Appropriately disable trace bus clocks",
                            "    - coresight: Avoid enable programming clock duplicately",
                            "    - coresight: trbe: Return NULL pointer for allocation failures",
                            "    - coresight: tpda: fix the logic to setup the element size",
                            "    - coresight: Fix incorrect handling for return value of devm_kzalloc",
                            "    - NFSv4.1: fix backchannel max_resp_sz verification check",
                            "    - net: ethtool: tsconfig: set command must provide a reply",
                            "    - netfilter: nfnetlink: reset nlh pointer during batch replay",
                            "    - netfilter: nf_conntrack: do not skip entries in /proc/net/nf_conntrack",
                            "    - scsi: ufs: core: Fix data race in CPU latency PM QoS request handling",
                            "    - scsi: mpt3sas: Fix crash in transport port remove by using ioc_info()",
                            "    - usb: vhci-hcd: Prevent suspending virtually attached devices",
                            "    - PCI: rcar-gen4: Add missing 1ms delay after PWR reset assertion",
                            "    - PCI: rcar-gen4: Assure reset occurs before DBI access",
                            "    - PCI: rcar-gen4: Fix inverted break condition in PHY initialization",
                            "    - ASoC: qcom: sc8280xp: use sa8775p/ subdir for QCS9100 / QCS9075",
                            "    - iommu/vt-d: Disallow dirty tracking if incoherent page walk",
                            "    - iommu/selftest: prevent use of uninitialized variable",
                            "    - RDMA/siw: Always report immediate post SQ errors",
                            "    - net: enetc: Fix probing error message typo for the ENETCv4 PF driver",
                            "    - net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast",
                            "    - ptp: Add a upper bound on max_vclocks",
                            "    - vhost: vringh: Fix copy_to_iter return value check",
                            "    - net: macb: remove illusion about TBQPH/RBQPH being per-queue",
                            "    - net: macb: move ring size computation to functions",
                            "    - net: macb: single dma_alloc_coherent() for DMA descriptors",
                            "    - Bluetooth: btintel_pcie: Refactor Device Coredump",
                            "    - Bluetooth: MGMT: Fix not exposing debug UUID on",
                            "      MGMT_OP_READ_EXP_FEATURES_INFO",
                            "    - Bluetooth: ISO: Fix possible UAF on iso_conn_free",
                            "    - Bluetooth: ISO: free rx_skb if not consumed",
                            "    - Bluetooth: ISO: don't leak skb in ISO_CONT RX",
                            "    - Bluetooth: hci_sync: Fix using random address for BIG/PA advertisements",
                            "    - KEYS: X.509: Fix Basic Constraints CA flag parsing",
                            "    - hwrng: ks-sa - fix division by zero in ks_sa_rng_init",
                            "    - cramfs: fix incorrect physical page address calculation",
                            "    - ocfs2: fix double free in user_cluster_connect()",
                            "    - drivers/base/node: fix double free in register_one_node()",
                            "    - f2fs: fix UAF issue in f2fs_merge_page_bio()",
                            "    - mtd: rawnand: atmel: Fix error handling path in",
                            "      atmel_nand_controller_add_nands",
                            "    - PCI: j721e: Fix incorrect error message in probe()",
                            "    - idpf: fix mismatched free function for dma_alloc_coherent",
                            "    - tcp: use skb->len instead of skb->truesize in tcp_can_ingest()",
                            "    - nfp: fix RSS hash key size when RSS is not supported",
                            "    - net: ena: return 0 in ena_get_rxfh_key_size() when RSS hash key is not",
                            "      configurable",
                            "    - net: dlink: handle copy_thresh allocation failure",
                            "    - net/mlx5: Stop polling for command response if interface goes down",
                            "    - net/mlx5: pagealloc: Fix reclaim race during command interface teardown",
                            "    - net/mlx5: fw reset, add reset timeout work",
                            "    - smb: client: fix crypto buffers in non-linear memory",
                            "    - bonding: fix xfrm offload feature setup on active-backup mode",
                            "    - net: enetc: initialize SW PIR and CIR based HW PIR and CIR values",
                            "    - iommufd: Register iommufd mock devices with fwspec",
                            "    - Revert \"net/mlx5e: Update and set Xon/Xoff upon MTU set\"",
                            "    - NFSD: filecache: add STATX_DIOALIGN and STATX_DIO_READ_ALIGN support",
                            "    - nfs/localio: avoid issuing misaligned IO using O_DIRECT",
                            "    - octeontx2-vf: fix bitmap leak",
                            "    - octeontx2-pf: fix bitmap leak",
                            "    - vhost: vringh: Modify the return value check",
                            "    - selftests/bpf: Fix typos and grammar in test sources",
                            "    - selftests/bpf: move get_ksyms and get_addrs to trace_helpers.c",
                            "    - selftests/bpf: Fix realloc size in bpf_get_addrs",
                            "    - bpf: Skip scalar adjustment for BPF_NEG if dst is a pointer",
                            "    - bpf: Reject negative offsets for ALU ops",
                            "    - tpm: Disable TPM2_TCG_HMAC by default",
                            "    - ALSA: hda/hdmi: Add pin fix for HP ProDesk model",
                            "    - ALSA: hda/realtek: Add quirk for HP Spectre 14t-ea100",
                            "    - Squashfs: fix uninit-value in squashfs_get_parent",
                            "    - uio_hv_generic: Let userspace take care of interrupt mask",
                            "    - hisi_acc_vfio_pci: Fix reference leak in hisi_acc_vfio_debug_init",
                            "    - io_uring/waitid: always prune wait queue entry in io_waitid_wait()",
                            "    - io_uring/zcrx: fix overshooting recv limit",
                            "    - ASoC: wcd934x: fix error handling in wcd934x_codec_parse_data()",
                            "    - ASoC: SOF: ipc3-topology: Fix multi-core and static pipelines tear down",
                            "    - ASoC: codecs: wcd937x: set the comp soundwire port correctly",
                            "    - ASoC: codecs: wcd937x: make stub functions inline",
                            "    - ASoC: SOF: ipc4-pcm: fix delay calculation when DSP resamples",
                            "    - ASoC: SOF: ipc4-pcm: fix start offset calculation for chain DMA",
                            "    - fs: udf: fix OOB read in lengthAllocDescs handling",
                            "    - net: nfc: nci: Add parameter validation for packet data",
                            "    - mfd: rz-mtu3: Fix MTU5 NFCR register offset",
                            "    - mfd: intel_soc_pmic_chtdc_ti: Set use_single_read regmap_config flag",
                            "    - mfd: vexpress-sysreg: Check the return value of devm_gpiochip_add_data()",
                            "    - tracing: Fix lock imbalance in s_start() memory allocation failure path",
                            "    - tracing: Fix race condition in kprobe initialization causing NULL",
                            "      pointer dereference",
                            "    - tracing: Fix wakeup tracers on failure of acquiring calltime",
                            "    - tracing: Fix irqoff tracers on failure of acquiring calltime",
                            "    - tracing: Have trace_marker use per-cpu data to read user space",
                            "    - tracing: Fix tracing_mark_raw_write() to use buf and not ubuf",
                            "    - tracing: Stop fortify-string from warning in tracing_mark_raw_write()",
                            "    - dm: fix queue start/stop imbalance under suspend/load/resume races",
                            "    - dm: fix NULL pointer dereference in __dm_suspend()",
                            "    - LoongArch: Automatically disable kaslr if boot from kexec_file",
                            "    - pwm: loongson: Fix LOONGSON_PWM_FREQ_DEFAULT",
                            "    - LoongArch: BPF: Sign-extend struct ops return values properly",
                            "    - LoongArch: BPF: No support of struct argument in trampoline programs",
                            "    - LoongArch: BPF: Don't align trampoline size",
                            "    - LoongArch: BPF: Make trampoline size stable",
                            "    - LoongArch: BPF: Make error handling robust in",
                            "      arch_prepare_bpf_trampoline()",
                            "    - LoongArch: BPF: Remove duplicated bpf_flush_icache()",
                            "    - LoongArch: BPF: No text_poke() for kernel text",
                            "    - LoongArch: BPF: Remove duplicated flags check",
                            "    - LoongArch: BPF: Fix uninitialized symbol 'retval_off'",
                            "    - mm/ksm: fix flag-dropping behavior in ksm_madvise",
                            "    - ksmbd: Fix race condition in RPC handle list access",
                            "    - ksmbd: fix error code overwriting in smb2_get_info_filesystem()",
                            "    - ksmbd: add max ip connections parameter",
                            "    - ext4: fix potential null deref in ext4_mb_init()",
                            "    - ext4: fix checks for orphan inodes",
                            "    - KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn't valid",
                            "    - fbdev: simplefb: Fix use after free in simplefb_detach_genpds()",
                            "    - mm: hugetlb: avoid soft lockup when mprotect to large memory area",
                            "    - selftests/mm: skip soft-dirty tests when CONFIG_MEM_SOFT_DIRTY is",
                            "      disabled",
                            "    - nvdimm: ndtest: Return -ENOMEM if devm_kcalloc() fails in ndtest_probe()",
                            "    - misc: fastrpc: Save actual DMA size in fastrpc_map structure",
                            "    - misc: fastrpc: Fix fastrpc_map_lookup operation",
                            "    - misc: fastrpc: fix possible map leak in fastrpc_put_args",
                            "    - misc: fastrpc: Skip reference for DMA handles",
                            "    - Input: atmel_mxt_ts - allow reset GPIO to sleep",
                            "    - Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info",
                            "      leak",
                            "    - sunrpc: fix null pointer dereference on zero-length checksum",
                            "    - PCI/AER: Avoid NULL pointer dereference in aer_ratelimit()",
                            "    - remoteproc: pru: Fix potential NULL pointer dereference in",
                            "      pru_rproc_set_ctable()",
                            "    - PCI: endpoint: pci-epf-test: Add NULL check for DMA channels before",
                            "      release",
                            "    - thunderbolt: Fix use-after-free in tb_dp_dprx_work",
                            "    - tee: fix register_shm_helper()",
                            "    - pinctrl: check the return value of pinmux_ops::get_function_name()",
                            "    - bus: fsl-mc: Check return value of platform_get_resource()",
                            "    - net/9p: Fix buffer overflow in USB transport layer",
                            "    - net: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock",
                            "    - usb: typec: tipd: Clear interrupts first",
                            "    - arm64: dts: qcom: qcm2290: Disable USB SS bus instances in park mode",
                            "    - usb: cdns3: cdnsp-pci: remove redundant pci_disable_device() call",
                            "    - scsi: ufs: core: Fix PM QoS mutex initialization",
                            "    - drm/amdgpu/vcn: Fix double-free of vcn dump buffer",
                            "    - Linux 6.17.3",
                            "  * CVE-2025-40019",
                            "    - crypto: essiv - Check ssize for decryption and in-place encryption",
                            "  * CVE-2025-40214",
                            "    - af_unix: Initialise scc_index in unix_add_edge().",
                            "  * Miscellaneous Ubuntu changes",
                            "    - [SAUCE] Fix selftest/net/rtnetlink.sh for Big Endian",
                            "",
                            "  [ Ubuntu-riscv: 6.17.0-12.12.1 ]",
                            "",
                            "  * questing/linux-riscv: 6.17.0-12.12.1 -proposed tracker (LP: #2138113)",
                            "  [ Ubuntu: 6.17.0-12.12 ]",
                            "  * questing/linux: 6.17.0-12.12 -proposed tracker (LP: #2138115)",
                            "  * CVE-2025-40019",
                            "    - crypto: essiv - Check ssize for decryption and in-place encryption",
                            "  * CVE-2025-40214",
                            "    - af_unix: Initialise scc_index in unix_add_edge().",
                            ""
                        ],
                        "package": "linux-riscv-6.17",
                        "version": "6.17.0-14.14.1~24.04.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2137844,
                            2013232,
                            2074082,
                            2137845,
                            1786013,
                            2137849,
                            1786013,
                            2136820,
                            2137698,
                            2129812,
                            2125022,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136813,
                            2132317,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2132095,
                            2131046,
                            2115860,
                            2128792,
                            2121852,
                            2131259,
                            2131259,
                            2131702,
                            2129610,
                            2138113,
                            2138115
                        ],
                        "author": "Emil Renner Berthing <emil.renner.berthing@canonical.com>",
                        "date": "Tue, 27 Jan 2026 20:04:21 +0100"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * noble/linux-riscv-6.17: 6.17.0-9.9.1~24.04.1 -proposed tracker (LP: #2133507)",
                            "",
                            "  * Enable Nezha board (LP: #1975592)",
                            "    - SAUCE: mmc: pwrseq_simple: always fall back to GPIO based reset control",
                            "    - SAUCE: nvmem: core: update cell->bytes after shifting bits",
                            "    - SAUCE: dt-bindings: pwm: Add binding for Allwinner D1/T113-S3/R329 PWM",
                            "      controller",
                            "    - SAUCE: pwm: Add Allwinner's D1/T113-S3/R329 SoCs PWM support",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add pwm node",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add PWM pins",
                            "    - SAUCE: mmc: sunxi-mmc: Correct the maximum segment size",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add misc nodes",
                            "    - SAUCE: riscv: dts: allwinner: Keep aldo regulator on",
                            "    - SAUCE: riscv: dts: allwinner: Add button on the Nezha board",
                            "    - SAUCE: riscv: dts: allwinner: Add button on the Lichee RV Dock",
                            "    - SAUCE: regulator: dt-bindings: Add Allwinner D1 LDOs",
                            "    - SAUCE: regulator: sun20i: Add support for Allwinner D1 analog LDOs",
                            "    - SAUCE: regulator: sun20i: Use device_node_to_regmap()",
                            "    - SAUCE: dt-bindings: thermal: sun8i: Add compatible for D1",
                            "    - SAUCE: thermal: sun8i: Set the event type for new samples",
                            "    - SAUCE: thermal: sun8i: Ensure vref is powered",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add thermal sensor and zone",
                            "    - SAUCE: riscv: dts: allwinner: d1: Hook up PWM-controlled CPU voltage",
                            "      regulators",
                            "    - SAUCE: drm/sun4i: dsi: Allow panel attach before card registration",
                            "    - SAUCE: drm/sun4i: mixer: Remove unused CMA headers",
                            "    - SAUCE: drm/sun4i: tcon: Always protect the LCD dotclock rate",
                            "    - SAUCE: drm/sun4i: tcon_top: Register reset, clock gates in probe",
                            "    - SAUCE: riscv: dts: allwinner: lichee-rv-86-panel-480p: Add panel",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add HDMI pipeline",
                            "    - SAUCE: riscv: dts: allwinner: d1: Enable HDMI on supported boards",
                            "    - SAUCE: dt-bindings: display: sun4i-tcon: Add external LVDS PHY",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add LVDS0 PHY",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add LED controller node",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add RGB LEDs to boards",
                            "    - SAUCE: ASoC: sun20i-codec: New driver for D1 internal codec",
                            "    - SAUCE: [WIP] ASoC: sun20i-codec: What is this ramp thing?",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add sound cards to boards",
                            "    - SAUCE: dt-bindings: display: sun8i-a83t-dw-hdmi: Remove #phy-cells",
                            "    - SAUCE: dt-bindings: display: Add D1 HDMI compatibles",
                            "    - SAUCE: drm/sun4i: Add support for D1 HDMI",
                            "    - SAUCE: drm/sun4i: sun8i-hdmi-phy: Add support for D1 PHY",
                            "    - SAUCE: [HACK] drm/sun4i: Copy in BSP code for D1 HDMI PHY",
                            "    - SAUCE: riscv: dts: allwinner: Add Nezha and Lichee RV SPI nodes",
                            "    - SAUCE: dt-bindings: display: Add Sitronix ST7701s panel binding",
                            "    - SAUCE: drm/panel: Add driver for ST7701s DPI LCD panel",
                            "    - [Config] riscv: updateconfigs for D1 support",
                            "",
                            "  * Enable StarFive VisionFive 2 board (LP: #2013232)",
                            "    - SAUCE: PCI: starfive: Offload the NVMe timeout workaround to host",
                            "      drivers.",
                            "    - SAUCE: pwm: opencores: Add PWM driver support",
                            "    - riscv: dts: starfive: jh7110-common: drop no-sdio property from mmc1",
                            "    - dt-bindings: memory-controllers: add StarFive JH7110 SoC DMC",
                            "    - riscv: dts: starfive: jh7110: add DMC memory controller",
                            "    - riscv: dts: starfive: jh7110: bootph-pre-ram hinting needed by boot",
                            "      loader",
                            "    - riscv: dts: starfive: jh7110-common: drop no-mmc property from mmc1",
                            "    - riscv: dts: starfive: jh7110-common: drop mmc post-power-on-delay-ms",
                            "    - riscv: dts: starfive: add common board dtsi for Milk-V Mars CM variants",
                            "    - dt-bindings: riscv: starfive: add milkv,marscm-emmc",
                            "    - riscv: dts: starfive: add Milk-V Mars CM system-on-module",
                            "    - dt-bindings: riscv: starfive: add milkv,marscm-lite",
                            "    - riscv: dts: starfive: add Milk-V Mars CM Lite system-on-module",
                            "    - SAUCE: dts: starfive: jh7110-common: split out mmc0 reset pins from",
                            "      common into boards",
                            "    - SAUCE: dt-bindings: riscv: Add StarFive JH7110S SoC and VisionFive 2",
                            "      Lite board",
                            "    - SAUCE: riscv: dts: starfive: jh7110-common: Move out some nodes to the",
                            "      board dts",
                            "    - SAUCE: riscv: dts: starfive: Add common board dtsi for VisionFive 2 Lite",
                            "      variants",
                            "    - SAUCE: riscv: dts: starfive: Add VisionFive 2 Lite board device tree",
                            "    - SAUCE: riscv: dts: starfive: Add VisionFive 2 Lite eMMC board device",
                            "      tree",
                            "    - SAUCE: dt-bindings: riscv: starfive: add xunlong,orangepi-rv",
                            "    - SAUCE: riscv: dts: starfive: add Orange Pi RV",
                            "    - [Config] riscv: updateconfigs for JH7110 support",
                            "",
                            "  * Miscellaneous Ubuntu changes",
                            "    - SAUCE: tools/lib/perf: Fix -Werror=alloc-size-larger-than in cpumap.c",
                            "    - [Config] Enable pre-RVA23 hardware",
                            ""
                        ],
                        "package": "linux-riscv-6.17",
                        "version": "6.17.0-9.9.1~24.04.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2133507,
                            1975592,
                            2013232
                        ],
                        "author": "Emil Renner Berthing <emil.renner.berthing@canonical.com>",
                        "date": "Thu, 18 Dec 2025 14:49:05 +0100"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Create Noble backport",
                            "",
                            "  [ Ubuntu: 6.17.0-9.9.1 ]",
                            ""
                        ],
                        "package": "linux-riscv-6.17",
                        "version": "6.17.0-9.9.1~24.04.0",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [],
                        "author": "Emil Renner Berthing <emil.renner.berthing@canonical.com>",
                        "date": "Thu, 18 Dec 2025 14:06:20 +0100"
                    }
                ],
                "notes": "For a newly added package only the three most recent changelog entries are shown.",
                "is_version_downgrade": false
            },
            {
                "name": "linux-image-6.17.0-14-generic",
                "from_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "to_version": {
                    "source_package_name": "linux-riscv-6.17",
                    "source_package_version": "6.17.0-14.14.1~24.04.1",
                    "version": "6.17.0-14.14.1~24.04.1"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-40256",
                        "url": "https://ubuntu.com/security/CVE-2025-40256",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68204",
                        "url": "https://ubuntu.com/security/CVE-2025-68204",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68203",
                        "url": "https://ubuntu.com/security/CVE-2025-68203",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40267",
                        "url": "https://ubuntu.com/security/CVE-2025-40267",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68198",
                        "url": "https://ubuntu.com/security/CVE-2025-68198",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68199",
                        "url": "https://ubuntu.com/security/CVE-2025-68199",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40268",
                        "url": "https://ubuntu.com/security/CVE-2025-40268",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40269",
                        "url": "https://ubuntu.com/security/CVE-2025-40269",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68205",
                        "url": "https://ubuntu.com/security/CVE-2025-68205",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40270",
                        "url": "https://ubuntu.com/security/CVE-2025-40270",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40271",
                        "url": "https://ubuntu.com/security/CVE-2025-40271",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40272",
                        "url": "https://ubuntu.com/security/CVE-2025-40272",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68245",
                        "url": "https://ubuntu.com/security/CVE-2025-68245",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68240",
                        "url": "https://ubuntu.com/security/CVE-2025-68240",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68241",
                        "url": "https://ubuntu.com/security/CVE-2025-68241",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68211",
                        "url": "https://ubuntu.com/security/CVE-2025-68211",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68246",
                        "url": "https://ubuntu.com/security/CVE-2025-68246",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40273",
                        "url": "https://ubuntu.com/security/CVE-2025-40273",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40212",
                        "url": "https://ubuntu.com/security/CVE-2025-40212",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40274",
                        "url": "https://ubuntu.com/security/CVE-2025-40274",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68202",
                        "url": "https://ubuntu.com/security/CVE-2025-68202",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68239",
                        "url": "https://ubuntu.com/security/CVE-2025-68239",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68247",
                        "url": "https://ubuntu.com/security/CVE-2025-68247",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68208",
                        "url": "https://ubuntu.com/security/CVE-2025-68208",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68200",
                        "url": "https://ubuntu.com/security/CVE-2025-68200",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40275",
                        "url": "https://ubuntu.com/security/CVE-2025-40275",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68242",
                        "url": "https://ubuntu.com/security/CVE-2025-68242",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68243",
                        "url": "https://ubuntu.com/security/CVE-2025-68243",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40276",
                        "url": "https://ubuntu.com/security/CVE-2025-40276",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40277",
                        "url": "https://ubuntu.com/security/CVE-2025-40277",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68206",
                        "url": "https://ubuntu.com/security/CVE-2025-68206",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68209",
                        "url": "https://ubuntu.com/security/CVE-2025-68209",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40278",
                        "url": "https://ubuntu.com/security/CVE-2025-40278",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40279",
                        "url": "https://ubuntu.com/security/CVE-2025-40279",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40280",
                        "url": "https://ubuntu.com/security/CVE-2025-40280",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40281",
                        "url": "https://ubuntu.com/security/CVE-2025-40281",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40282",
                        "url": "https://ubuntu.com/security/CVE-2025-40282",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40283",
                        "url": "https://ubuntu.com/security/CVE-2025-40283",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40284",
                        "url": "https://ubuntu.com/security/CVE-2025-40284",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68210",
                        "url": "https://ubuntu.com/security/CVE-2025-68210",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40285",
                        "url": "https://ubuntu.com/security/CVE-2025-40285",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40286",
                        "url": "https://ubuntu.com/security/CVE-2025-40286",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40287",
                        "url": "https://ubuntu.com/security/CVE-2025-40287",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40288",
                        "url": "https://ubuntu.com/security/CVE-2025-40288",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40289",
                        "url": "https://ubuntu.com/security/CVE-2025-40289",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68201",
                        "url": "https://ubuntu.com/security/CVE-2025-68201",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68207",
                        "url": "https://ubuntu.com/security/CVE-2025-68207",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68244",
                        "url": "https://ubuntu.com/security/CVE-2025-68244",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68316",
                        "url": "https://ubuntu.com/security/CVE-2025-68316",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40292",
                        "url": "https://ubuntu.com/security/CVE-2025-40292",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68180",
                        "url": "https://ubuntu.com/security/CVE-2025-68180",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40327",
                        "url": "https://ubuntu.com/security/CVE-2025-40327",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40328",
                        "url": "https://ubuntu.com/security/CVE-2025-40328",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40291",
                        "url": "https://ubuntu.com/security/CVE-2025-40291",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68322",
                        "url": "https://ubuntu.com/security/CVE-2025-68322",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40293",
                        "url": "https://ubuntu.com/security/CVE-2025-40293",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40294",
                        "url": "https://ubuntu.com/security/CVE-2025-40294",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40329",
                        "url": "https://ubuntu.com/security/CVE-2025-40329",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40295",
                        "url": "https://ubuntu.com/security/CVE-2025-40295",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40296",
                        "url": "https://ubuntu.com/security/CVE-2025-40296",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40297",
                        "url": "https://ubuntu.com/security/CVE-2025-40297",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68320",
                        "url": "https://ubuntu.com/security/CVE-2025-68320",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68169",
                        "url": "https://ubuntu.com/security/CVE-2025-68169",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68197",
                        "url": "https://ubuntu.com/security/CVE-2025-68197",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40330",
                        "url": "https://ubuntu.com/security/CVE-2025-40330",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68192",
                        "url": "https://ubuntu.com/security/CVE-2025-68192",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40331",
                        "url": "https://ubuntu.com/security/CVE-2025-40331",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68187",
                        "url": "https://ubuntu.com/security/CVE-2025-68187",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68167",
                        "url": "https://ubuntu.com/security/CVE-2025-68167",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68319",
                        "url": "https://ubuntu.com/security/CVE-2025-68319",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40298",
                        "url": "https://ubuntu.com/security/CVE-2025-40298",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40299",
                        "url": "https://ubuntu.com/security/CVE-2025-40299",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40301",
                        "url": "https://ubuntu.com/security/CVE-2025-40301",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40358",
                        "url": "https://ubuntu.com/security/CVE-2025-40358",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68186",
                        "url": "https://ubuntu.com/security/CVE-2025-68186",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68184",
                        "url": "https://ubuntu.com/security/CVE-2025-68184",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40302",
                        "url": "https://ubuntu.com/security/CVE-2025-40302",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40303",
                        "url": "https://ubuntu.com/security/CVE-2025-40303",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40362",
                        "url": "https://ubuntu.com/security/CVE-2025-40362",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40332",
                        "url": "https://ubuntu.com/security/CVE-2025-40332",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40304",
                        "url": "https://ubuntu.com/security/CVE-2025-40304",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40305",
                        "url": "https://ubuntu.com/security/CVE-2025-40305",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68318",
                        "url": "https://ubuntu.com/security/CVE-2025-68318",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40209",
                        "url": "https://ubuntu.com/security/CVE-2025-40209",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68183",
                        "url": "https://ubuntu.com/security/CVE-2025-68183",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68173",
                        "url": "https://ubuntu.com/security/CVE-2025-68173",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40306",
                        "url": "https://ubuntu.com/security/CVE-2025-40306",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40307",
                        "url": "https://ubuntu.com/security/CVE-2025-40307",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40308",
                        "url": "https://ubuntu.com/security/CVE-2025-40308",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40309",
                        "url": "https://ubuntu.com/security/CVE-2025-40309",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68174",
                        "url": "https://ubuntu.com/security/CVE-2025-68174",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40310",
                        "url": "https://ubuntu.com/security/CVE-2025-40310",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40361",
                        "url": "https://ubuntu.com/security/CVE-2025-40361",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40311",
                        "url": "https://ubuntu.com/security/CVE-2025-40311",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68185",
                        "url": "https://ubuntu.com/security/CVE-2025-68185",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68176",
                        "url": "https://ubuntu.com/security/CVE-2025-68176",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68190",
                        "url": "https://ubuntu.com/security/CVE-2025-68190",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68168",
                        "url": "https://ubuntu.com/security/CVE-2025-68168",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40312",
                        "url": "https://ubuntu.com/security/CVE-2025-40312",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40333",
                        "url": "https://ubuntu.com/security/CVE-2025-40333",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68321",
                        "url": "https://ubuntu.com/security/CVE-2025-68321",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40334",
                        "url": "https://ubuntu.com/security/CVE-2025-40334",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68191",
                        "url": "https://ubuntu.com/security/CVE-2025-68191",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68309",
                        "url": "https://ubuntu.com/security/CVE-2025-68309",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40313",
                        "url": "https://ubuntu.com/security/CVE-2025-40313",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40335",
                        "url": "https://ubuntu.com/security/CVE-2025-40335",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40314",
                        "url": "https://ubuntu.com/security/CVE-2025-40314",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40336",
                        "url": "https://ubuntu.com/security/CVE-2025-40336",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68193",
                        "url": "https://ubuntu.com/security/CVE-2025-68193",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68175",
                        "url": "https://ubuntu.com/security/CVE-2025-68175",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68188",
                        "url": "https://ubuntu.com/security/CVE-2025-68188",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68315",
                        "url": "https://ubuntu.com/security/CVE-2025-68315",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40337",
                        "url": "https://ubuntu.com/security/CVE-2025-40337",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40338",
                        "url": "https://ubuntu.com/security/CVE-2025-40338",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40339",
                        "url": "https://ubuntu.com/security/CVE-2025-40339",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68194",
                        "url": "https://ubuntu.com/security/CVE-2025-68194",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40363",
                        "url": "https://ubuntu.com/security/CVE-2025-40363",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68311",
                        "url": "https://ubuntu.com/security/CVE-2025-68311",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40340",
                        "url": "https://ubuntu.com/security/CVE-2025-40340",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68196",
                        "url": "https://ubuntu.com/security/CVE-2025-68196",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68178",
                        "url": "https://ubuntu.com/security/CVE-2025-68178",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40341",
                        "url": "https://ubuntu.com/security/CVE-2025-40341",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40342",
                        "url": "https://ubuntu.com/security/CVE-2025-40342",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40343",
                        "url": "https://ubuntu.com/security/CVE-2025-40343",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68177",
                        "url": "https://ubuntu.com/security/CVE-2025-68177",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68317",
                        "url": "https://ubuntu.com/security/CVE-2025-68317",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40315",
                        "url": "https://ubuntu.com/security/CVE-2025-40315",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40316",
                        "url": "https://ubuntu.com/security/CVE-2025-40316",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40360",
                        "url": "https://ubuntu.com/security/CVE-2025-40360",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68179",
                        "url": "https://ubuntu.com/security/CVE-2025-68179",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68310",
                        "url": "https://ubuntu.com/security/CVE-2025-68310",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40317",
                        "url": "https://ubuntu.com/security/CVE-2025-40317",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40359",
                        "url": "https://ubuntu.com/security/CVE-2025-40359",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68181",
                        "url": "https://ubuntu.com/security/CVE-2025-68181",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68170",
                        "url": "https://ubuntu.com/security/CVE-2025-68170",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40213",
                        "url": "https://ubuntu.com/security/CVE-2025-40213",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40318",
                        "url": "https://ubuntu.com/security/CVE-2025-40318",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68312",
                        "url": "https://ubuntu.com/security/CVE-2025-68312",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40344",
                        "url": "https://ubuntu.com/security/CVE-2025-40344",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68172",
                        "url": "https://ubuntu.com/security/CVE-2025-68172",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40319",
                        "url": "https://ubuntu.com/security/CVE-2025-40319",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68182",
                        "url": "https://ubuntu.com/security/CVE-2025-68182",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68314",
                        "url": "https://ubuntu.com/security/CVE-2025-68314",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68189",
                        "url": "https://ubuntu.com/security/CVE-2025-68189",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68171",
                        "url": "https://ubuntu.com/security/CVE-2025-68171",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68313",
                        "url": "https://ubuntu.com/security/CVE-2025-68313",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40320",
                        "url": "https://ubuntu.com/security/CVE-2025-40320",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40321",
                        "url": "https://ubuntu.com/security/CVE-2025-40321",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40322",
                        "url": "https://ubuntu.com/security/CVE-2025-40322",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40211",
                        "url": "https://ubuntu.com/security/CVE-2025-40211",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40323",
                        "url": "https://ubuntu.com/security/CVE-2025-40323",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40210",
                        "url": "https://ubuntu.com/security/CVE-2025-40210",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40324",
                        "url": "https://ubuntu.com/security/CVE-2025-40324",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40326",
                        "url": "https://ubuntu.com/security/CVE-2025-40326",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40084",
                        "url": "https://ubuntu.com/security/CVE-2025-40084",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40222",
                        "url": "https://ubuntu.com/security/CVE-2025-40222",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40223",
                        "url": "https://ubuntu.com/security/CVE-2025-40223",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40106",
                        "url": "https://ubuntu.com/security/CVE-2025-40106",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40224",
                        "url": "https://ubuntu.com/security/CVE-2025-40224",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40225",
                        "url": "https://ubuntu.com/security/CVE-2025-40225",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40226",
                        "url": "https://ubuntu.com/security/CVE-2025-40226",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40227",
                        "url": "https://ubuntu.com/security/CVE-2025-40227",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40228",
                        "url": "https://ubuntu.com/security/CVE-2025-40228",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40229",
                        "url": "https://ubuntu.com/security/CVE-2025-40229",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40230",
                        "url": "https://ubuntu.com/security/CVE-2025-40230",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40231",
                        "url": "https://ubuntu.com/security/CVE-2025-40231",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40233",
                        "url": "https://ubuntu.com/security/CVE-2025-40233",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40235",
                        "url": "https://ubuntu.com/security/CVE-2025-40235",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40236",
                        "url": "https://ubuntu.com/security/CVE-2025-40236",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40237",
                        "url": "https://ubuntu.com/security/CVE-2025-40237",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40238",
                        "url": "https://ubuntu.com/security/CVE-2025-40238",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40239",
                        "url": "https://ubuntu.com/security/CVE-2025-40239",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40240",
                        "url": "https://ubuntu.com/security/CVE-2025-40240",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40241",
                        "url": "https://ubuntu.com/security/CVE-2025-40241",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40242",
                        "url": "https://ubuntu.com/security/CVE-2025-40242",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40243",
                        "url": "https://ubuntu.com/security/CVE-2025-40243",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40244",
                        "url": "https://ubuntu.com/security/CVE-2025-40244",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40245",
                        "url": "https://ubuntu.com/security/CVE-2025-40245",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40086",
                        "url": "https://ubuntu.com/security/CVE-2025-40086",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40087",
                        "url": "https://ubuntu.com/security/CVE-2025-40087",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40088",
                        "url": "https://ubuntu.com/security/CVE-2025-40088",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40162",
                        "url": "https://ubuntu.com/security/CVE-2025-40162",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40085",
                        "url": "https://ubuntu.com/security/CVE-2025-40085",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40172",
                        "url": "https://ubuntu.com/security/CVE-2025-40172",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40177",
                        "url": "https://ubuntu.com/security/CVE-2025-40177",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40163",
                        "url": "https://ubuntu.com/security/CVE-2025-40163",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40174",
                        "url": "https://ubuntu.com/security/CVE-2025-40174",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40089",
                        "url": "https://ubuntu.com/security/CVE-2025-40089",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40176",
                        "url": "https://ubuntu.com/security/CVE-2025-40176",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40164",
                        "url": "https://ubuntu.com/security/CVE-2025-40164",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40091",
                        "url": "https://ubuntu.com/security/CVE-2025-40091",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40175",
                        "url": "https://ubuntu.com/security/CVE-2025-40175",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40173",
                        "url": "https://ubuntu.com/security/CVE-2025-40173",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40092",
                        "url": "https://ubuntu.com/security/CVE-2025-40092",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40093",
                        "url": "https://ubuntu.com/security/CVE-2025-40093",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40094",
                        "url": "https://ubuntu.com/security/CVE-2025-40094",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40095",
                        "url": "https://ubuntu.com/security/CVE-2025-40095",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40165",
                        "url": "https://ubuntu.com/security/CVE-2025-40165",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40096",
                        "url": "https://ubuntu.com/security/CVE-2025-40096",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40097",
                        "url": "https://ubuntu.com/security/CVE-2025-40097",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40098",
                        "url": "https://ubuntu.com/security/CVE-2025-40098",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40099",
                        "url": "https://ubuntu.com/security/CVE-2025-40099",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40100",
                        "url": "https://ubuntu.com/security/CVE-2025-40100",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40101",
                        "url": "https://ubuntu.com/security/CVE-2025-40101",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40167",
                        "url": "https://ubuntu.com/security/CVE-2025-40167",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40102",
                        "url": "https://ubuntu.com/security/CVE-2025-40102",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40103",
                        "url": "https://ubuntu.com/security/CVE-2025-40103",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40104",
                        "url": "https://ubuntu.com/security/CVE-2025-40104",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40166",
                        "url": "https://ubuntu.com/security/CVE-2025-40166",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40105",
                        "url": "https://ubuntu.com/security/CVE-2025-40105",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40019",
                        "url": "https://ubuntu.com/security/CVE-2025-40019",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40214",
                        "url": "https://ubuntu.com/security/CVE-2025-40214",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [
                    2137844,
                    2013232,
                    2074082,
                    2137845,
                    1786013,
                    2137849,
                    1786013,
                    2136820,
                    2137698,
                    2129812,
                    2125022,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136813,
                    2132317,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2132095,
                    2131046,
                    2115860,
                    2128792,
                    2121852,
                    2131259,
                    2131259,
                    2131702,
                    2129610,
                    2138113,
                    2138115,
                    2133507,
                    1975592,
                    2013232
                ],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-40256",
                                "url": "https://ubuntu.com/security/CVE-2025-40256",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68204",
                                "url": "https://ubuntu.com/security/CVE-2025-68204",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68203",
                                "url": "https://ubuntu.com/security/CVE-2025-68203",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40267",
                                "url": "https://ubuntu.com/security/CVE-2025-40267",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68198",
                                "url": "https://ubuntu.com/security/CVE-2025-68198",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68199",
                                "url": "https://ubuntu.com/security/CVE-2025-68199",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40268",
                                "url": "https://ubuntu.com/security/CVE-2025-40268",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40269",
                                "url": "https://ubuntu.com/security/CVE-2025-40269",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68205",
                                "url": "https://ubuntu.com/security/CVE-2025-68205",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40270",
                                "url": "https://ubuntu.com/security/CVE-2025-40270",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40271",
                                "url": "https://ubuntu.com/security/CVE-2025-40271",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40272",
                                "url": "https://ubuntu.com/security/CVE-2025-40272",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68245",
                                "url": "https://ubuntu.com/security/CVE-2025-68245",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68240",
                                "url": "https://ubuntu.com/security/CVE-2025-68240",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68241",
                                "url": "https://ubuntu.com/security/CVE-2025-68241",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68211",
                                "url": "https://ubuntu.com/security/CVE-2025-68211",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68246",
                                "url": "https://ubuntu.com/security/CVE-2025-68246",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40273",
                                "url": "https://ubuntu.com/security/CVE-2025-40273",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40212",
                                "url": "https://ubuntu.com/security/CVE-2025-40212",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40274",
                                "url": "https://ubuntu.com/security/CVE-2025-40274",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68202",
                                "url": "https://ubuntu.com/security/CVE-2025-68202",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68239",
                                "url": "https://ubuntu.com/security/CVE-2025-68239",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68247",
                                "url": "https://ubuntu.com/security/CVE-2025-68247",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68208",
                                "url": "https://ubuntu.com/security/CVE-2025-68208",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68200",
                                "url": "https://ubuntu.com/security/CVE-2025-68200",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40275",
                                "url": "https://ubuntu.com/security/CVE-2025-40275",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68242",
                                "url": "https://ubuntu.com/security/CVE-2025-68242",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68243",
                                "url": "https://ubuntu.com/security/CVE-2025-68243",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40276",
                                "url": "https://ubuntu.com/security/CVE-2025-40276",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40277",
                                "url": "https://ubuntu.com/security/CVE-2025-40277",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68206",
                                "url": "https://ubuntu.com/security/CVE-2025-68206",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68209",
                                "url": "https://ubuntu.com/security/CVE-2025-68209",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40278",
                                "url": "https://ubuntu.com/security/CVE-2025-40278",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40279",
                                "url": "https://ubuntu.com/security/CVE-2025-40279",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40280",
                                "url": "https://ubuntu.com/security/CVE-2025-40280",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40281",
                                "url": "https://ubuntu.com/security/CVE-2025-40281",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40282",
                                "url": "https://ubuntu.com/security/CVE-2025-40282",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40283",
                                "url": "https://ubuntu.com/security/CVE-2025-40283",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40284",
                                "url": "https://ubuntu.com/security/CVE-2025-40284",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68210",
                                "url": "https://ubuntu.com/security/CVE-2025-68210",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40285",
                                "url": "https://ubuntu.com/security/CVE-2025-40285",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40286",
                                "url": "https://ubuntu.com/security/CVE-2025-40286",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40287",
                                "url": "https://ubuntu.com/security/CVE-2025-40287",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40288",
                                "url": "https://ubuntu.com/security/CVE-2025-40288",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40289",
                                "url": "https://ubuntu.com/security/CVE-2025-40289",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68201",
                                "url": "https://ubuntu.com/security/CVE-2025-68201",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68207",
                                "url": "https://ubuntu.com/security/CVE-2025-68207",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68244",
                                "url": "https://ubuntu.com/security/CVE-2025-68244",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68316",
                                "url": "https://ubuntu.com/security/CVE-2025-68316",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40292",
                                "url": "https://ubuntu.com/security/CVE-2025-40292",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68180",
                                "url": "https://ubuntu.com/security/CVE-2025-68180",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40327",
                                "url": "https://ubuntu.com/security/CVE-2025-40327",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40328",
                                "url": "https://ubuntu.com/security/CVE-2025-40328",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40291",
                                "url": "https://ubuntu.com/security/CVE-2025-40291",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68322",
                                "url": "https://ubuntu.com/security/CVE-2025-68322",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40293",
                                "url": "https://ubuntu.com/security/CVE-2025-40293",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40294",
                                "url": "https://ubuntu.com/security/CVE-2025-40294",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40329",
                                "url": "https://ubuntu.com/security/CVE-2025-40329",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40295",
                                "url": "https://ubuntu.com/security/CVE-2025-40295",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40296",
                                "url": "https://ubuntu.com/security/CVE-2025-40296",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40297",
                                "url": "https://ubuntu.com/security/CVE-2025-40297",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68320",
                                "url": "https://ubuntu.com/security/CVE-2025-68320",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68169",
                                "url": "https://ubuntu.com/security/CVE-2025-68169",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68197",
                                "url": "https://ubuntu.com/security/CVE-2025-68197",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40330",
                                "url": "https://ubuntu.com/security/CVE-2025-40330",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68192",
                                "url": "https://ubuntu.com/security/CVE-2025-68192",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40331",
                                "url": "https://ubuntu.com/security/CVE-2025-40331",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68187",
                                "url": "https://ubuntu.com/security/CVE-2025-68187",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68167",
                                "url": "https://ubuntu.com/security/CVE-2025-68167",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68319",
                                "url": "https://ubuntu.com/security/CVE-2025-68319",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40298",
                                "url": "https://ubuntu.com/security/CVE-2025-40298",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40299",
                                "url": "https://ubuntu.com/security/CVE-2025-40299",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40301",
                                "url": "https://ubuntu.com/security/CVE-2025-40301",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40358",
                                "url": "https://ubuntu.com/security/CVE-2025-40358",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68186",
                                "url": "https://ubuntu.com/security/CVE-2025-68186",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68184",
                                "url": "https://ubuntu.com/security/CVE-2025-68184",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40302",
                                "url": "https://ubuntu.com/security/CVE-2025-40302",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40303",
                                "url": "https://ubuntu.com/security/CVE-2025-40303",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40362",
                                "url": "https://ubuntu.com/security/CVE-2025-40362",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40332",
                                "url": "https://ubuntu.com/security/CVE-2025-40332",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40304",
                                "url": "https://ubuntu.com/security/CVE-2025-40304",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40305",
                                "url": "https://ubuntu.com/security/CVE-2025-40305",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68318",
                                "url": "https://ubuntu.com/security/CVE-2025-68318",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40209",
                                "url": "https://ubuntu.com/security/CVE-2025-40209",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68183",
                                "url": "https://ubuntu.com/security/CVE-2025-68183",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68173",
                                "url": "https://ubuntu.com/security/CVE-2025-68173",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40306",
                                "url": "https://ubuntu.com/security/CVE-2025-40306",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40307",
                                "url": "https://ubuntu.com/security/CVE-2025-40307",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40308",
                                "url": "https://ubuntu.com/security/CVE-2025-40308",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40309",
                                "url": "https://ubuntu.com/security/CVE-2025-40309",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68174",
                                "url": "https://ubuntu.com/security/CVE-2025-68174",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40310",
                                "url": "https://ubuntu.com/security/CVE-2025-40310",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40361",
                                "url": "https://ubuntu.com/security/CVE-2025-40361",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40311",
                                "url": "https://ubuntu.com/security/CVE-2025-40311",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68185",
                                "url": "https://ubuntu.com/security/CVE-2025-68185",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68176",
                                "url": "https://ubuntu.com/security/CVE-2025-68176",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68190",
                                "url": "https://ubuntu.com/security/CVE-2025-68190",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68168",
                                "url": "https://ubuntu.com/security/CVE-2025-68168",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40312",
                                "url": "https://ubuntu.com/security/CVE-2025-40312",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40333",
                                "url": "https://ubuntu.com/security/CVE-2025-40333",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68321",
                                "url": "https://ubuntu.com/security/CVE-2025-68321",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40334",
                                "url": "https://ubuntu.com/security/CVE-2025-40334",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68191",
                                "url": "https://ubuntu.com/security/CVE-2025-68191",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68309",
                                "url": "https://ubuntu.com/security/CVE-2025-68309",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40313",
                                "url": "https://ubuntu.com/security/CVE-2025-40313",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40335",
                                "url": "https://ubuntu.com/security/CVE-2025-40335",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40314",
                                "url": "https://ubuntu.com/security/CVE-2025-40314",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40336",
                                "url": "https://ubuntu.com/security/CVE-2025-40336",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68193",
                                "url": "https://ubuntu.com/security/CVE-2025-68193",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68175",
                                "url": "https://ubuntu.com/security/CVE-2025-68175",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68188",
                                "url": "https://ubuntu.com/security/CVE-2025-68188",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68315",
                                "url": "https://ubuntu.com/security/CVE-2025-68315",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40337",
                                "url": "https://ubuntu.com/security/CVE-2025-40337",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40338",
                                "url": "https://ubuntu.com/security/CVE-2025-40338",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40339",
                                "url": "https://ubuntu.com/security/CVE-2025-40339",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68194",
                                "url": "https://ubuntu.com/security/CVE-2025-68194",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40363",
                                "url": "https://ubuntu.com/security/CVE-2025-40363",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68311",
                                "url": "https://ubuntu.com/security/CVE-2025-68311",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40340",
                                "url": "https://ubuntu.com/security/CVE-2025-40340",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68196",
                                "url": "https://ubuntu.com/security/CVE-2025-68196",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68178",
                                "url": "https://ubuntu.com/security/CVE-2025-68178",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40341",
                                "url": "https://ubuntu.com/security/CVE-2025-40341",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40342",
                                "url": "https://ubuntu.com/security/CVE-2025-40342",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40343",
                                "url": "https://ubuntu.com/security/CVE-2025-40343",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68177",
                                "url": "https://ubuntu.com/security/CVE-2025-68177",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68317",
                                "url": "https://ubuntu.com/security/CVE-2025-68317",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40315",
                                "url": "https://ubuntu.com/security/CVE-2025-40315",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40316",
                                "url": "https://ubuntu.com/security/CVE-2025-40316",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40360",
                                "url": "https://ubuntu.com/security/CVE-2025-40360",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68179",
                                "url": "https://ubuntu.com/security/CVE-2025-68179",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68310",
                                "url": "https://ubuntu.com/security/CVE-2025-68310",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40317",
                                "url": "https://ubuntu.com/security/CVE-2025-40317",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40359",
                                "url": "https://ubuntu.com/security/CVE-2025-40359",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68181",
                                "url": "https://ubuntu.com/security/CVE-2025-68181",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68170",
                                "url": "https://ubuntu.com/security/CVE-2025-68170",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40213",
                                "url": "https://ubuntu.com/security/CVE-2025-40213",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40318",
                                "url": "https://ubuntu.com/security/CVE-2025-40318",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68312",
                                "url": "https://ubuntu.com/security/CVE-2025-68312",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40344",
                                "url": "https://ubuntu.com/security/CVE-2025-40344",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68172",
                                "url": "https://ubuntu.com/security/CVE-2025-68172",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40319",
                                "url": "https://ubuntu.com/security/CVE-2025-40319",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68182",
                                "url": "https://ubuntu.com/security/CVE-2025-68182",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68314",
                                "url": "https://ubuntu.com/security/CVE-2025-68314",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68189",
                                "url": "https://ubuntu.com/security/CVE-2025-68189",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68171",
                                "url": "https://ubuntu.com/security/CVE-2025-68171",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68313",
                                "url": "https://ubuntu.com/security/CVE-2025-68313",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40320",
                                "url": "https://ubuntu.com/security/CVE-2025-40320",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40321",
                                "url": "https://ubuntu.com/security/CVE-2025-40321",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40322",
                                "url": "https://ubuntu.com/security/CVE-2025-40322",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40211",
                                "url": "https://ubuntu.com/security/CVE-2025-40211",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40323",
                                "url": "https://ubuntu.com/security/CVE-2025-40323",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40210",
                                "url": "https://ubuntu.com/security/CVE-2025-40210",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40324",
                                "url": "https://ubuntu.com/security/CVE-2025-40324",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40326",
                                "url": "https://ubuntu.com/security/CVE-2025-40326",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40084",
                                "url": "https://ubuntu.com/security/CVE-2025-40084",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40222",
                                "url": "https://ubuntu.com/security/CVE-2025-40222",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40223",
                                "url": "https://ubuntu.com/security/CVE-2025-40223",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40106",
                                "url": "https://ubuntu.com/security/CVE-2025-40106",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40224",
                                "url": "https://ubuntu.com/security/CVE-2025-40224",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40225",
                                "url": "https://ubuntu.com/security/CVE-2025-40225",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40226",
                                "url": "https://ubuntu.com/security/CVE-2025-40226",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40227",
                                "url": "https://ubuntu.com/security/CVE-2025-40227",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40228",
                                "url": "https://ubuntu.com/security/CVE-2025-40228",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40229",
                                "url": "https://ubuntu.com/security/CVE-2025-40229",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40230",
                                "url": "https://ubuntu.com/security/CVE-2025-40230",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40231",
                                "url": "https://ubuntu.com/security/CVE-2025-40231",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40233",
                                "url": "https://ubuntu.com/security/CVE-2025-40233",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40235",
                                "url": "https://ubuntu.com/security/CVE-2025-40235",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40236",
                                "url": "https://ubuntu.com/security/CVE-2025-40236",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40237",
                                "url": "https://ubuntu.com/security/CVE-2025-40237",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40238",
                                "url": "https://ubuntu.com/security/CVE-2025-40238",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40239",
                                "url": "https://ubuntu.com/security/CVE-2025-40239",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40240",
                                "url": "https://ubuntu.com/security/CVE-2025-40240",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40241",
                                "url": "https://ubuntu.com/security/CVE-2025-40241",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40242",
                                "url": "https://ubuntu.com/security/CVE-2025-40242",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40243",
                                "url": "https://ubuntu.com/security/CVE-2025-40243",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40244",
                                "url": "https://ubuntu.com/security/CVE-2025-40244",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40245",
                                "url": "https://ubuntu.com/security/CVE-2025-40245",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40086",
                                "url": "https://ubuntu.com/security/CVE-2025-40086",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40087",
                                "url": "https://ubuntu.com/security/CVE-2025-40087",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40088",
                                "url": "https://ubuntu.com/security/CVE-2025-40088",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40162",
                                "url": "https://ubuntu.com/security/CVE-2025-40162",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40085",
                                "url": "https://ubuntu.com/security/CVE-2025-40085",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40172",
                                "url": "https://ubuntu.com/security/CVE-2025-40172",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40177",
                                "url": "https://ubuntu.com/security/CVE-2025-40177",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40163",
                                "url": "https://ubuntu.com/security/CVE-2025-40163",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40174",
                                "url": "https://ubuntu.com/security/CVE-2025-40174",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40089",
                                "url": "https://ubuntu.com/security/CVE-2025-40089",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40176",
                                "url": "https://ubuntu.com/security/CVE-2025-40176",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40164",
                                "url": "https://ubuntu.com/security/CVE-2025-40164",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40091",
                                "url": "https://ubuntu.com/security/CVE-2025-40091",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40175",
                                "url": "https://ubuntu.com/security/CVE-2025-40175",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40173",
                                "url": "https://ubuntu.com/security/CVE-2025-40173",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40092",
                                "url": "https://ubuntu.com/security/CVE-2025-40092",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40093",
                                "url": "https://ubuntu.com/security/CVE-2025-40093",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40094",
                                "url": "https://ubuntu.com/security/CVE-2025-40094",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40095",
                                "url": "https://ubuntu.com/security/CVE-2025-40095",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40165",
                                "url": "https://ubuntu.com/security/CVE-2025-40165",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40096",
                                "url": "https://ubuntu.com/security/CVE-2025-40096",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40097",
                                "url": "https://ubuntu.com/security/CVE-2025-40097",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40098",
                                "url": "https://ubuntu.com/security/CVE-2025-40098",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40099",
                                "url": "https://ubuntu.com/security/CVE-2025-40099",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40100",
                                "url": "https://ubuntu.com/security/CVE-2025-40100",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40101",
                                "url": "https://ubuntu.com/security/CVE-2025-40101",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40167",
                                "url": "https://ubuntu.com/security/CVE-2025-40167",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40102",
                                "url": "https://ubuntu.com/security/CVE-2025-40102",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40103",
                                "url": "https://ubuntu.com/security/CVE-2025-40103",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40104",
                                "url": "https://ubuntu.com/security/CVE-2025-40104",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40166",
                                "url": "https://ubuntu.com/security/CVE-2025-40166",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40105",
                                "url": "https://ubuntu.com/security/CVE-2025-40105",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40019",
                                "url": "https://ubuntu.com/security/CVE-2025-40019",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40214",
                                "url": "https://ubuntu.com/security/CVE-2025-40214",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * noble/linux-riscv-6.17: 6.17.0-14.14.1~24.04.1 -proposed tracker (LP: #2137844)",
                            "",
                            "  * Enable StarFive VisionFive 2 board (LP: #2013232)",
                            "    - SAUCE: PCI: starfive: Use regulator APIs instead of GPIO APIs to control",
                            "      the 3V3 power supply of PCIe slots",
                            "",
                            "  * Enable Microchip PIC64GX Curiosity Kit (LP: #2074082)",
                            "    - dt-bindings: cache: sifive,ccache0: add a pic64gx compatible",
                            "    - dt-bindings: interrupt-controller: sifive,plic: Add pic64gx",
                            "      compatibility",
                            "    - dt-bindings: gpio: mpfs-gpio: Add pic64gx GPIO compatibility",
                            "    - dt-bindings: net: cdns,macb: Add pic64gx compatibility",
                            "    - riscv: dts: microchip: Minor whitespace cleanup",
                            "    - riscv: dts: microchip: add common board dtsi for icicle kit variants",
                            "    - dt-bindings: riscv: microchip: document icicle kit with production",
                            "      device",
                            "    - riscv: dts: microchip: add icicle kit with production device",
                            "    - riscv: dts: microchip: rename icicle kit ccc clock and other minor fixes",
                            "    - dt-bindings: riscv: microchip: document Discovery Kit",
                            "    - riscv: dts: microchip: add a device tree for Discovery Kit",
                            "    - dt-bindings: soc: microchip: document the simple-mfd syscon on PolarFire",
                            "      SoC",
                            "    - soc: microchip: add mfd drivers for two syscon regions on PolarFire SoC",
                            "    - MAINTAINERS: add new soc drivers to Microchip RISC-V entry",
                            "    - MAINTAINERS: rename Microchip RISC-V entry",
                            "    - dt-bindings: pinctrl: document pic64gx \"gpio2\" pinmux",
                            "    - pinctrl: add pic64gx \"gpio2\" pinmux driver",
                            "    - dt-bindings: pinctrl: document polarfire soc iomux0 pinmux",
                            "    - pinctrl: add polarfire soc iomux0 pinmux driver",
                            "    - MAINTAINERS: add Microchip RISC-V pinctrl drivers/bindings to entry",
                            "    - dt-bindings: clk: microchip: mpfs: remove first reg region",
                            "    - clk: microchip: mpfs: use regmap for clocks",
                            "    - reset: mpfs: add non-auxiliary bus probing",
                            "    - pinctrl: pic64gx-gpio2: Add REGMAP_MMIO dependency",
                            "    - pinctrl: add CONFIG_OF dependencies for microchip drivers",
                            "    - SAUCE: pinctrl: move microchip riscv pinctrl drivers to a folder",
                            "    - SAUCE: pinctrl: add generic functions + pins mapper",
                            "    - SAUCE: dt-bindings: pinctrl: document polarfire soc mssio pin controller",
                            "    - SAUCE: pinctrl: add polarfire soc mssio pinctrl driver",
                            "    - SAUCE: MAINTAINERS: add Microchip mpfs mssio driver/bindings to entry",
                            "    - SAUCE: dt-bindings: soc: microchip: add compatible for the mss-top-",
                            "      sysreg on pic64gx",
                            "    - SAUCE: dt-bindings: soc: microchip: mpfs-sys-controller: Add pic64gx",
                            "      compatibility",
                            "    - SAUCE: soc: microchip: mpfs-sys-controller: add support for pic64gx",
                            "    - SAUCE: dt-bindings: timer: sifive,clint: add pic64gx compatibility",
                            "    - SAUCE: clk: microchip: drop POLARFIRE from ARCH_MICROCHIP_POLARFIRE",
                            "    - SAUCE: dt-bindings: clock: mpfs-ccc: Add pic64gx compatibility",
                            "    - SAUCE: dt-bindings: clock: mpfs-clkcfg: Add pic64gx compatibility",
                            "    - SAUCE: dt-bindings: mbox: add pic64gx mailbox compatibility to mpfs",
                            "      mailbox",
                            "    - SAUCE: mailbox: mpfs: drop POLARFIRE from ARCH_MICROCHIP_POLARFIRE",
                            "    - SAUCE: dt-bindings: riscv: microchip: document the PIC64GX curiosity kit",
                            "    - SAUCE: riscv: dts: microchip: add pic64gx and its curiosity kit",
                            "    - SAUCE: riscv: dts: microchip: remove POLARFIRE mention in Makefile",
                            "    - [Config] riscv: updateconfigs for PIC64GX support",
                            "",
                            "  [ Ubuntu-riscv: 6.17.0-14.14.1 ]",
                            "",
                            "  * questing/linux-riscv: 6.17.0-14.14.1 -proposed tracker (LP: #2137845)",
                            "  * Packaging resync (LP: #1786013)",
                            "    - [Packaging] debian.riscv/dkms-versions -- update from kernel-versions",
                            "      (main/2026.01.12)",
                            "  [ Ubuntu: 6.17.0-14.14 ]",
                            "  * questing/linux: 6.17.0-14.14 -proposed tracker (LP: #2137849)",
                            "  * Packaging resync (LP: #1786013)",
                            "    - [Packaging] debian.master/dkms-versions -- update from kernel-versions",
                            "      (main/2026.01.12)",
                            "  * ubuntu_kselftests:_net/net:gre_gso.sh failing (LP: #2136820)",
                            "    - SAUCE increase socat timeout in gre_gso.sh",
                            "  * ubuntu_blktrace_smoke_test fails on questing with rust coreutils",
                            "    (LP: #2137698)",
                            "    - SAUCE: Revert \"ext4: fail unaligned direct IO write with EINVAL\"",
                            "  * bareudp.sh in ubuntu_kselftests_net fails because of dash default shell",
                            "    (LP: #2129812)",
                            "    - selftests: net: use BASH for bareudp testing",
                            "  * CVE-2025-40256",
                            "    - xfrm: also call xfrm_state_delete_tunnel at destroy time for states that",
                            "      were never added",
                            "  * Enable PMF on AMD HPT/STX/KRK (LP: #2125022)",
                            "    - platform/x86/amd/pmf: Add support for adjusting PMF PPT and PPT APU",
                            "      thresholds",
                            "    - platform/x86/amd/pmf: Extend custom BIOS inputs for more policies",
                            "    - platform/x86/amd/pmf: Update ta_pmf_action structure member",
                            "    - platform/x86/amd/pmf: Add helper to verify BIOS input notifications are",
                            "      enable/disable",
                            "    - platform/x86/amd/pmf: Add custom BIOS input support for AMD_CPU_ID_PS",
                            "    - platform/x86/amd/pmf: Preserve custom BIOS inputs for evaluating the",
                            "      policies",
                            "    - platform/x86/amd/pmf: Call enact function sooner to process early",
                            "      pending requests",
                            "    - platform/x86/amd/pmf: Add debug logs for pending requests and custom",
                            "      BIOS inputs",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850)",
                            "    - iommufd/selftest: Fix ioctl return value in _test_cmd_trigger_vevents()",
                            "    - drm/mediatek: Add pm_runtime support for GCE power control",
                            "    - drm/i915: Fix conversion between clock ticks and nanoseconds",
                            "    - drm/amdgpu: set default gfx reset masks for gfx6-8",
                            "    - drm/amd/display: Don't stretch non-native images by default in eDP",
                            "    - smb: client: fix refcount leak in smb2_set_path_attr",
                            "    - iommufd: Make vfio_compat's unmap succeed if the range is already empty",
                            "    - futex: Optimize per-cpu reference counting",
                            "    - drm/amd: Fix suspend failure with secure display TA",
                            "    - drm/xe: Move declarations under conditional branch",
                            "    - drm/xe: Do clean shutdown also when using flr",
                            "    - drm/amd/display: Add pixel_clock to amd_pp_display_configuration",
                            "    - drm/amd/pm: Use pm_display_cfg in legacy DPM (v2)",
                            "    - drm/amd/display: Disable fastboot on DCE 6 too",
                            "    - drm/amd/pm: Disable MCLK switching on SI at high pixel clocks",
                            "    - drm/amd: Disable ASPM on SI",
                            "    - arm64: kprobes: check the return value of set_memory_rox()",
                            "    - compiler_types: Move unused static inline functions warning to W=2",
                            "    - riscv: Build loader.bin exclusively for Canaan K210",
                            "    - RISC-V: clear hot-unplugged cores from all task mm_cpumasks to avoid",
                            "      rfence errors",
                            "    - riscv: acpi: avoid errors caused by probing DT devices when ACPI is used",
                            "    - fs: return EOPNOTSUPP from file_setattr/file_getattr syscalls",
                            "    - ASoC: nau8821: Avoid unnecessary blocking in IRQ handler",
                            "    - NFS4: Fix state renewals missing after boot",
                            "    - drm/amdkfd: fix suspend/resume all calls in mes based eviction path",
                            "    - NFS4: Apply delay_retrans to async operations",
                            "    - HID: intel-thc-hid: intel-quickspi: Add ARL PCI Device Id's",
                            "    - HID: quirks: avoid Cooler Master MM712 dongle wakeup bug",
                            "    - ixgbe: handle IXGBE_VF_GET_PF_LINK_STATE mailbox operation",
                            "    - HID: nintendo: Wait longer for initial probe",
                            "    - NFS: check if suid/sgid was cleared after a write as needed",
                            "    - HID: quirks: Add ALWAYS_POLL quirk for VRS R295 steering wheel",
                            "    - io_uring: fix unexpected placement on same size resizing",
                            "    - HID: logitech-hidpp: Add HIDPP_QUIRK_RESET_HI_RES_SCROLL",
                            "    - ASoC: max98090/91: fixed max98091 ALSA widget powering up/down",
                            "    - ALSA: hda/realtek: Fix mute led for HP Omen 17-cb0xxx",
                            "    - ixgbe: handle IXGBE_VF_FEATURES_NEGOTIATE mbox cmd",
                            "    - wifi: ath11k: zero init info->status in wmi_process_mgmt_tx_comp()",
                            "    - selftests: net: local_termination: Wait for interfaces to come up",
                            "    - net: fec: correct rx_bytes statistic for the case SHIFT16 is set",
                            "    - net: phy: micrel: Introduce lanphy_modify_page_reg",
                            "    - net: phy: micrel: Replace hardcoded pages with defines",
                            "    - net: phy: micrel: lan8814 fix reset of the QSGMII interface",
                            "    - rust: Add -fno-isolate-erroneous-paths-dereference to",
                            "      bindgen_skip_c_flags",
                            "    - NFSD: Skip close replay processing if XDR encoding fails",
                            "    - Bluetooth: 6lowpan: fix BDADDR_LE vs ADDR_LE_DEV address type confusion",
                            "    - Bluetooth: 6lowpan: Don't hold spin lock over sleeping functions",
                            "    - Bluetooth: hci_conn: Fix not cleaning up PA_LINK connections",
                            "    - net: dsa: tag_brcm: do not mark link local traffic as offloaded",
                            "    - net/smc: fix mismatch between CLC header and proposal",
                            "    - net/handshake: Fix memory leak in tls_handshake_accept()",
                            "    - net: ethernet: ti: am65-cpsw-qos: fix IET verify/response timeout",
                            "    - net: ethernet: ti: am65-cpsw-qos: fix IET verify retry mechanism",
                            "    - net: mdio: fix resource leak in mdiobus_register_device()",
                            "    - wifi: mac80211: skip rate verification for not captured PSDUs",
                            "    - Bluetooth: hci_event: Fix not handling PA Sync Lost event",
                            "    - net/mlx5e: Fix missing error assignment in mlx5e_xfrm_add_state()",
                            "    - net/mlx5e: Fix maxrate wraparound in threshold between units",
                            "    - net/mlx5e: Fix wraparound in rate limiting for values above 255 Gbps",
                            "    - net/mlx5e: Fix potentially misleading debug message",
                            "    - net/mlx5: Fix typo of MLX5_EQ_DOORBEL_OFFSET",
                            "    - net/mlx5: Store the global doorbell in mlx5_priv",
                            "    - net/mlx5e: Prepare for using different CQ doorbells",
                            "    - net_sched: limit try_bulk_dequeue_skb() batches",
                            "    - wifi: iwlwifi: mvm: fix beacon template/fixed rate",
                            "    - wifi: iwlwifi: mld: always take beacon ies in link grading",
                            "    - virtio-net: fix incorrect flags recording in big mode",
                            "    - hsr: Fix supervision frame sending on HSRv0",
                            "    - hsr: Follow standard for HSRv0 supervision frames",
                            "    - ACPI: CPPC: Detect preferred core availability on online CPUs",
                            "    - ACPI: CPPC: Check _CPC validity for only the online CPUs",
                            "    - ACPI: CPPC: Perform fast check switch only for online CPUs",
                            "    - ACPI: CPPC: Limit perf ctrs in PCC check only to online CPUs",
                            "    - cpufreq: intel_pstate: Check IDA only before MSR_IA32_PERF_CTL writes",
                            "    - Bluetooth: L2CAP: export l2cap_chan_hold for modules",
                            "    - io_uring/rsrc: don't use blk_rq_nr_phys_segments() as number of bvecs",
                            "    - acpi,srat: Fix incorrect device handle check for Generic Initiator",
                            "    - regulator: fixed: fix GPIO descriptor leak on register failure",
                            "    - ASoC: cs4271: Fix regulator leak on probe failure",
                            "    - ASoC: codecs: va-macro: fix resource leak in probe error path",
                            "    - drm/vmwgfx: Restore Guest-Backed only cursor plane support",
                            "    - ASoC: tas2781: fix getting the wrong device number",
                            "    - pnfs: Fix TLS logic in _nfs4_pnfs_v3_ds_connect()",
                            "    - pnfs: Fix TLS logic in _nfs4_pnfs_v4_ds_connect()",
                            "    - pnfs: Set transport security policy to RPC_XPRTSEC_NONE unless using TLS",
                            "    - simplify nfs_atomic_open_v23()",
                            "    - NFSv2/v3: Fix error handling in nfs_atomic_open_v23()",
                            "    - NFS: sysfs: fix leak when nfs_client kobject add fails",
                            "    - NFSv4: Fix an incorrect parameter when calling nfs4_call_sync()",
                            "    - drm/amd/amdgpu: Ensure isp_kernel_buffer_alloc() creates a new BO",
                            "    - acpi/hmat: Fix lockdep warning for hmem_register_resource()",
                            "    - ASoC: rsnd: fix OF node reference leak in rsnd_ssiu_probe()",
                            "    - drm/client: fix MODULE_PARM_DESC string for \"active\"",
                            "    - irqchip/riscv-intc: Add missing free() callback in riscv_intc_domain_ops",
                            "    - lib/crypto: arm/curve25519: Disable on CPU_BIG_ENDIAN",
                            "    - hostfs: Fix only passing host root in boot stage with new mount",
                            "    - afs: Fix dynamic lookup to fail on cell lookup failure",
                            "    - mtd: onenand: Pass correct pointer to IRQ handler",
                            "    - virtio-fs: fix incorrect check for fsvq->kobj",
                            "    - fs/namespace: correctly handle errors returned by grab_requested_mnt_ns",
                            "    - perf header: Write bpf_prog (infos|btfs)_cnt to data file",
                            "    - perf build: Don't fail fast path feature detection when binutils-devel",
                            "      is not available",
                            "    - perf lock: Fix segfault due to missing kernel map",
                            "    - perf test shell lock_contention: Extra debug diagnostics",
                            "    - perf test: Fix lock contention test",
                            "    - arm64: dts: rockchip: Set correct pinctrl for I2S1 8ch TX on odroid-m1",
                            "    - arm64: dts: rockchip: Fix PCIe power enable pin for BigTreeTech CB2 and",
                            "      Pi2",
                            "    - arm64: dts: rockchip: Make RK3588 GPU OPP table naming less generic",
                            "    - ARM: dts: imx6ull-engicam-microgea-rmm: fix report-rate-hz value",
                            "    - ARM: dts: imx51-zii-rdu1: Fix audmux node names",
                            "    - arm64: dts: imx8-ss-img: Avoid gpio0_mipi_csi GPIOs being deferred",
                            "    - arm64: dts: imx8mp-kontron: Fix USB OTG role switching",
                            "    - HID: hid-ntrig: Prevent memory leak in ntrig_report_version()",
                            "    - ARM: dts: BCM53573: Fix address of Luxul XAP-1440's Ethernet PHY",
                            "    - arm64: dts: rockchip: Fix USB power enable pin for BTT CB2 and Pi2",
                            "    - arm64: dts: rockchip: drop reset from rk3576 i2c9 node",
                            "    - pwm: adp5585: Correct mismatched pwm chip info",
                            "    - HID: playstation: Fix memory leak in dualshock4_get_calibration_data()",
                            "    - HID: uclogic: Fix potential memory leak in error path",
                            "    - LoongArch: KVM: Restore guest PMU if it is enabled",
                            "    - LoongArch: KVM: Add delay until timer interrupt injected",
                            "    - LoongArch: KVM: Fix max supported vCPUs set with EIOINTC",
                            "    - KVM: arm64: Make all 32bit ID registers fully writable",
                            "    - KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated",
                            "    - KVM: nSVM: Always recalculate LBR MSR intercepts in svm_update_lbrv()",
                            "    - KVM: nSVM: Fix and simplify LBR virtualization handling with nested",
                            "    - KVM: VMX: Fix check for valid GVA on an EPT violation",
                            "    - nfsd: add missing FATTR4_WORD2_CLONE_BLKSIZE from supported attributes",
                            "    - gcov: add support for GCC 15",
                            "    - kho: warn and exit when unpreserved page wasn't preserved",
                            "    - strparser: Fix signed/unsigned mismatch bug",
                            "    - dma-mapping: benchmark: Restore padding to ensure uABI remained",
                            "      consistent",
                            "    - maple_tree: fix tracepoint string pointers",
                            "    - LoongArch: Consolidate early_ioremap()/ioremap_prot()",
                            "    - LoongArch: Use correct accessor to read FWPC/MWPC",
                            "    - LoongArch: Let {pte,pmd}_modify() record the status of _PAGE_DIRTY",
                            "    - mm/damon/sysfs: change next_update_jiffies to a global variable",
                            "    - selftests/tracing: Run sample events to clear page cache events",
                            "    - wifi: mac80211: reject address change while connecting",
                            "    - mm/huge_memory: preserve PG_has_hwpoisoned if a folio is split to >0",
                            "      order",
                            "    - mm/mm_init: fix hash table order logging in alloc_large_system_hash()",
                            "    - mm/damon/stat: change last_refresh_jiffies to a global variable",
                            "    - mm/kmsan: fix kmsan kmalloc hook when no stack depots are allocated yet",
                            "    - mm/shmem: fix THP allocation and fallback loop",
                            "    - mm/mremap: honour writable bit in mremap pte batching",
                            "    - mm/huge_memory: fix folio split check for anon folios in swapcache",
                            "    - mmc: sdhci-of-dwcmshc: Change DLL_STRBIN_TAPNUM_DEFAULT to 0x4",
                            "    - mmc: pxamci: Simplify pxamci_probe() error handling using devm APIs",
                            "    - mmc: dw_mmc-rockchip: Fix wrong internal phase calculate",
                            "    - ASoC: sdw_utils: fix device reference leak in is_sdca_endpoint_present()",
                            "    - crypto: hisilicon/qm - Fix device reference leak in qm_get_qos_value",
                            "    - smb: client: fix cifs_pick_channel when channel needs reconnect",
                            "    - spi: Try to get ACPI GPIO IRQ earlier",
                            "    - x86/microcode/AMD: Add Zen5 model 0x44, stepping 0x1 minrev",
                            "    - x86/CPU/AMD: Add additional fixed RDSEED microcode revisions",
                            "    - selftests/user_events: fix type cast for write_index packed member in",
                            "      perf_test",
                            "    - gendwarfksyms: Skip files with no exports",
                            "    - ftrace: Fix BPF fexit with livepatch",
                            "    - LoongArch: Consolidate max_pfn & max_low_pfn calculation",
                            "    - LoongArch: Use physical addresses for CSR_MERRENTRY/CSR_TLBRENTRY",
                            "    - EDAC/altera: Handle OCRAM ECC enable after warm reset",
                            "    - EDAC/altera: Use INTTEST register for Ethernet and USB SBE injection",
                            "    - PM: hibernate: Emit an error when image writing fails",
                            "    - PM: hibernate: Use atomic64_t for compressed_size variable",
                            "    - btrfs: zoned: fix conventional zone capacity calculation",
                            "    - btrfs: zoned: fix stripe width calculation",
                            "    - btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe()",
                            "    - btrfs: do not update last_log_commit when logging inode due to a new",
                            "      name",
                            "    - btrfs: release root after error in data_reloc_print_warning_inode()",
                            "    - drm/amdkfd: relax checks for over allocation of save area",
                            "    - drm/amdgpu: disable peer-to-peer access for DCC-enabled GC12 VRAM",
                            "      surfaces",
                            "    - drm/i915/psr: fix pipe to vblank conversion",
                            "    - drm/xe/xe3lpg: Extend Wa_15016589081 for xe3lpg",
                            "    - drm/xe/xe3: Extend wa_14023061436",
                            "    - drm/xe/xe3: Add WA_14024681466 for Xe3_LPG",
                            "    - pmdomain: imx: Fix reference count leak in imx_gpc_remove",
                            "    - pmdomain: samsung: plug potential memleak during probe",
                            "    - pmdomain: samsung: Rework legacy splash-screen handover workaround",
                            "    - selftests: mptcp: connect: fix fallback note due to OoO",
                            "    - selftests: mptcp: join: rm: set backup flag",
                            "    - selftests: mptcp: join: endpoints: longer transfer",
                            "    - selftests: mptcp: connect: trunc: read all recv data",
                            "    - selftests: mptcp: join: userspace: longer transfer",
                            "    - selftests: mptcp: join: properly kill background tasks",
                            "    - mm/huge_memory: do not change split_huge_page*() target order silently",
                            "    - mm/memory: do not populate page table entries beyond i_size",
                            "    - scripts/decode_stacktrace.sh: symbol: avoid trailing whitespaces",
                            "    - scripts/decode_stacktrace.sh: symbol: preserve alignment",
                            "    - scripts/decode_stacktrace.sh: fix build ID and PC source parsing",
                            "    - ASoC: da7213: Convert to DEFINE_RUNTIME_DEV_PM_OPS()",
                            "    - ASoC: da7213: Use component driver suspend/resume",
                            "    - KVM: x86: Rename local \"ecx\" variables to \"msr\" and \"pmc\" as appropriate",
                            "    - KVM: x86: Add support for RDMSR/WRMSRNS w/ immediate on Intel",
                            "    - KVM: VMX: Inject #UD if guest tries to execute SEAMCALL or TDCALL",
                            "    - isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe()",
                            "    - net: phy: micrel: Fix lan8814_config_init",
                            "    - Linux 6.17.9",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68204",
                            "    - pmdomain: arm: scmi: Fix genpd leak on provider registration failure",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68203",
                            "    - drm/amdgpu: fix lock warning in amdgpu_userq_fence_driver_process",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40267",
                            "    - io_uring/rw: ensure allocated iovec gets cleared for early failure",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68198",
                            "    - crash: fix crashkernel resource shrink",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68199",
                            "    - codetag: debug: handle existing CODETAG_EMPTY in mark_objexts_empty for",
                            "      slabobj_ext",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40268",
                            "    - cifs: client: fix memory leak in smb3_fs_context_parse_param",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40269",
                            "    - ALSA: usb-audio: Fix potential overflow of PCM transfer buffer",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68205",
                            "    - ALSA: hda/hdmi: Fix breakage at probing nvhdmi-mcp driver",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40270",
                            "    - mm, swap: fix potential UAF issue for VMA readahead",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40271",
                            "    - fs/proc: fix uaf in proc_readdir_de()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40272",
                            "    - mm/secretmem: fix use-after-free race in fault handler",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68245",
                            "    - net: netpoll: fix incorrect refcount handling causing incorrect cleanup",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68240",
                            "    - nilfs2: avoid having an active sc_timer before freeing sci",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68241",
                            "    - ipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68211",
                            "    - ksm: use range-walk function to jump over holes in",
                            "      scan_get_next_rmap_item",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68246",
                            "    - ksmbd: close accepted socket when per-IP limit rejects connection",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40273",
                            "    - NFSD: free copynotify stateid in nfs4_free_ol_stateid()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40212",
                            "    - nfsd: fix refcount leak in nfsd_set_fh_dentry()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40274",
                            "    - KVM: guest_memfd: Remove bindings on memslot deletion when gmem is dying",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68202",
                            "    - sched_ext: Fix unsafe locking in the scx_dump_state()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68239",
                            "    - binfmt_misc: restore write access before closing files opened by",
                            "      open_exec()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68247",
                            "    - posix-timers: Plug potential memory leak in do_timer_create()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68208",
                            "    - bpf: account for current allocated stack depth in",
                            "      widen_imprecise_scalars()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68200",
                            "    - bpf: Add bpf_prog_run_data_pointers()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40275",
                            "    - ALSA: usb-audio: Fix NULL pointer dereference in",
                            "      snd_usb_mixer_controls_badd",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68242",
                            "    - NFS: Fix LTP test failures when timestamps are delegated",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68243",
                            "    - NFS: Check the TLS certificate fields in nfs_match_client()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40276",
                            "    - drm/panthor: Flush shmem writes before mapping buffers CPU-uncached",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40277",
                            "    - drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68206",
                            "    - netfilter: nft_ct: add seqadj extension for natted connections",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68209",
                            "    - mlx5: Fix default values in create CQ",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40278",
                            "    - net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-",
                            "      infoleak",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40279",
                            "    - net: sched: act_connmark: initialize struct tc_ife to fix kernel leak",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40280",
                            "    - tipc: Fix use-after-free in tipc_mon_reinit_self().",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40281",
                            "    - sctp: prevent possible shift-out-of-bounds in sctp_transport_update_rto",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40282",
                            "    - Bluetooth: 6lowpan: reset link-local header on ipv6 recv path",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40283",
                            "    - Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40284",
                            "    - Bluetooth: MGMT: cancel mesh send timer when hdev removed",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68210",
                            "    - erofs: avoid infinite loop due to incomplete zstd-compressed data",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40285",
                            "    - smb/server: fix possible refcount leak in smb2_sess_setup()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40286",
                            "    - smb/server: fix possible memory leak in smb2_read()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40287",
                            "    - exfat: fix improper check of dentry.stream.valid_size",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40288",
                            "    - drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40289",
                            "    - drm/amdgpu: hide VRAM sysfs attributes on GPUs without VRAM",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68201",
                            "    - drm/amdgpu: remove two invalid BUG_ON()s",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68207",
                            "    - drm/xe/guc: Synchronize Dead CT worker with unbind",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68244",
                            "    - drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833)",
                            "    - Revert \"Bluetooth: L2CAP: convert timeouts to secs_to_jiffies()\"",
                            "    - sched_ext: Mark scx_bpf_dsq_move_set_[slice|vtime]() with KF_RCU",
                            "    - net: usb: asix_devices: Check return value of usbnet_get_endpoints",
                            "    - fbdev: atyfb: Check if pll_ops->init_pll failed",
                            "    - ACPI: button: Call input_free_device() on failing input device",
                            "      registration",
                            "    - ACPI: fan: Use platform device for devres-related actions",
                            "    - virtio-net: drop the multi-buffer XDP packet in zerocopy",
                            "    - batman-adv: Release references to inactive interfaces",
                            "    - Bluetooth: rfcomm: fix modem control handling",
                            "    - net: phy: dp83867: Disable EEE support as not implemented",
                            "    - fbdev: pvr2fb: Fix leftover reference to ONCHIP_NR_DMA_CHANNELS",
                            "    - fbdev: valkyriefb: Fix reference count leak in valkyriefb_init",
                            "    - mptcp: drop bogus optimization in __mptcp_check_push()",
                            "    - mptcp: restore window probe",
                            "    - ASoC: qdsp6: q6asm: do not sleep while atomic",
                            "    - ASoC: renesas: rz-ssi: Use proper dma_buffer_pos after resume",
                            "    - s390/pci: Restore IRQ unconditionally for the zPCI device",
                            "    - x86/build: Disable SSE4a",
                            "    - wifi: ath10k: Fix memory leak on unsupported WMI command",
                            "    - wifi: ath11k: Add missing platform IDs for quirk table",
                            "    - wifi: ath12k: free skb during idr cleanup callback",
                            "    - wifi: ath11k: avoid bit operation on key flags",
                            "    - drm/msm/a6xx: Fix GMU firmware parser",
                            "    - ALSA: usb-audio: fix control pipe direction",
                            "    - ASoC: cs-amp-lib-test: Fix missing include of kunit/test-bug.h",
                            "    - wifi: mac80211: reset FILS discovery and unsol probe resp intervals",
                            "    - wifi: mac80211: fix key tailroom accounting leak",
                            "    - wifi: nl80211: call kfree without a NULL check",
                            "    - kunit: test_dev_action: Correctly cast 'priv' pointer to long*",
                            "    - scsi: ufs: core: Initialize value of an attribute returned by uic cmd",
                            "    - scsi: core: Fix the unit attention counter implementation",
                            "    - bpf: Do not audit capability check in do_jit()",
                            "    - nvmet-auth: update sc_c in host response",
                            "    - crypto: s390/phmac - Do not modify the req->nbytes value",
                            "    - ASoC: Intel: avs: Unprepare a stream when XRUN occurs",
                            "    - ASoC: fsl_sai: fix bit order for DSD format",
                            "    - ASoC: fsl_micfil: correct the endian format for DSD",
                            "    - libbpf: Fix powerpc's stack register definition in bpf_tracing.h",
                            "    - ASoC: mediatek: Fix double pm_runtime_disable in remove functions",
                            "    - Bluetooth: ISO: Fix BIS connection dst_type handling",
                            "    - Bluetooth: btmtksdio: Add pmctrl handling for BT closed state during",
                            "      reset",
                            "    - Bluetooth: HCI: Fix tracking of advertisement set/instance 0x00",
                            "    - Bluetooth: ISO: Fix another instance of dst_type handling",
                            "    - Bluetooth: btintel_pcie: Fix event packet loss issue",
                            "    - Bluetooth: hci_conn: Fix connection cleanup with BIG with 2 or more BIS",
                            "    - Bluetooth: hci_core: Fix tracking of periodic advertisement",
                            "    - bpf: Conditionally include dynptr copy kfuncs",
                            "    - drm/msm: Ensure vm is created in VM_BIND ioctl",
                            "    - ALSA: usb-audio: add mono main switch to Presonus S1824c",
                            "    - ALSA: usb-audio: don't log messages meant for 1810c when initializing",
                            "      1824c",
                            "    - ACPI: MRRM: Check revision of MRRM table",
                            "    - drm/etnaviv: fix flush sequence logic",
                            "    - tools: ynl: fix string attribute length to include null terminator",
                            "    - net: hns3: return error code when function fails",
                            "    - sfc: fix potential memory leak in efx_mae_process_mport()",
                            "    - tools: ynl: avoid print_field when there is no reply",
                            "    - dpll: spec: add missing module-name and clock-id to pin-get reply",
                            "    - ASoC: fsl_sai: Fix sync error in consumer mode",
                            "    - ASoC: soc_sdw_utils: remove cs42l43 component_name",
                            "    - drm/amd/pm: fix smu table id bound check issue in smu_cmn_update_table()",
                            "    - drm/amd/pm/powerplay/smumgr: Fix PCIeBootLinkLevel value on Fiji",
                            "    - drm/amd/pm/powerplay/smumgr: Fix PCIeBootLinkLevel value on Iceland",
                            "    - drm/amdgpu: fix SPDX headers on amdgpu_cper.c/h",
                            "    - drm/amdgpu: fix SPDX header on amd_cper.h",
                            "    - drm/amdgpu: fix SPDX header on irqsrcs_vcn_5_0.h",
                            "    - ACPI: fan: Use ACPI handle when retrieving _FST",
                            "    - block: fix op_is_zone_mgmt() to handle REQ_OP_ZONE_RESET_ALL",
                            "    - block: make REQ_OP_ZONE_OPEN a write operation",
                            "    - dma-fence: Fix safe access wrapper to call timeline name method",
                            "    - kbuild: align modinfo section for Secureboot Authenticode EDK2 compat",
                            "    - regmap: irq: Correct documentation of wake_invert flag",
                            "    - [Config] Disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP for s390x",
                            "    - s390/mm: Fix memory leak in add_marker() when kvrealloc() fails",
                            "    - drm/xe: Do not wake device during a GT reset",
                            "    - drm/sched: avoid killing parent entity on child SIGKILL",
                            "    - drm/sched: Fix race in drm_sched_entity_select_rq()",
                            "    - drm/nouveau: Fix race in nouveau_sched_fini()",
                            "    - drm/i915/dmc: Clear HRR EVT_CTL/HTP to zero on ADL-S",
                            "    - drm/ast: Clear preserved bits from register output value",
                            "    - drm/amd: Check that VPE has reached DPM0 in idle handler",
                            "    - drm/amd/display: Fix incorrect return of vblank enable on unconfigured",
                            "      crtc",
                            "    - drm/amd/display: Don't program BLNDGAM_MEM_PWR_FORCE when CM low-power",
                            "      is disabled on DCN30",
                            "    - drm/amd/display: Add HDR workaround for a specific eDP",
                            "    - mptcp: leverage skb deferral free",
                            "    - mptcp: fix MSG_PEEK stream corruption",
                            "    - cpuidle: governors: menu: Rearrange main loop in menu_select()",
                            "    - cpuidle: governors: menu: Select polling state in some more cases",
                            "    - PM: hibernate: Combine return paths in power_down()",
                            "    - PM: sleep: Allow pm_restrict_gfp_mask() stacking",
                            "    - mfd: kempld: Switch back to earlier ->init() behavior",
                            "    - soc: aspeed: socinfo: Add AST27xx silicon IDs",
                            "    - firmware: qcom: scm: preserve assign_mem() error return value",
                            "    - soc: qcom: smem: Fix endian-unaware access of num_entries",
                            "    - spi: loopback-test: Don't use %pK through printk",
                            "    - spi: spi-qpic-snand: handle 'use_ecc' parameter of",
                            "      qcom_spi_config_cw_read()",
                            "    - soc: ti: pruss: don't use %pK through printk",
                            "    - bpf: Don't use %pK through printk",
                            "    - mmc: sdhci: Disable SD card clock before changing parameters",
                            "    - pinctrl: single: fix bias pull up/down handling in pin_config_set",
                            "    - mmc: host: renesas_sdhi: Fix the actual clock",
                            "    - memstick: Add timeout to prevent indefinite waiting",
                            "    - cpufreq: ti: Add support for AM62D2",
                            "    - bpf: Use tnums for JEQ/JNE is_branch_taken logic",
                            "    - firmware: ti_sci: Enable abort handling of entry to LPM",
                            "    - firewire: ohci: move self_id_complete tracepoint after validating",
                            "      register",
                            "    - irqchip/sifive-plic: Respect mask state when setting affinity",
                            "    - irqchip/loongson-eiointc: Route interrupt parsed from bios table",
                            "    - ACPI: sysfs: Use ACPI_FREE() for freeing an ACPI object",
                            "    - ACPI: video: force native for Lenovo 82K8",
                            "    - libbpf: Fix USDT SIB argument handling causing unrecognized register",
                            "      error",
                            "    - selftests/bpf: Fix bpf_prog_detach2 usage in test_lirc_mode2",
                            "    - arm64: versal-net: Update rtc calibration value",
                            "    - Revert \"UBUNTU: SAUCE: firmware: qcom: scm: Allow QSEECOM on Dell",
                            "      Inspiron 7441 / Latitude 7455\"",
                            "    - firmware: qcom: scm: Allow QSEECOM on Dell Inspiron 7441 / Latitude 7455",
                            "    - kselftest/arm64: tpidr2: Switch to waitpid() over wait4()",
                            "    - arc: Fix __fls() const-foldability via __builtin_clzl()",
                            "    - selftests/bpf: Upon failures, exit with code 1 in test_xsk.sh",
                            "    - irqchip/gic-v2m: Handle Multiple MSI base IRQ Alignment",
                            "    - ACPI: PRM: Skip handlers with NULL handler_address or NULL VA",
                            "    - ACPI: resource: Skip IRQ override on ASUS Vivobook Pro N6506CU",
                            "    - ACPI: scan: Add Intel CVS ACPI HIDs to acpi_ignore_dep_ids[]",
                            "    - thermal: gov_step_wise: Allow cooling level to be reduced earlier",
                            "    - thermal: intel: selftests: workload_hint: Mask unsupported types",
                            "    - power: supply: qcom_battmgr: add OOI chemistry",
                            "    - hwmon: (k10temp) Add thermal support for AMD Family 1Ah-based models",
                            "    - hwmon: (k10temp) Add device ID for Strix Halo",
                            "    - hwmon: (lenovo-ec-sensors) Update P8 supprt",
                            "    - hwmon: (sbtsi_temp) AMD CPU extended temperature range support",
                            "    - pinctrl: renesas: rzg2l: Add suspend/resume support for Schmitt control",
                            "      registers",
                            "    - pinctrl: keembay: release allocated memory in detach path",
                            "    - power: supply: sbs-charger: Support multiple devices",
                            "    - io_uring/rsrc: respect submitter_task in io_register_clone_buffers()",
                            "    - hwmon: sy7636a: add alias",
                            "    - selftests/bpf: Fix incorrect array size calculation",
                            "    - block: check for valid bio while splitting",
                            "    - irqchip/loongson-pch-lpc: Use legacy domain for PCH-LPC IRQ controller",
                            "    - cpufreq: ondemand: Update the efficient idle check for Intel extended",
                            "      Families",
                            "    - arm64: zynqmp: Disable coresight by default",
                            "    - arm64: zynqmp: Revert usb node drive strength and slew rate for zcu106",
                            "    - soc/tegra: fuse: Add Tegra114 nvmem cells and fuse lookups",
                            "    - ARM: tegra: p880: set correct touchscreen clipping",
                            "    - ARM: tegra: transformer-20: add missing magnetometer interrupt",
                            "    - ARM: tegra: transformer-20: fix audio-codec interrupt",
                            "    - firmware: qcom: tzmem: disable sc7180 platform",
                            "    - soc: ti: k3-socinfo: Add information for AM62L SR1.1",
                            "    - mmc: sdhci-msm: Enable tuning for SDR50 mode for SD card",
                            "    - pwm: pca9685: Use bulk write to atomicially update registers",
                            "    - ACPICA: dispatcher: Use acpi_ds_clear_operands() in",
                            "      acpi_ds_call_control_method()",
                            "    - tee: allow a driver to allocate a tee_device without a pool",
                            "    - kunit: Enable PCI on UML without triggering WARN()",
                            "    - selftests/bpf: Fix arena_spin_lock selftest failure",
                            "    - bpf: Do not limit bpf_cgroup_from_id to current's namespace",
                            "    - i3c: mipi-i3c-hci-pci: Add support for Intel Wildcat Lake-U I3C",
                            "    - rust: kunit: allow `cfg` on `test`s",
                            "    - video: backlight: lp855x_bl: Set correct EPROM start for LP8556",
                            "    - i3c: dw: Add shutdown support to dw_i3c_master driver",
                            "    - io_uring/zcrx: check all niovs filled with dma addresses",
                            "    - tools/cpupower: fix error return value in cpupower_write_sysfs()",
                            "    - io_uring/zcrx: account niov arrays to cgroup",
                            "    - pmdomain: apple: Add \"apple,t8103-pmgr-pwrstate\"",
                            "    - power: supply: qcom_battmgr: handle charging state change notifications",
                            "    - bpftool: Fix -Wuninitialized-const-pointer warnings with clang >= 21",
                            "    - cpuidle: Fail cpuidle device registration if there is one already",
                            "    - selftests/bpf: Fix selftest verifier_arena_large failure",
                            "    - selftests: ublk: fix behavior when fio is not installed",
                            "    - spi: rpc-if: Add resume support for RZ/G3E",
                            "    - ACPI: SPCR: Support Precise Baud Rate field",
                            "    - clocksource/drivers/vf-pit: Replace raw_readl/writel to readl/writel",
                            "    - clocksource/drivers/timer-rtl-otto: Work around dying timers",
                            "    - clocksource/drivers/timer-rtl-otto: Do not interfere with interrupts",
                            "    - riscv: bpf: Fix uninitialized symbol 'retval_off'",
                            "    - bpf: Clear pfmemalloc flag when freeing all fragments",
                            "    - selftests: drv-net: Pull data before parsing headers",
                            "    - nvme: Use non zero KATO for persistent discovery connections",
                            "    - uprobe: Do not emulate/sstep original instruction when ip is changed",
                            "    - hwmon: (asus-ec-sensors) increase timeout for locking ACPI mutex",
                            "    - hwmon: (dell-smm) Remove Dell Precision 490 custom config data",
                            "    - hwmon: (dell-smm) Add support for Dell OptiPlex 7040",
                            "    - tools/cpupower: Fix incorrect size in cpuidle_state_disable()",
                            "    - selftests/bpf: Fix flaky bpf_cookie selftest",
                            "    - tools/power turbostat: Fix incorrect sorting of PMT telemetry",
                            "    - tools/power x86_energy_perf_policy: Fix incorrect fopen mode usage",
                            "    - tools/power x86_energy_perf_policy: Enhance HWP enable",
                            "    - tools/power x86_energy_perf_policy: Prefer driver HWP limits",
                            "    - mfd: simple-mfd-i2c: Add compatible strings for Layerscape QIXIS FPGA",
                            "    - mfd: stmpe: Remove IRQ domain upon removal",
                            "    - mfd: stmpe-i2c: Add missing MODULE_LICENSE",
                            "    - mfd: qnap-mcu: Handle errors returned from qnap_mcu_write",
                            "    - mfd: qnap-mcu: Include linux/types.h in qnap-mcu.h shared header",
                            "    - mfd: madera: Work around false-positive -Wininitialized warning",
                            "    - mfd: da9063: Split chip variant reading in two bus transactions",
                            "    - mfd: macsmc: Add \"apple,t8103-smc\" compatible",
                            "    - mfd: core: Increment of_node's refcount before linking it to the",
                            "      platform device",
                            "    - mfd: cs42l43: Move IRQ enable/disable to encompass force suspend",
                            "    - mfd: intel-lpss: Add Intel Wildcat Lake LPSS PCI IDs",
                            "    - drm/xe/ptl: Apply Wa_16026007364",
                            "    - drm/xe/configfs: Enforce canonical device names",
                            "    - drm/amd/display: Update tiled to tiled copy command",
                            "    - drm/amd/display: fix condition for setting timing_adjust_pending",
                            "    - drm/amd/display: ensure committing streams is seamless",
                            "    - drm/amdgpu: add range check for RAS bad page address",
                            "    - drm/amdgpu: Check vcn sram load return value",
                            "    - drm/amd/display: Remove check DPIA HPD status for BW Allocation",
                            "    - drm/amd/display: Increase AUX Intra-Hop Done Max Wait Duration",
                            "    - drm/amd/display: Fix dmub_cmd header alignment",
                            "    - drm/xe/guc: Add more GuC load error status codes",
                            "    - drm/xe/pf: Don't resume device from restart worker",
                            "    - drm/amdgpu: Fix build error when CONFIG_SUSPEND is disabled",
                            "    - drm/amdgpu: Update IPID value for bad page threshold CPER",
                            "    - drm/amdgpu: Avoid rma causes GPU duplicate reset",
                            "    - drm/amdgpu: Effective health check before reset",
                            "    - drm/amd/amdgpu: Release xcp drm memory after unplug",
                            "    - drm/amdgpu: Fix vcn v5.0.1 poison irq call trace",
                            "    - drm/xe: Extend wa_13012615864 to additional Xe2 and Xe3 platforms",
                            "    - drm/amdgpu: Skip poison aca bank from UE channel",
                            "    - drm/amd/display: add more cyan skillfish devices",
                            "    - drm/amdgpu: Initialize jpeg v5_0_1 ras function",
                            "    - drm/amdgpu: skip mgpu fan boost for multi-vf",
                            "    - drm/amd/display: fix dmub access race condition",
                            "    - drm/amd/display: update dpp/disp clock from smu clock table",
                            "    - drm/amd/pm: Use cached metrics data on aldebaran",
                            "    - drm/amd/pm: Use cached metrics data on arcturus",
                            "    - accel/amdxdna: Unify pm and rpm suspend and resume callbacks",
                            "    - drm/amdgpu/jpeg: Hold pg_lock before jpeg poweroff",
                            "    - drm/xe/pf: Program LMTT directory pointer on all GTs within a tile",
                            "    - drm/nouveau: replace snprintf() with scnprintf() in nvkm_snprintbf()",
                            "    - ASoC: tas2781: Add keyword \"init\" in profile section",
                            "    - ASoC: mediatek: Use SND_JACK_AVOUT for HDMI/DP jacks",
                            "    - drm/amd/display: Reset apply_eamless_boot_optimization when dpms_off",
                            "    - drm/amdgpu: add to custom amdgpu_drm_release drm_dev_enter/exit",
                            "    - drm/amd/display: Wait until OTG enable state is cleared",
                            "    - drm/xe: rework PDE PAT index selection",
                            "    - docs: kernel-doc: avoid script crash on ancient Python",
                            "    - drm/sharp-memory: Do not access GEM-DMA vaddr directly",
                            "    - PCI: Disable MSI on RDC PCI to PCIe bridges",
                            "    - drm/nouveau: always set RMDevidCheckIgnore for GSP-RM",
                            "    - drm/panel-edp: Add SHP LQ134Z1 panel for Dell XPS 9345",
                            "    - selftests/net: Replace non-standard __WORDSIZE with sizeof(long) * 8",
                            "    - selftests/net: Ensure assert() triggers in psock_tpacket.c",
                            "    - wifi: rtw89: print just once for unknown C2H events",
                            "    - wifi: rtw88: sdio: use indirect IO for device registers before power-on",
                            "    - wifi: rtw89: add dummy C2H handlers for BCN resend and update done",
                            "    - drm/amdkfd: return -ENOTTY for unsupported IOCTLs",
                            "    - selftests: drv-net: devmem: add / correct the IPv6 support",
                            "    - selftests: drv-net: devmem: flip the direction of Tx tests",
                            "    - media: pci: ivtv: Don't create fake v4l2_fh",
                            "    - media: amphion: Delete v4l2_fh synchronously in .release()",
                            "    - drm/tidss: Use the crtc_* timings when programming the HW",
                            "    - drm/bridge: cdns-dsi: Fix REG_WAKEUP_TIME value",
                            "    - drm/bridge: cdns-dsi: Don't fail on MIPI_DSI_MODE_VIDEO_BURST",
                            "    - drm/tidss: Set crtc modesetting parameters with adjusted mode",
                            "    - drm/tidss: Remove early fb",
                            "    - RDMA/mana_ib: Drain send wrs of GSI QP",
                            "    - media: i2c: Kconfig: Ensure a dependency on HAVE_CLK for",
                            "      VIDEO_CAMERA_SENSOR",
                            "    - PCI/ERR: Update device error_state already after reset",
                            "    - x86/vsyscall: Do not require X86_PF_INSTR to emulate vsyscall",
                            "    - net: stmmac: Check stmmac_hw_setup() in stmmac_resume()",
                            "    - ice: Don't use %pK through printk or tracepoints",
                            "    - thunderbolt: Use is_pciehp instead of is_hotplug_bridge",
                            "    - ASoC: es8323: enable DAPM power widgets for playback DAC and output",
                            "    - powerpc/eeh: Use result of error_detected() in uevent",
                            "    - s390/pci: Use pci_uevent_ers() in PCI recovery",
                            "    - bridge: Redirect to backup port when port is administratively down",
                            "    - selftests: drv-net: wait for carrier",
                            "    - net: phy: mscc: report and configure in-band auto-negotiation for",
                            "      SGMII/QSGMII",
                            "    - scsi: ufs: host: mediatek: Fix auto-hibern8 timer configuration",
                            "    - scsi: ufs: host: mediatek: Fix PWM mode switch issue",
                            "    - scsi: ufs: host: mediatek: Assign power mode userdata before FASTAUTO",
                            "      mode change",
                            "    - scsi: ufs: host: mediatek: Change reset sequence for improved stability",
                            "    - scsi: ufs: host: mediatek: Fix invalid access in vccqx handling",
                            "    - gpu: nova-core: register: allow fields named `offset`",
                            "    - drm/panthor: Serialize GPU cache flush operations",
                            "    - HID: pidff: Use direction fix only for conditional effects",
                            "    - HID: pidff: PERMISSIVE_CONTROL quirk autodetection",
                            "    - drm/bridge: display-connector: don't set OP_DETECT for DisplayPorts",
                            "    - drm/amdkfd: Handle lack of READ permissions in SVM mapping",
                            "    - drm/amdgpu: refactor bad_page_work for corner case handling",
                            "    - hwrng: timeriomem - Use us_to_ktime() where appropriate",
                            "    - iio: adc: spear_adc: mask SPEAR_ADC_STATUS channel and avg sample before",
                            "      setting register",
                            "    - iio: adc: imx93_adc: load calibrated values even calibration failed",
                            "    - usb: gadget: f_ncm: Fix MAC assignment NCM ethernet",
                            "    - ASoC: es8323: remove DAC enablement write from es8323_probe",
                            "    - ASoC: es8323: add proper left/right mixer controls via DAPM",
                            "    - ASoC: codecs: wsa883x: Handle shared reset GPIO for WSA883x speakers",
                            "    - drm/xe: Make page size consistent in loop",
                            "    - wifi: rtw89: wow: remove notify during WoWLAN net-detect",
                            "    - wifi: rtw89: fix BSSID comparison for non-transmitted BSSID",
                            "    - wifi: rtw89: 8851b: rfk: update IQK TIA setting",
                            "    - dm error: mark as DM_TARGET_PASSES_INTEGRITY",
                            "    - char: misc: Make misc_register() reentry for miscdevice who wants",
                            "      dynamic minor",
                            "    - char: misc: Does not request module for miscdevice with dynamic minor",
                            "    - net: When removing nexthops, don't call synchronize_net if it is not",
                            "      necessary",
                            "    - net: Call trace_sock_exceed_buf_limit() for memcg failure with",
                            "      SK_MEM_RECV.",
                            "    - dmaengine: idxd: Add a new IAA device ID for Wildcat Lake family",
                            "      platforms",
                            "    - PCI/P2PDMA: Fix incorrect pointer usage in devm_kfree() call",
                            "    - bnxt_en: Add Hyper-V VF ID",
                            "    - tty: serial: Modify the use of dev_err_probe()",
                            "    - ALSA: usb-audio: Add validation of UAC2/UAC3 effect units",
                            "    - Octeontx2-af: Broadcast XON on all channels",
                            "    - idpf: do not linearize big TSO packets",
                            "    - drm/xe/pcode: Initialize data0 for pcode read routine",
                            "    - drm/panel: ilitek-ili9881c: turn off power-supply when init fails",
                            "    - drm/panel: ilitek-ili9881c: move display_on/_off dcs calls to",
                            "      (un-)prepare",
                            "    - rds: Fix endianness annotation for RDS_MPATH_HASH",
                            "    - net: wangxun: limit tx_max_coalesced_frames_irq",
                            "    - iio: imu: bmi270: Match PNP ID found on newer GPD firmware",
                            "    - media: ipu6: isys: Set embedded data type correctly for metadata formats",
                            "    - rpmsg: char: Export alias for RPMSG ID rpmsg-raw from table",
                            "    - net: ipv4: allow directed broadcast routes to use dst hint",
                            "    - scsi: mpi3mr: Fix device loss during enclosure reboot due to zero link",
                            "      speed",
                            "    - wifi: rtw89: coex: Limit Wi-Fi scan slot cost to avoid A2DP glitch",
                            "    - scsi: mpi3mr: Fix I/O failures during controller reset",
                            "    - scsi: mpi3mr: Fix controller init failure on fault during queue creation",
                            "    - scsi: pm80xx: Fix race condition caused by static variables",
                            "    - extcon: adc-jack: Fix wakeup source leaks on device unbind",
                            "    - extcon: fsa9480: Fix wakeup source leaks on device unbind",
                            "    - extcon: axp288: Fix wakeup source leaks on device unbind",
                            "    - drm/xe: Set GT as wedged before sending wedged uevent",
                            "    - remoteproc: wkup_m3: Use devm_pm_runtime_enable() helper",
                            "    - drm/xe/wcl: Extend L3bank mask workaround",
                            "    - net: phy: fixed_phy: let fixed_phy_unregister free the phy_device",
                            "    - selftests: drv-net: hds: restore hds settings",
                            "    - fuse: zero initialize inode private data",
                            "    - virtio_fs: fix the hash table using in virtio_fs_enqueue_req()",
                            "    - selftests: pci_endpoint: Skip IRQ test if IRQ is out of range.",
                            "    - drm/xe: Ensure GT is in C0 during resumes",
                            "    - misc: pci_endpoint_test: Skip IRQ tests if irq is out of range",
                            "    - drm/amdgpu: Correct the loss of aca bank reg info",
                            "    - drm/amdgpu: Correct the counts of nr_banks and nr_errors",
                            "    - drm/amdkfd: fix vram allocation failure for a special case",
                            "    - drm/amd/display: Support HW cursor 180 rot for any number of pipe splits",
                            "    - drm/amdkfd: Tie UNMAP_LATENCY to queue_preemption",
                            "    - drm/amd/display: wait for otg update pending latch before clock",
                            "      optimization",
                            "    - drm/amd/display: Consider sink max slice width limitation for dsc",
                            "    - drm/amdgpu/vpe: cancel delayed work in hw_fini",
                            "    - drm/xe: Cancel pending TLB inval workers on teardown",
                            "    - net: Prevent RPS table overwrite of active flows",
                            "    - eth: fbnic: Reset hw stats upon PCI error",
                            "    - wifi: iwlwifi: mld: trigger mlo scan only when not in EMLSR",
                            "    - platform/x86/intel-uncore-freq: Fix warning in partitioned system",
                            "    - drm/msm/dpu: Filter modes based on adjusted mode clock",
                            "    - drm/msm: Use of_reserved_mem_region_to_resource() for \"memory-region\"",
                            "    - selftests: drv-net: rss_ctx: fix the queue count check",
                            "    - media: fix uninitialized symbol warnings",
                            "    - media: pci: mgb4: Fix timings comparison in VIDIOC_S_DV_TIMINGS",
                            "    - ASoC: SOF: ipc4-pcm: Add fixup for channels",
                            "    - drm/amdgpu: Notify pmfw bad page threshold exceeded",
                            "    - drm/amd/display: Increase minimum clock for TMDS 420 with pipe splitting",
                            "    - drm/amdgpu: Avoid jpeg v5.0.1 poison irq call trace on sriov guest",
                            "    - drm/amd/display: incorrect conditions for failing dto calculations",
                            "    - drm/amdgpu: Avoid vcn v5.0.1 poison irq call trace on sriov guest",
                            "    - drm/amdgpu: Respect max pixel clock for HDMI and DVI-D (v2)",
                            "    - mips: lantiq: danube: add missing properties to cpu node",
                            "    - mips: lantiq: danube: add model to EASY50712 dts",
                            "    - mips: lantiq: danube: add missing device_type in pci node",
                            "    - mips: lantiq: xway: sysctrl: rename stp clock",
                            "    - mips: lantiq: danube: rename stp node on EASY50712 reference board",
                            "    - inet_diag: annotate data-races in inet_diag_bc_sk()",
                            "    - microchip: lan865x: add ndo_eth_ioctl handler to enable PHY ioctl",
                            "      support",
                            "    - crypto: qat - use kcalloc() in qat_uclo_map_objs_from_mof()",
                            "    - scsi: pm8001: Use int instead of u32 to store error codes",
                            "    - iio: adc: ad7124: do not require mclk",
                            "    - scsi: ufs: exynos: fsd: Gate ref_clk and put UFS device in reset on",
                            "      suspend",
                            "    - media: imx-mipi-csis: Only set clock rate when specified in DT",
                            "    - wifi: iwlwifi: pcie: remember when interrupts are disabled",
                            "    - drm/st7571-i2c: add support for inverted pixel format",
                            "    - ptp: Limit time setting of PTP clocks",
                            "    - dmaengine: sh: setup_xref error handling",
                            "    - dmaengine: mv_xor: match alloc_wc and free_wc",
                            "    - dmaengine: dw-edma: Set status for callback_result",
                            "    - netfilter: nf_tables: all transaction allocations can now sleep",
                            "    - drm/msm/dsi/phy: Toggle back buffer resync after preparing PLL",
                            "    - drm/msm/dsi/phy_7nm: Fix missing initial VCO rate",
                            "    - drm/amdgpu: Allow kfd CRIU with no buffer objects",
                            "    - drm/xe/guc: Increase GuC crash dump buffer size",
                            "    - drm/amd/pm: Increase SMC timeout on SI and warn (v3)",
                            "    - move_mount(2): take sanity checks in 'beneath' case into do_lock_mount()",
                            "    - selftests: drv-net: rss_ctx: make the test pass with few queues",
                            "    - ipv6: Add sanity checks on ipv6_devconf.rpl_seg_enabled",
                            "    - drm/xe: Extend Wa_22021007897 to Xe3 platforms",
                            "    - wifi: mac80211: count reg connection element in the size",
                            "    - drm/panthor: check bo offset alignment in vm bind",
                            "    - drm: panel-backlight-quirks: Make EDID match optional",
                            "    - ixgbe: reduce number of reads when getting OROM data",
                            "    - netlink: specs: fou: change local-v6/peer-v6 check",
                            "    - net: nfc: nci: Increase NCI_DATA_TIMEOUT to 3000 ms",
                            "    - media: adv7180: Add missing lock in suspend callback",
                            "    - media: adv7180: Do not write format to device in set_fmt",
                            "    - media: adv7180: Only validate format in querystd",
                            "    - media: verisilicon: Explicitly disable selection api ioctls for decoders",
                            "    - wifi: mac80211: Fix 6 GHz Band capabilities element advertisement in",
                            "      lower bands",
                            "    - platform/x86: think-lmi: Add extra TC BIOS error messages",
                            "    - platform/x86/intel-uncore-freq: Present unique domain ID per package",
                            "    - ALSA: usb-audio: apply quirk for MOONDROP Quark2",
                            "    - PCI: imx6: Enable the Vaux supply if available",
                            "    - drm/xe/guc: Set upper limit of H2G retries over CTB",
                            "    - net: call cond_resched() less often in __release_sock()",
                            "    - smsc911x: add second read of EEPROM mac when possible corruption seen",
                            "    - drm/xe: improve dma-resv handling for backup object",
                            "    - iommu/amd: Add support to remap/unmap IOMMU buffers for kdump",
                            "    - iommu/amd: Skip enabling command/event buffers for kdump",
                            "    - iommu/amd: Reuse device table for kdump",
                            "    - crypto: ccp: Skip SEV and SNP INIT for kdump boot",
                            "    - iommu/apple-dart: Clear stream error indicator bits for T8110 DARTs",
                            "    - bus: mhi: host: pci_generic: Add support for all Foxconn T99W696 SKU",
                            "      variants",
                            "    - drm/amdgpu: Correct info field of bad page threshold exceed CPER",
                            "    - drm/amd: add more cyan skillfish PCI ids",
                            "    - drm/amdgpu: don't enable SMU on cyan skillfish",
                            "    - drm/amdgpu: add support for cyan skillfish gpu_info",
                            "    - drm/amd/display: Fix pbn_div Calculation Error",
                            "    - drm/amd/display: dont wait for pipe update during medupdate/highirq",
                            "    - drm/amd/pm: refine amdgpu pm sysfs node error code",
                            "    - drm/amd/display: Indicate when custom brightness curves are in use",
                            "    - selftests: ncdevmem: don't retry EFAULT",
                            "    - net: dsa: felix: support phy-mode = \"10g-qxgmii\"",
                            "    - usb: gadget: f_hid: Fix zero length packet transfer",
                            "    - serial: qcom-geni: Add DFS clock mode support to GENI UART driver",
                            "    - serdev: Drop dev_pm_domain_detach() call",
                            "    - tty/vt: Add missing return value for VT_RESIZE in vt_ioctl()",
                            "    - eeprom: at25: support Cypress FRAMs without device ID",
                            "    - drm/msm/adreno: Add speedbins for A663 GPU",
                            "    - drm/msm: Fix 32b size truncation",
                            "    - dt-bindings: display/msm/gmu: Update Adreno 623 bindings",
                            "    - drm/msm: make sure to not queue up recovery more than once",
                            "    - char: Use list_del_init() in misc_deregister() to reinitialize list",
                            "      pointer",
                            "    - drm/msm/adreno: Add speedbin data for A623 GPU",
                            "    - drm/msm/adreno: Add fenced regwrite support",
                            "    - drm/msm/a6xx: Switch to GMU AO counter",
                            "    - idpf: link NAPIs to queues",
                            "    - selftests: net: make the dump test less sensitive to mem accounting",
                            "    - PCI: endpoint: pci-epf-test: Limit PCIe BAR size for fixed BARs",
                            "    - wifi: rtw89: Add USB ID 2001:332a for D-Link AX9U rev. A1",
                            "    - wifi: rtw89: Add USB ID 2001:3327 for D-Link AX18U rev. A1",
                            "    - wifi: iwlwifi: fw: Add ASUS to PPAG and TAS list",
                            "    - drm/xe/i2c: Enable bus mastering",
                            "    - media: ov08x40: Fix the horizontal flip control",
                            "    - media: i2c: og01a1b: Specify monochrome media bus format instead of",
                            "      Bayer",
                            "    - media: qcom: camss: csiphy-3ph: Add CSIPHY 2ph DPHY v2.0.1 init sequence",
                            "    - drm/bridge: write full Audio InfoFrame",
                            "    - drm/xe/guc: Always add CT disable action during second init step",
                            "    - f2fs: fix wrong layout information on 16KB page",
                            "    - selftests: mptcp: join: allow more time to send ADD_ADDR",
                            "    - scsi: ufs: host: mediatek: Enhance recovery on resume failure",
                            "    - scsi: ufs: ufs-qcom: Align programming sequence of Shared ICE for UFS",
                            "      controller v5",
                            "    - scsi: ufs: host: mediatek: Fix unbalanced IRQ enable issue",
                            "    - scsi: ufs: host: mediatek: Enhance recovery on hibernation exit failure",
                            "    - net: phy: marvell: Fix 88e1510 downshift counter errata",
                            "    - scsi: ufs: host: mediatek: Correct system PM flow",
                            "    - scsi: ufs: host: mediatek: Disable auto-hibern8 during power mode",
                            "      changes",
                            "    - scsi: ufs: host: mediatek: Fix adapt issue after PA_Init",
                            "    - wifi: cfg80211: update the time stamps in hidden ssid",
                            "    - wifi: mac80211: Fix HE capabilities element check",
                            "    - fbcon: Use screen info to find primary device",
                            "    - phy: cadence: cdns-dphy: Enable lower resolutions in dphy",
                            "    - Fix access to video_is_primary_device() when compiled without",
                            "      CONFIG_VIDEO",
                            "    - phy: renesas: r8a779f0-ether-serdes: add new step added to latest",
                            "      datasheet",
                            "    - phy: rockchip: phy-rockchip-inno-csidphy: allow writes to grf register 0",
                            "    - drm/msm/registers: Generate _HI/LO builders for reg64",
                            "    - net: sh_eth: Disable WoL if system can not suspend",
                            "    - selftests: net: replace sleeps in fcnal-test with waits",
                            "    - media: redrat3: use int type to store negative error codes",
                            "    - platform/x86/amd/pmf: Fix the custom bios input handling mechanism",
                            "    - selftests: traceroute: Use require_command()",
                            "    - selftests: traceroute: Return correct value on failure",
                            "    - openrisc: Add R_OR1K_32_PCREL relocation type module support",
                            "    - netfilter: nf_reject: don't reply to icmp error messages",
                            "    - x86/kvm: Prefer native qspinlock for dedicated vCPUs irrespective of",
                            "      PV_UNHALT",
                            "    - x86/virt/tdx: Use precalculated TDVPR page physical address",
                            "    - selftests: Disable dad for ipv6 in fcnal-test.sh",
                            "    - eth: 8139too: Make 8139TOO_PIO depend on !NO_IOPORT_MAP",
                            "    - [Config] No longer enable `CONFIG_8139TOO_PIO` for armhf",
                            "    - selftests: Replace sleep with slowwait",
                            "    - net: devmem: expose tcp_recvmsg_locked errors",
                            "    - selftests: net: lib.sh: Don't defer failed commands",
                            "    - HID: asus: add Z13 folio to generic group for multitouch to work",
                            "    - watchdog: s3c2410_wdt: Fix max_timeout being calculated larger",
                            "    - crypto: sun8i-ce - remove channel timeout field",
                            "    - PCI: dwc: Verify the single eDMA IRQ in dw_pcie_edma_irq_verify()",
                            "    - crypto: ccp - Fix incorrect payload size calculation in",
                            "      psp_poulate_hsti()",
                            "    - crypto: caam - double the entropy delay interval for retry",
                            "    - can: rcar_canfd: Update bit rate constants for RZ/G3E and R-Car Gen4",
                            "    - net: mana: Reduce waiting time if HWC not responding",
                            "    - ionic: use int type for err in ionic_get_module_eeprom_by_page",
                            "    - net/cls_cgroup: Fix task_get_classid() during qdisc run",
                            "    - wifi: mt76: mt7921: Add 160MHz beamformee capability for mt7922 device",
                            "    - wifi: mt76: mt7925: add pci restore for hibernate",
                            "    - wifi: mt76: mt7996: Fix mt7996_reverse_frag0_hdr_trans for MLO",
                            "    - wifi: mt76: mt7996: Set def_wcid pointer in mt7996_mac_sta_init_link()",
                            "    - wifi: mt76: mt7996: Temporarily disable EPCS",
                            "    - wifi: mt76: mt7996: support writing MAC TXD for AddBA Request",
                            "    - wifi: mt76: mt76_eeprom_override to int",
                            "    - ALSA: serial-generic: remove shared static buffer",
                            "    - wifi: mt76: mt7996: fix memory leak on mt7996_mcu_sta_key_tlv error",
                            "    - wifi: mt76: mt7996: disable promiscuous mode by default",
                            "    - wifi: mt76: use altx queue for offchannel tx on connac+",
                            "    - wifi: mt76: improve phy reset on hw restart",
                            "    - drm/amdgpu: Use memdup_array_user in amdgpu_cs_wait_fences_ioctl",
                            "    - drm/amdgpu: Release hive reference properly",
                            "    - drm/amd/display: Fix DMCUB loading sequence for DCN3.2",
                            "    - drm/amd/display: Set up pixel encoding for YCBCR422",
                            "    - drm/amd/display: fix dml ms order of operations",
                            "    - drm/amd/display: Don't use non-registered VUPDATE on DCE 6",
                            "    - drm/amd/display: Keep PLL0 running on DCE 6.0 and 6.4",
                            "    - drm/amd/display: Fix DVI-D/HDMI adapters",
                            "    - drm/amd/display: Disable VRR on DCE 6",
                            "    - drm/amd/display/dml2: Guard dml21_map_dc_state_into_dml_display_cfg with",
                            "      DC_FP_START",
                            "    - net: phy: clear EEE runtime state in PHY_HALTED/PHY_ERROR",
                            "    - ethernet: Extend device_get_mac_address() to use NVMEM",
                            "    - scsi: ufs: ufs-qcom: Disable lane clocks during phy hibern8",
                            "    - HID: i2c-hid: Resolve touchpad issues on Dell systems during S4",
                            "    - hinic3: Queue pair endianness improvements",
                            "    - hinic3: Fix missing napi->dev in netif_queue_set_napi",
                            "    - tools: ynl-gen: validate nested arrays",
                            "    - drm/xe/guc: Return an error code if the GuC load fails",
                            "    - drm/amdgpu: reject gang submissions under SRIOV",
                            "    - selftests/Makefile: include $(INSTALL_DEP_TARGETS) in clean target to",
                            "      clean net/lib dependency",
                            "    - scsi: ufs: core: Disable timestamp functionality if not supported",
                            "    - scsi: lpfc: Clean up allocated queues when queue setup mbox commands",
                            "      fail",
                            "    - scsi: lpfc: Decrement ndlp kref after FDISC retries exhausted",
                            "    - scsi: lpfc: Check return status of lpfc_reset_flush_io_context during",
                            "      TGT_RESET",
                            "    - scsi: lpfc: Remove ndlp kref decrement clause for F_Port_Ctrl in",
                            "      lpfc_cleanup",
                            "    - scsi: lpfc: Define size of debugfs entry for xri rebalancing",
                            "    - scsi: lpfc: Ensure PLOGI_ACC is sent prior to PRLI in Point to Point",
                            "      topology",
                            "    - allow finish_no_open(file, ERR_PTR(-E...))",
                            "    - usb: mon: Increase BUFF_MAX to 64 MiB to support multi-MB URBs",
                            "    - usb: xhci: plat: Facilitate using autosuspend for xhci plat devices",
                            "    - wifi: rtw89: disable RTW89_PHYSTS_IE09_FTR_0 for ppdu status",
                            "    - wifi: rtw89: obtain RX path from ppdu status IE00",
                            "    - wifi: rtw89: renew a completion for each H2C command waiting C2H event",
                            "    - usb: xhci-pci: add support for hosts with zero USB3 ports",
                            "    - ipv6: np->rxpmtu race annotation",
                            "    - RDMA/irdma: Update Kconfig",
                            "    - IB/ipoib: Ignore L3 master device",
                            "    - bnxt_en: Add fw log trace support for 5731X/5741X chips",
                            "    - mei: make a local copy of client uuid in connect",
                            "    - ASoC: qcom: sc8280xp: explicitly set S16LE format in",
                            "      sc8280xp_be_hw_params_fixup()",
                            "    - net: phy: clear link parameters on admin link down",
                            "    - net: ethernet: microchip: sparx5: make it selectable for ARCH_LAN969X",
                            "    - bus: mhi: core: Improve mhi_sync_power_up handling for SYS_ERR state",
                            "    - iommu/vt-d: Replace snprintf with scnprintf in dmar_latency_snapshot()",
                            "    - wifi: ath10k: Fix connection after GTK rekeying",
                            "    - iommu/vt-d: Remove LPIG from page group response descriptor",
                            "    - wifi: mac80211: Get the correct interface for non-netdev skb status",
                            "    - wifi: mac80211: Track NAN interface start/stop",
                            "    - net: intel: fm10k: Fix parameter idx set but not used",
                            "    - sparc/module: Add R_SPARC_UA64 relocation handling",
                            "    - sparc64: fix prototypes of reads[bwl]()",
                            "    - vfio: return -ENOTTY for unsupported device feature",
                            "    - ptp_ocp: make ptp_ocp driver compatible with PTP_EXTTS_REQUEST2",
                            "    - crypto: hisilicon/qm - invalidate queues in use",
                            "    - crypto: hisilicon/qm - clear all VF configurations in the hardware",
                            "    - ASoC: ops: improve snd_soc_get_volsw",
                            "    - PCI/PM: Skip resuming to D0 if device is disconnected",
                            "    - selftests: forwarding: Reorder (ar)ping arguments to obey POSIX getopt",
                            "    - remoteproc: qcom: q6v5: Avoid handling handover twice",
                            "    - wifi: ath12k: Increase DP_REO_CMD_RING_SIZE to 256",
                            "    - net: dsa: microchip: Set SPI as bus interface during reset for KSZ8463",
                            "    - bng_en: make bnge_alloc_ring() self-unwind on failure",
                            "    - ALSA: usb-audio: don't apply interface quirk to Presonus S1824c",
                            "    - tcp: Update bind bucket state on port release",
                            "    - ovl: make sure that ovl_create_real() returns a hashed dentry",
                            "    - drm/amd/display: Add missing post flip calls",
                            "    - drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream",
                            "    - drm/amd/display: Add fast sync field in ultra sleep more for DMUB",
                            "    - drm/amd/display: Init dispclk from bootup clock for DCN314",
                            "    - drm/amd/display: Fix for test crash due to power gating",
                            "    - drm/amd/display: change dc stream color settings only in atomic commit",
                            "    - NFSv4: handle ERR_GRACE on delegation recalls",
                            "    - NFSv4.1: fix mount hang after CREATE_SESSION failure",
                            "    - net: bridge: Install FDB for bridge MAC on VLAN 0",
                            "    - net: phy: dp83640: improve phydev and driver removal handling",
                            "    - scsi: ufs: core: Change MCQ interrupt enable flow",
                            "    - scsi: libfc: Fix potential buffer overflow in fc_ct_ms_fill()",
                            "    - accel/habanalabs/gaudi2: fix BMON disable configuration",
                            "    - scsi: mpt3sas: Add support for 22.5 Gbps SAS link rate",
                            "    - accel/habanalabs: return ENOMEM if less than requested pages were pinned",
                            "    - accel/habanalabs/gaudi2: read preboot status after recovering from dirty",
                            "      state",
                            "    - ASoC: renesas: msiof: add .symmetric_xxx on snd_soc_dai_driver",
                            "    - ASoC: renesas: msiof: use reset controller",
                            "    - ASoC: renesas: msiof: tidyup DMAC stop timing",
                            "    - ASoC: renesas: msiof: set SIFCTR register",
                            "    - ext4: increase IO priority of fastcommit",
                            "    - drm/amdgpu: Add fallback to pipe reset if KCQ ring reset fails",
                            "    - drm/amdgpu: Fix fence signaling race condition in userqueue",
                            "    - ASoC: stm32: sai: manage context in set_sysclk callback",
                            "    - ASoC: tlv320aic3x: Fix class-D initialization for tlv320aic3007",
                            "    - ACPI: scan: Update honor list for RPMI System MSI",
                            "    - platform/x86: x86-android-tablets: Stop using EPROBE_DEFER",
                            "    - vfio/pci: Fix INTx handling on legacy non-PCI 2.3 devices",
                            "    - vfio/nvgrace-gpu: Add GB300 SKU to the devid table",
                            "    - selftest: net: Fix error message if empty variable",
                            "    - net/mlx5e: Don't query FEC statistics when FEC is disabled",
                            "    - Bluetooth: btintel: Add support for BlazarIW core",
                            "    - net: macb: avoid dealing with endianness in macb_set_hwaddr()",
                            "    - Bluetooth: btusb: Add new VID/PID 13d3/3627 for MT7925",
                            "    - Bluetooth: btintel_pcie: Define hdev->wakeup() callback",
                            "    - Bluetooth: ISO: Don't initiate CIS connections if there are no buffers",
                            "    - Bluetooth: btusb: Check for unexpected bytes when defragmenting HCI",
                            "      frames",
                            "    - Bluetooth: ISO: Use sk_sndtimeo as conn_timeout",
                            "    - Bluetooth: btusb: Add new VID/PID 13d3/3633 for MT7922",
                            "    - net: stmmac: est: Drop frames causing HLBS error",
                            "    - exfat: limit log print for IO error",
                            "    - 6pack: drop redundant locking and refcounting",
                            "    - page_pool: Clamp pool size to max 16K pages",
                            "    - net/mlx5e: Prevent entering switchdev mode with inconsistent netns",
                            "    - ksmbd: use sock_create_kern interface to create kernel socket",
                            "    - smb: client: update cfid->last_access_time in",
                            "      open_cached_dir_by_dentry()",
                            "    - smb: client: transport: avoid reconnects triggered by pending task work",
                            "    - usb: xhci-pci: Fix USB2-only root hub registration",
                            "    - drm/amd/display: Add fallback path for YCBCR422",
                            "    - ACPICA: Update dsmethod.c to get rid of unused variable warning",
                            "    - RDMA/bnxt_re: Fix a potential memory leak in destroy_gsi_sqp",
                            "    - RDMA/irdma: Fix SD index calculation",
                            "    - RDMA/irdma: Remove unused struct irdma_cq fields",
                            "    - RDMA/irdma: Set irdma_cq cq_num field during CQ create",
                            "    - RDMA/uverbs: Fix umem release in UVERBS_METHOD_CQ_CREATE",
                            "    - RDMA/hns: Fix recv CQ and QP cache affinity",
                            "    - RDMA/hns: Fix the modification of max_send_sge",
                            "    - RDMA/hns: Fix wrong WQE data when QP wraps around",
                            "    - btrfs: mark dirty extent range for out of bound prealloc extents",
                            "    - clk: qcom: gcc-ipq6018: rework nss_port5 clock to multiple conf",
                            "    - clk: renesas: rzv2h: Re-assert reset on deassert timeout",
                            "    - clk: samsung: exynos990: Add missing USB clock registers to HSI0",
                            "    - fs/hpfs: Fix error code for new_inode() failure in",
                            "      mkdir/create/mknod/symlink",
                            "    - clocksource: hyper-v: Skip unnecessary checks for the root partition",
                            "    - hyperv: Add missing field to hv_output_map_device_interrupt",
                            "    - um: Fix help message for ssl-non-raw",
                            "    - clk: sunxi-ng: sun6i-rtc: Add A523 specifics",
                            "    - rtc: pcf2127: clear minute/second interrupt",
                            "    - ARM: at91: pm: save and restore ACR during PLL disable/enable",
                            "    - clk: at91: add ACR in all PLL settings",
                            "    - clk: at91: sam9x7: Add peripheral clock id for pmecc",
                            "    - clk: at91: clk-master: Add check for divide by 3",
                            "    - clk: at91: clk-sam9x60-pll: force write to PLL_UPDT register",
                            "    - clk: ti: am33xx: keep WKUP_DEBUGSS_CLKCTRL enabled",
                            "    - clk: scmi: Add duty cycle ops only when duty cycle is supported",
                            "    - clk: clocking-wizard: Fix output clock register offset for Versal",
                            "      platforms",
                            "    - NTB: epf: Allow arbitrary BAR mapping",
                            "    - 9p: fix /sys/fs/9p/caches overwriting itself",
                            "    - cpufreq: tegra186: Initialize all cores to max frequencies",
                            "    - 9p: sysfs_init: don't hardcode error to ENOMEM",
                            "    - scsi: ufs: core: Include UTP error in INT_FATAL_ERRORS",
                            "    - fbdev: core: Fix ubsan warning in pixel_to_pat",
                            "    - ACPI: property: Return present device nodes only on fwnode interface",
                            "    - LoongArch: Handle new atomic instructions for probes",
                            "    - tools bitmap: Add missing asm-generic/bitsperlong.h include",
                            "    - tools: lib: thermal: don't preserve owner in install",
                            "    - tools: lib: thermal: use pkg-config to locate libnl3",
                            "    - ALSA: hda/realtek: Add quirk for ASUS ROG Zephyrus Duo",
                            "    - rtc: zynqmp: Restore alarm functionality after kexec transition",
                            "    - rtc: pcf2127: fix watchdog interrupt mask on pcf2131",
                            "    - net: wwan: t7xx: add support for HP DRMR-H01",
                            "    - kbuild: uapi: Strip comments before size type check",
                            "    - ASoC: meson: aiu-encoder-i2s: fix bit clock polarity",
                            "    - ASoC: rt722: add settings for rt722VB",
                            "    - drm/amdgpu: Report individual reset error",
                            "    - ceph: add checking of wait_for_completion_killable() return value",
                            "    - ceph: fix potential race condition in ceph_ioctl_lazyio()",
                            "    - ceph: refactor wake_up_bit() pattern of calling",
                            "    - x86: uaccess: don't use runtime-const rewriting in modules",
                            "    - rust: condvar: fix broken intra-doc link",
                            "    - rust: devres: fix private intra-doc link",
                            "    - rust: kbuild: workaround `rustdoc` doctests modifier bug",
                            "    - rust: kbuild: treat `build_error` and `rustdoc` as kernel objects",
                            "    - media: uvcvideo: Use heuristic to find stream entity",
                            "    - Revert \"wifi: ath10k: avoid unnecessary wait for service ready message\"",
                            "    - tracing: tprobe-events: Fix to register tracepoint correctly",
                            "    - tracing: tprobe-events: Fix to put tracepoint_user when disable the",
                            "      tprobe",
                            "    - net: libwx: fix device bus LAN ID",
                            "    - scsi: ufs: core: Fix a race condition related to the \"hid\" attribute",
                            "      group",
                            "    - riscv: ptdump: use seq_puts() in pt_dump_seq_puts() macro",
                            "    - Revert \"wifi: ath12k: Fix missing station power save configuration\"",
                            "    - scsi: ufs: core: Revert \"Make HID attributes visible\"",
                            "    - Bluetooth: btrtl: Fix memory leak in rtlbt_parse_firmware_v2()",
                            "    - net: dsa: tag_brcm: legacy: fix untagged rx on unbridged ports for",
                            "      bcm63xx",
                            "    - selftests/net: fix out-of-order delivery of FIN in gro:tcp test",
                            "    - selftests/net: use destination options instead of hop-by-hop",
                            "    - selftests: netdevsim: Fix ethtool-coalesce.sh fail by installing",
                            "      ethtool-common.sh",
                            "    - net: vlan: sync VLAN features with lower device",
                            "    - net: dsa: b53: fix resetting speed and pause on forced link",
                            "    - net: dsa: b53: fix bcm63xx RGMII port link adjustment",
                            "    - net: dsa: b53: fix enabling ip multicast",
                            "    - net: dsa: b53: stop reading ARL entries if search is done",
                            "    - net: dsa: b53: properly bound ARL searches for < 4 ARL bin chips",
                            "    - sctp: Hold RCU read lock while iterating over address list",
                            "    - sctp: Hold sock lock while iterating over address list",
                            "    - net: ionic: add dma_wmb() before ringing TX doorbell",
                            "    - net: ionic: map SKB after pseudo-header checksum prep",
                            "    - octeontx2-pf: Fix devm_kcalloc() error checking",
                            "    - bnxt_en: Fix a possible memory leak in bnxt_ptp_init",
                            "    - bnxt_en: Always provide max entry and entry size in coredump segments",
                            "    - bnxt_en: Fix warning in bnxt_dl_reload_down()",
                            "    - wifi: mac80211_hwsim: Limit destroy_on_close radio removal to netgroup",
                            "    - io_uring: fix types for region size calulation",
                            "    - net/mlx5e: Fix return value in case of module EEPROM read error",
                            "    - net: ti: icssg-prueth: Fix fdb hash size configuration",
                            "    - net/mlx5e: SHAMPO, Fix header mapping for 64K pages",
                            "    - net/mlx5e: SHAMPO, Fix skb size check for 64K pages",
                            "    - net/mlx5e: SHAMPO, Fix header formulas for higher MTUs and 64K pages",
                            "    - net: wan: framer: pef2256: Switch to devm_mfd_add_devices()",
                            "    - net: dsa: microchip: Fix reserved multicast address table programming",
                            "    - net: bridge: fix MST static key usage",
                            "    - selftests/vsock: avoid false-positives when checking dmesg",
                            "    - tracing: Fix memory leaks in create_field_var()",
                            "    - drm/amd/display: Enable mst when it's detected but yet to be initialized",
                            "    - wifi: cfg80211: add an hrtimer based delayed work item",
                            "    - wifi: mac80211: use wiphy_hrtimer_work for ml_reconf_work",
                            "    - wifi: mac80211: use wiphy_hrtimer_work for ttlm_work",
                            "    - wifi: mac80211: use wiphy_hrtimer_work for csa.switch_work",
                            "    - riscv: Fix memory leak in module_frob_arch_sections()",
                            "    - rtc: rx8025: fix incorrect register reference",
                            "    - x86/microcode/AMD: Add more known models to entry sign checking",
                            "    - smb: client: validate change notify buffer before copy",
                            "    - x86/amd_node: Fix AMD root device caching",
                            "    - xfs: fix delalloc write failures in software-provided atomic writes",
                            "    - xfs: fix various problems in xfs_atomic_write_cow_iomap_begin",
                            "    - x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode",
                            "    - drm: define NVIDIA DRM format modifiers for GB20x",
                            "    - drm/nouveau: Advertise correct modifiers on GB20x",
                            "    - drm/amdgpu/smu: Handle S0ix for vangogh",
                            "    - drm/amdkfd: Don't clear PT after process killed",
                            "    - virtio_net: fix alignment for virtio_net_hdr_v1_hash",
                            "    - lib/crypto: curve25519-hacl64: Fix older clang KASAN workaround for GCC",
                            "    - scsi: ufs: ufs-pci: Fix S0ix/S3 for Intel controllers",
                            "    - scsi: ufs: ufs-pci: Set UFSHCD_QUIRK_PERFORM_LINK_STARTUP_ONCE for Intel",
                            "      ADL",
                            "    - scsi: ufs: core: Add a quirk to suppress link_startup_again",
                            "    - drm/amd/display: update color on atomic commit time",
                            "    - extcon: adc-jack: Cleanup wakeup source only if it was enabled",
                            "    - kunit: Extend kconfig help text for KUNIT_UML_PCI",
                            "    - ALSA: hda/tas2781: Enable init_profile_id for device initialization",
                            "    - ACPI: SPCR: Check for table version when using precise baudrate",
                            "    - kbuild: Strip trailing padding bytes from modules.builtin.modinfo",
                            "    - drm/amdgpu: Fix unintended error log in VCN5_0_0",
                            "    - drm/amd/display: Fix vupdate_offload_work doc",
                            "    - drm/amdgpu: Fix function header names in amdgpu_connectors.c",
                            "    - drm/amdgpu/userq: assign an error code for invalid userq va",
                            "    - drm/msm/dpu: Fix adjusted mode clock check for 3d merge",
                            "    - drm/amd/display: Reject modes with too high pixel clock on DCE6-10",
                            "    - drm/amd/display: use GFP_NOWAIT for allocation in interrupt handler",
                            "    - drm/amd/display: Fix black screen with HDMI outputs",
                            "    - selftests: drv-net: Reload pkt pointer after calling filter_udphdr",
                            "    - dt-bindings: eeprom: at25: use \"size\" for FRAMs without device ID",
                            "    - Linux 6.17.8",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68316",
                            "    - scsi: ufs: core: Fix invalid probe error return value",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40292",
                            "    - virtio-net: fix received length check in big packets",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68180",
                            "    - drm/amd/display: Fix NULL deref in debugfs odm_combine_segments",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40327",
                            "    - perf/core: Fix system hang caused by cpu-clock usage",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40328",
                            "    - smb: client: fix potential UAF in smb2_close_cached_fid()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40291",
                            "    - io_uring: fix regbuf vector size truncation",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68322",
                            "    - parisc: Avoid crash due to unaligned access in unwinder",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40293",
                            "    - iommufd: Don't overflow during division for dirty tracking",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40294",
                            "    - Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40329",
                            "    - drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40295",
                            "    - fscrypt: fix left shift underflow when inode->i_blkbits > PAGE_SHIFT",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40296",
                            "    - platform/x86: int3472: Fix double free of GPIO device during unregister",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40297",
                            "    - net: bridge: fix use-after-free due to MST port state bypass",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68320",
                            "    - lan966x: Fix sleeping in atomic context",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68169",
                            "    - netpoll: Fix deadlock in memory allocation under spinlock",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68197",
                            "    - bnxt_en: Fix null pointer dereference in bnxt_bs_trace_check_wrap()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40330",
                            "    - bnxt_en: Shutdown FW DMA in bnxt_shutdown()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68192",
                            "    - net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40331",
                            "    - sctp: Prevent TOCTOU out-of-bounds write",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68187",
                            "    - net: mdio: Check regmap pointer returned by device_node_to_regmap()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68167",
                            "    - gpiolib: fix invalid pointer access in debugfs",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68319",
                            "    - netconsole: Acquire su_mutex before navigating configs hierarchy",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40298",
                            "    - gve: Implement settime64 with -EOPNOTSUPP",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40299",
                            "    - gve: Implement gettimex64 with -EOPNOTSUPP",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40301",
                            "    - Bluetooth: hci_event: validate skb length for unknown CC opcode",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40358",
                            "    - riscv: stacktrace: Disable KASAN checks for non-current tasks",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68186",
                            "    - ring-buffer: Do not warn in ring_buffer_map_get_reader() when reader",
                            "      catches up",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68184",
                            "    - drm/mediatek: Disable AFBC support on Mediatek DRM driver",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40302",
                            "    - media: videobuf2: forbid remove_bufs when legacy fileio is active",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40303",
                            "    - btrfs: ensure no dirty metadata is written back for an fs with errors",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40362",
                            "    - ceph: fix multifs mds auth caps issue",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40332",
                            "    - drm/amdkfd: Fix mmap write lock not release",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40304",
                            "    - fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40305",
                            "    - 9p/trans_fd: p9_fd_request: kick rx thread if EPOLLIN",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68318",
                            "    - clk: thead: th1520-ap: set all AXI clocks to CLK_IS_CRITICAL",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40209",
                            "    - btrfs: fix memory leak of qgroup_list in btrfs_add_qgroup_relation",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68183",
                            "    - ima: don't clear IMA_DIGSIG flag when setting or removing non-IMA xattr",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68173",
                            "    - ftrace: Fix softlockup in ftrace_module_enable",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40306",
                            "    - orangefs: fix xattr related buffer overflow...",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40307",
                            "    - exfat: validate cluster allocation bits of the allocation bitmap",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40308",
                            "    - Bluetooth: bcsp: receive data only if registered",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40309",
                            "    - Bluetooth: SCO: Fix UAF on sco_conn_free",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68174",
                            "    - amd/amdkfd: enhance kfd process check in switch partition",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40310",
                            "    - amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40361",
                            "    - fs: ext4: change GFP_KERNEL to GFP_NOFS to avoid deadlock",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40311",
                            "    - accel/habanalabs: support mapping cb with vmalloc-backed coherent memory",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68185",
                            "    - nfs4_setup_readdir(): insufficient locking for ->d_parent->d_inode",
                            "      dereferencing",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68176",
                            "    - PCI: cadence: Check for the existence of cdns_pcie::ops before using it",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68190",
                            "    - drm/amdgpu/atom: Check kcalloc() for WS buffer in",
                            "      amdgpu_atom_execute_table_locked()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68168",
                            "    - jfs: fix uninitialized waitqueue in transaction manager",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40312",
                            "    - jfs: Verify inode mode when loading from disk",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40333",
                            "    - f2fs: fix infinite loop in __insert_extent_tree()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68321",
                            "    - page_pool: always add GFP_NOWARN for ATOMIC allocations",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40334",
                            "    - drm/amdgpu: validate userq buffer virtual address and size",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68191",
                            "    - udp_tunnel: use netdev_warn() instead of netdev_WARN()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68309",
                            "    - PCI/AER: Fix NULL pointer access by aer_info",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40313",
                            "    - ntfs3: pretend $Extend records as regular files",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40335",
                            "    - drm/amdgpu: validate userq input args",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40314",
                            "    - usb: cdns3: gadget: Use-after-free during failed initialization and exit",
                            "      of cdnsp gadget",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40336",
                            "    - drm/gpusvm: fix hmm_pfn_to_map_order() usage",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68193",
                            "    - drm/xe/guc: Add devm release action to safely tear down CT",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68175",
                            "    - media: nxp: imx8-isi: Fix streaming cleanup on release",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68188",
                            "    - tcp: use dst_dev_rcu() in tcp_fastopen_active_disable_ofo_check()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68315",
                            "    - f2fs: fix to detect potential corrupted nid in free_nid_list",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40337",
                            "    - net: stmmac: Correctly handle Rx checksum offload errors",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40338",
                            "    - ASoC: Intel: avs: Do not share the name pointer between components",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40339",
                            "    - drm/amdgpu: fix nullptr err of vm_handle_moved",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68194",
                            "    - media: imon: make send_packet() more robust",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40363",
                            "    - net: ipv6: fix field-spanning memcpy warning in AH output",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68311",
                            "    - tty: serial: ip22zilog: Use platform device for probing",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40340",
                            "    - drm/xe: Fix oops in xe_gem_fault when running core_hotunplug test.",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68196",
                            "    - drm/amd/display: Cache streams targeting link when performing LT",
                            "      automation",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68178",
                            "    - blk-cgroup: fix possible deadlock while configuring policy",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40341",
                            "    - futex: Don't leak robust_list pointer on exec race",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40342",
                            "    - nvme-fc: use lock accessing port_state and rport state",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40343",
                            "    - nvmet-fc: avoid scheduling association deletion twice",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68177",
                            "    - cpufreq/longhaul: handle NULL policy in longhaul_exit",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68317",
                            "    - io_uring/zctx: check chained notif contexts",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40315",
                            "    - usb: gadget: f_fs: Fix epfile null pointer access after ep enable.",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40316",
                            "    - drm/mediatek: Fix device use-after-free on unbind",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40360",
                            "    - drm/sysfb: Do not dereference NULL pointer in plane reset",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68179",
                            "    - s390: Disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68310",
                            "    - s390/pci: Avoid deadlock between PCI error recovery and mlx5 crdump",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40317",
                            "    - regmap: slimbus: fix bus_context pointer in regmap init calls",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40359",
                            "    - perf/x86/intel: Fix KASAN global-out-of-bounds warning",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68181",
                            "    - drm/radeon: Remove calls to drm_put_dev()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68170",
                            "    - drm/radeon: Do not kfree() devres managed rdev",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40213",
                            "    - Bluetooth: MGMT: fix crash in set_mesh_sync and set_mesh_complete",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40318",
                            "    - Bluetooth: hci_sync: fix race in hci_cmd_sync_dequeue_once",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68312",
                            "    - usbnet: Prevents free active kevent",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40344",
                            "    - ASoC: Intel: avs: Disable periods-elapsed work when closing PCM",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68172",
                            "    - crypto: aspeed - fix double free caused by devm",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40319",
                            "    - bpf: Sync pending IRQ work before freeing ring buffer",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68182",
                            "    - wifi: iwlwifi: fix potential use after free in iwl_mld_remove_link()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68314",
                            "    - drm/msm: make sure last_fence is always updated",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68189",
                            "    - drm/msm: Fix GEM free for imported dma-bufs",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68171",
                            "    - x86/fpu: Ensure XFD state on signal delivery",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68313",
                            "    - x86/CPU/AMD: Add RDSEED fix for Zen5",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40320",
                            "    - smb: client: fix potential cfid UAF in smb2_query_info_compound",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40321",
                            "    - wifi: brcmfmac: fix crash while sending Action Frames in standalone AP",
                            "      Mode",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40322",
                            "    - fbdev: bitblit: bound-check glyph index in bit_putcs*",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40211",
                            "    - ACPI: video: Fix use-after-free in acpi_video_switch_brightness()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40323",
                            "    - fbcon: Set fb_display[i]->mode to NULL when the mode is released",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40210",
                            "    - Revert \"NFSD: Remove the cap on number of operations per NFSv4 COMPOUND\"",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40324",
                            "    - NFSD: Fix crash in nfsd4_read_release()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40326",
                            "    - NFSD: Define actions for the new time_deleg FATTR4 attributes",
                            "  * Questing update: v6.17.7 upstream stable release (LP: #2136813)",
                            "    - sched_ext: Move internal type and accessor definitions to ext_internal.h",
                            "    - sched_ext: Put event_stats_cpu in struct scx_sched_pcpu",
                            "    - sched_ext: Sync error_irq_work before freeing scx_sched",
                            "    - timekeeping: Fix aux clocks sysfs initialization loop bound",
                            "    - x86/bugs: Report correct retbleed mitigation status",
                            "    - x86/bugs: Qualify RETBLEED_INTEL_MSG",
                            "    - genirq/chip: Add buslock back in to irq_set_handler()",
                            "    - genirq/manage: Add buslock back in to __disable_irq_nosync()",
                            "    - genirq/manage: Add buslock back in to enable_irq()",
                            "    - audit: record fanotify event regardless of presence of rules",
                            "    - EDAC/ie31200: Add two more Intel Alder Lake-S SoCs for EDAC support",
                            "    - perf/x86/intel: Add ICL_FIXED_0_ADAPTIVE bit into INTEL_FIXED_BITS_MASK",
                            "    - perf: Use current->flags & PF_KTHREAD|PF_USER_WORKER instead of",
                            "      current->mm == NULL",
                            "    - perf: Have get_perf_callchain() return NULL if crosstask and user are",
                            "      set",
                            "    - perf: Skip user unwind if the task is a kernel thread",
                            "    - EDAC: Fix wrong executable file modes for C source files",
                            "    - seccomp: passthrough uprobe systemcall without filtering",
                            "    - sched_ext: Keep bypass on between enable failure and",
                            "      scx_disable_workfn()",
                            "    - x86/bugs: Add attack vector controls for VMSCAPE",
                            "    - x86/bugs: Fix reporting of LFENCE retpoline",
                            "    - EDAC/mc_sysfs: Increase legacy channel support to 16",
                            "    - cpuset: Use new excpus for nocpu error check when enabling root",
                            "      partition",
                            "    - btrfs: abort transaction on specific error places when walking log tree",
                            "    - btrfs: abort transaction in the process_one_buffer() log tree walk",
                            "      callback",
                            "    - btrfs: zoned: return error from btrfs_zone_finish_endio()",
                            "    - btrfs: zoned: refine extent allocator hint selection",
                            "    - btrfs: scrub: replace max_t()/min_t() with clamp() in",
                            "      scrub_throttle_dev_io()",
                            "    - btrfs: always drop log root tree reference in btrfs_replay_log()",
                            "    - btrfs: use level argument in log tree walk callback replay_one_buffer()",
                            "    - btrfs: abort transaction if we fail to update inode in log replay dir",
                            "      fixup",
                            "    - btrfs: tree-checker: add inode extref checks",
                            "    - btrfs: use smp_mb__after_atomic() when forcing COW in",
                            "      create_pending_snapshot()",
                            "    - sched_ext: Make qmap dump operation non-destructive",
                            "    - arch: Add the macro COMPILE_OFFSETS to all the asm-offsets.c",
                            "    - btrfs: tree-checker: fix bounds check in check_inode_extref()",
                            "    - Linux 6.17.7",
                            "  * [UBUNTU 24.04] KVM: s390: improve interrupt cpu for wakeup (LP: #2132317)",
                            "    - KVM: s390: improve interrupt cpu for wakeup",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982)",
                            "    - sched/fair: Block delayed tasks on throttled hierarchy during dequeue",
                            "    - vfio/cdx: update driver to build without CONFIG_GENERIC_MSI_IRQ",
                            "    - expfs: Fix exportfs_can_encode_fh() for EXPORT_FH_FID",
                            "    - cgroup/misc: fix misc_res_type kernel-doc warning",
                            "    - dlm: move to rinfo for all middle conversion cases",
                            "    - exec: Fix incorrect type for ret",
                            "    - s390/pkey: Forward keygenflags to ep11_unwrapkey",
                            "    - hfs: clear offset and space out of valid records in b-tree node",
                            "    - hfs: make proper initalization of struct hfs_find_data",
                            "    - hfs: validate record offset in hfsplus_bmap_alloc",
                            "    - hfsplus: fix KMSAN uninit-value issue in hfsplus_delete_cat()",
                            "    - dlm: check for defined force value in dlm_lockspace_release",
                            "    - hfsplus: return EIO when type of hidden directory mismatch in",
                            "      hfsplus_fill_super()",
                            "    - PCI: Test for bit underflow in pcie_set_readrq()",
                            "    - lkdtm: fortify: Fix potential NULL dereference on kmalloc failure",
                            "    - arm64: sysreg: Correct sign definitions for EIESB and DoubleLock",
                            "    - m68k: bitops: Fix find_*_bit() signatures",
                            "    - powerpc/32: Remove PAGE_KERNEL_TEXT to fix startup failure",
                            "    - riscv: mm: Return intended SATP mode for noXlvl options",
                            "    - riscv: mm: Use mmu-type from FDT to limit SATP mode",
                            "    - riscv: cpufeature: add validation for zfa, zfh and zfhmin",
                            "    - drivers/perf: hisi: Relax the event ID check in the framework",
                            "    - s390/mm: Use __GFP_ACCOUNT for user page table allocations",
                            "    - smb: client: queue post_recv_credits_work also if the peer raises the",
                            "      credit target",
                            "    - smb: client: limit the range of info->receive_credit_target",
                            "    - smb: client: make use of ib_wc_status_msg() and skip IB_WC_WR_FLUSH_ERR",
                            "      logging",
                            "    - smb: server: let smb_direct_flush_send_list() invalidate a remote key",
                            "      first",
                            "    - Unbreak 'make tools/*' for user-space targets",
                            "    - platform/mellanox: mlxbf-pmc: add sysfs_attr_init() to count_clock init",
                            "    - cpufreq/amd-pstate: Fix a regression leading to EPP 0 after hibernate",
                            "    - net/mlx5e: Return 1 instead of 0 in invalid case in",
                            "      mlx5e_mpwrq_umr_entry_size()",
                            "    - rtnetlink: Allow deleting FDB entries in user namespace",
                            "    - net: enetc: fix the deadlock of enetc_mdio_lock",
                            "    - net: enetc: correct the value of ENETC_RXB_TRUESIZE",
                            "    - dpaa2-eth: fix the pointer passed to PTR_ALIGN on Tx path",
                            "    - net: phy: realtek: fix rtl8221b-vm-cg name",
                            "    - can: bxcan: bxcan_start_xmit(): use can_dev_dropped_skb() instead of",
                            "      can_dropped_invalid_skb()",
                            "    - can: esd: acc_start_xmit(): use can_dev_dropped_skb() instead of",
                            "      can_dropped_invalid_skb()",
                            "    - can: rockchip-canfd: rkcanfd_start_xmit(): use can_dev_dropped_skb()",
                            "      instead of can_dropped_invalid_skb()",
                            "    - selftests: net: fix server bind failure in sctp_vrf.sh",
                            "    - net/mlx5e: RX, Fix generating skb from non-linear xdp_buff for legacy RQ",
                            "    - net/mlx5e: RX, Fix generating skb from non-linear xdp_buff for striding",
                            "      RQ",
                            "    - net/smc: fix general protection fault in __smc_diag_dump",
                            "    - net: ethernet: ti: am65-cpts: fix timestamp loss due to race conditions",
                            "    - arm64, mm: avoid always making PTE dirty in pte_mkwrite()",
                            "    - erofs: avoid infinite loops due to corrupted subpage compact indexes",
                            "    - net: hibmcge: select FIXED_PHY",
                            "    - ptp: ocp: Fix typo using index 1 instead of i in SMA initialization loop",
                            "    - net: hsr: prevent creation of HSR device with slaves from another netns",
                            "    - espintcp: use datagram_poll_queue for socket readiness",
                            "    - net: datagram: introduce datagram_poll_queue for custom receive queues",
                            "    - ovpn: use datagram_poll_queue for socket readiness in TCP",
                            "    - net: bonding: fix possible peer notify event loss or dup issue",
                            "    - hung_task: fix warnings caused by unaligned lock pointers",
                            "    - mm: don't spin in add_stack_record when gfp flags don't allow",
                            "    - dma-debug: don't report false positives with",
                            "      DMA_BOUNCE_UNALIGNED_KMALLOC",
                            "    - arch_topology: Fix incorrect error check in",
                            "      topology_parse_cpu_capacity()",
                            "    - riscv: hwprobe: Fix stale vDSO data for late-initialized keys at boot",
                            "    - io_uring/sqpoll: switch away from getrusage() for CPU accounting",
                            "    - io_uring/sqpoll: be smarter on when to update the stime usage",
                            "    - btrfs: send: fix duplicated rmdir operations when using extrefs",
                            "    - btrfs: ref-verify: fix IS_ERR() vs NULL check in btrfs_build_ref_tree()",
                            "    - gpio: pci-idio-16: Define maximum valid register address offset",
                            "    - gpio: 104-idio-16: Define maximum valid register address offset",
                            "    - xfs: fix locking in xchk_nlinks_collect_dir",
                            "    - platform/x86: alienware-wmi-wmax: Add AWCC support to Dell G15 5530",
                            "    - Revert \"cpuidle: menu: Avoid discarding useful information\"",
                            "    - riscv: cpufeature: avoid uninitialized variable in",
                            "      has_thead_homogeneous_vlenb()",
                            "    - rust: device: fix device context of Device::parent()",
                            "    - slab: Avoid race on slab->obj_exts in alloc_slab_obj_exts",
                            "    - slab: Fix obj_ext mistakenly considered NULL due to race condition",
                            "    - smb: client: get rid of d_drop() in cifs_do_rename()",
                            "    - ACPICA: Work around bogus -Wstringop-overread warning since GCC 11",
                            "    - arm64: mte: Do not warn if the page is already tagged in copy_highpage()",
                            "    - can: netlink: can_changelink(): allow disabling of automatic restart",
                            "    - cifs: Fix TCP_Server_Info::credits to be signed",
                            "    - devcoredump: Fix circular locking dependency with devcd->mutex.",
                            "    - hwmon: (pmbus/max34440) Update adpm12160 coeff due to latest FW",
                            "    - MIPS: Malta: Fix keyboard resource preventing i8042 driver from",
                            "      registering",
                            "    - rv: Make rtapp/pagefault monitor depends on CONFIG_MMU",
                            "    - net: bonding: update the slave array for broadcast mode",
                            "    - net: stmmac: dwmac-rk: Fix disabling set_clock_selection",
                            "    - net: usb: rtl8150: Fix frame padding",
                            "    - net: ravb: Enforce descriptor type ordering",
                            "    - net: ravb: Ensure memory write completes before ringing TX doorbell",
                            "    - mptcp: pm: in-kernel: C-flag: handle late ADD_ADDR",
                            "    - selftests: mptcp: join: mark 'flush re-add' as skipped if not supported",
                            "    - selftests: mptcp: join: mark implicit tests as skipped if not supported",
                            "    - selftests: mptcp: join: mark 'delete re-add signal' as skipped if not",
                            "      supported",
                            "    - mm/mremap: correctly account old mapping after MREMAP_DONTUNMAP remap",
                            "    - drm/xe: Check return value of GGTT workqueue allocation",
                            "    - drm/amd/display: increase max link count and fix link->enc NULL pointer",
                            "      access",
                            "    - mm/damon/core: use damos_commit_quota_goal() for new goal commit",
                            "    - mm/damon/core: fix list_add_tail() call on damon_call()",
                            "    - spi: rockchip-sfc: Fix DMA-API usage",
                            "    - firmware: arm_ffa: Add support for IMPDEF value in the memory access",
                            "      descriptor",
                            "    - spi: spi-nxp-fspi: add the support for sample data from DQS pad",
                            "    - spi: spi-nxp-fspi: re-config the clock rate when operation require new",
                            "      clock rate",
                            "    - spi: spi-nxp-fspi: add extra delay after dll locked",
                            "    - spi: spi-nxp-fspi: limit the clock rate for different sample clock",
                            "      source selection",
                            "    - spi: cadence-quadspi: Fix pm_runtime unbalance on dma EPROBE_DEFER",
                            "    - arm64: dts: broadcom: bcm2712: Add default GIC address cells",
                            "    - arm64: dts: broadcom: bcm2712: Define VGIC interrupt",
                            "    - include: trace: Fix inflight count helper on failed initialization",
                            "    - firmware: arm_scmi: Fix premature SCMI_XFER_FLAG_IS_RAW clearing in raw",
                            "      mode",
                            "    - spi: airoha: return an error for continuous mode dirmap creation cases",
                            "    - spi: airoha: add support of dual/quad wires spi modes to exec_op()",
                            "      handler",
                            "    - spi: airoha: switch back to non-dma mode in the case of error",
                            "    - spi: airoha: fix reading/writing of flashes with more than one plane per",
                            "      lun",
                            "    - sysfs: check visibility before changing group attribute ownership",
                            "    - RISC-V: Define pgprot_dmacoherent() for non-coherent devices",
                            "    - RISC-V: Don't print details of CPUs disabled in DT",
                            "    - riscv: hwprobe: avoid uninitialized variable use in hwprobe_arch_id()",
                            "    - hwmon: (pmbus/isl68137) Fix child node reference leak on early return",
                            "    - hwmon: (sht3x) Fix error handling",
                            "    - io_uring: fix incorrect unlikely() usage in io_waitid_prep()",
                            "    - nbd: override creds to kernel when calling sock_{send,recv}msg()",
                            "    - drm/panic: Fix drawing the logo on a small narrow screen",
                            "    - drm/panic: Fix qr_code, ensure vmargin is positive",
                            "    - drm/panic: Fix 24bit pixel crossing page boundaries",
                            "    - of/irq: Convert of_msi_map_id() callers to of_msi_xlate()",
                            "    - of/irq: Add msi-parent check to of_msi_xlate()",
                            "    - block: require LBA dma_alignment when using PI",
                            "    - gpio: ljca: Fix duplicated IRQ mapping",
                            "    - io_uring: correct __must_hold annotation in io_install_fixed_file",
                            "    - sched: Remove never used code in mm_cid_get()",
                            "    - USB: serial: option: add UNISOC UIS7720",
                            "    - USB: serial: option: add Quectel RG255C",
                            "    - USB: serial: option: add Telit FN920C04 ECM compositions",
                            "    - usb/core/quirks: Add Huawei ME906S to wakeup quirk",
                            "    - usb: raw-gadget: do not limit transfer length",
                            "    - xhci: dbc: enable back DbC in resume if it was enabled before suspend",
                            "    - xhci: dbc: fix bogus 1024 byte prefix if ttyDBC read races with stall",
                            "      event",
                            "    - x86/microcode: Fix Entrysign revision check for Zen1/Naples",
                            "    - binder: remove \"invalid inc weak\" check",
                            "    - mei: me: add wildcat lake P DID",
                            "    - objtool/rust: add one more `noreturn` Rust function",
                            "    - nvmem: rcar-efuse: add missing MODULE_DEVICE_TABLE",
                            "    - misc: fastrpc: Fix dma_buf object leak in fastrpc_map_lookup",
                            "    - most: usb: hdm_probe: Fix calling put_device() before device",
                            "      initialization",
                            "    - tcpm: switch check for role_sw device with fw_node",
                            "    - dt-bindings: serial: sh-sci: Fix r8a78000 interrupts",
                            "    - dt-bindings: usb: dwc3-imx8mp: dma-range is required only for imx8mp",
                            "    - dt-bindings: usb: qcom,snps-dwc3: Fix bindings for X1E80100",
                            "    - serial: 8250_dw: handle reset control deassert error",
                            "    - serial: 8250_exar: add support for Advantech 2 port card with Device ID",
                            "      0x0018",
                            "    - serial: 8250_mtk: Enable baud clock and manage in runtime PM",
                            "    - serial: sc16is7xx: remove useless enable of enhanced features",
                            "    - staging: gpib: Fix device reference leak in fmh_gpib driver",
                            "    - staging: gpib: Fix no EOI on 1 and 2 byte writes",
                            "    - staging: gpib: Return -EINTR on device clear",
                            "    - staging: gpib: Fix sending clear and trigger events",
                            "    - mm/migrate: remove MIGRATEPAGE_UNMAP",
                            "    - treewide: remove MIGRATEPAGE_SUCCESS",
                            "    - vmw_balloon: indicate success when effectively deflating during",
                            "      migration",
                            "    - xfs: always warn about deprecated mount options",
                            "    - gpio: regmap: Allow to allocate regmap-irq device",
                            "    - gpio: regmap: add the .fixed_direction_output configuration parameter",
                            "    - gpio: idio-16: Define fixed direction of the GPIO lines",
                            "    - Linux 6.17.6",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40084",
                            "    - ksmbd: transport_ipc: validate payload size before reading handle",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40222",
                            "    - tty: serial: sh-sci: fix RSCI FIFO overrun handling",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40223",
                            "    - most: usb: Fix use-after-free in hdm_disconnect",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40106",
                            "    - comedi: fix divide-by-zero in comedi_buf_munge()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40224",
                            "    - hwmon: (cgbc-hwmon) Add missing NULL check after devm_kzalloc()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40225",
                            "    - drm/panthor: Fix kernel panic on partial unmap of a GPU VA region",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40226",
                            "    - firmware: arm_scmi: Account for failed debug initialization",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40227",
                            "    - mm/damon/sysfs: dealloc commit test ctx always",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40228",
                            "    - mm/damon/sysfs: catch commit test ctx alloc failure",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40229",
                            "    - mm/damon/core: fix potential memory leak by cleaning ops_filter in",
                            "      damon_destroy_scheme",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40230",
                            "    - mm: prevent poison consumption when splitting THP",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40231",
                            "    - vsock: fix lock inversion in vsock_assign_transport()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40233",
                            "    - ocfs2: clear extent cache after moving/defragmenting extents",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40235",
                            "    - btrfs: directly free partially initialized fs_info in",
                            "      btrfs_check_leaked_roots()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40236",
                            "    - virtio-net: zero unused hash fields",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40237",
                            "    - fs/notify: call exportfs_encode_fid with s_umount",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40238",
                            "    - net/mlx5: Fix IPsec cleanup over MPV device",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40239",
                            "    - net: phy: micrel: always set shared->phydev for LAN8814",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40240",
                            "    - sctp: avoid NULL dereference when chunk data buffer is missing",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40241",
                            "    - erofs: fix crafted invalid cases for encoded extents",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40242",
                            "    - gfs2: Fix unlikely race in gdlm_put_lock",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40243",
                            "    - hfs: fix KMSAN uninit-value issue in hfs_find_set_zero_bits()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40244",
                            "    - hfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40245",
                            "    - nios2: ensure that memblock.current_limit is set when setting pfn limits",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557)",
                            "    - docs: kdoc: handle the obsolescensce of docutils.ErrorString()",
                            "    - Revert \"fs: make vfs_fileattr_[get|set] return -EOPNOTSUPP\"",
                            "    - PCI: vmd: Override irq_startup()/irq_shutdown() in",
                            "      vmd_init_dev_msi_info()",
                            "    - ata: libata-core: relax checks in ata_read_log_directory()",
                            "    - arm64/sysreg: Fix GIC CDEOI instruction encoding",
                            "    - ixgbevf: fix getting link speed data for E610 devices",
                            "    - rust: cfi: only 64-bit arm and x86 support CFI_CLANG",
                            "    - x86/CPU/AMD: Prevent reset reasons from being retained across reboot",
                            "    - slab: reset slab->obj_ext when freeing and it is OBJEXTS_ALLOC_FAIL",
                            "    - Revert \"io_uring/rw: drop -EOPNOTSUPP check in",
                            "      __io_complete_rw_common()\"",
                            "    - io_uring: protect mem region deregistration",
                            "    - Revert \"drm/amd/display: Only restore backlight after amdgpu_dm_init or",
                            "      dm_resume\"",
                            "    - r8152: add error handling in rtl8152_driver_init",
                            "    - net: usb: lan78xx: Fix lost EEPROM write timeout error(-ETIMEDOUT) in",
                            "      lan78xx_write_raw_eeprom",
                            "    - f2fs: fix wrong block mapping for multi-devices",
                            "    - gve: Check valid ts bit on RX descriptor before hw timestamping",
                            "    - jbd2: ensure that all ongoing I/O complete before freeing blocks",
                            "    - ext4: wait for ongoing I/O to complete before freeing blocks",
                            "    - btrfs: fix clearing of BTRFS_FS_RELOC_RUNNING if relocation already",
                            "      running",
                            "    - btrfs: fix memory leak on duplicated memory in the qgroup assign ioctl",
                            "    - btrfs: only set the device specific options after devices are opened",
                            "    - btrfs: fix incorrect readahead expansion length",
                            "    - can: gs_usb: gs_make_candev(): populate net_device->dev_port",
                            "    - can: gs_usb: increase max interface to U8_MAX",
                            "    - cxl/acpi: Fix setup of memory resource in cxl_acpi_set_cache_size()",
                            "    - ALSA: hda/intel: Add MSI X870E Tomahawk to denylist",
                            "    - ALSA: hda/realtek: Add quirk entry for HP ZBook 17 G6",
                            "    - drm/amdgpu: use atomic functions with memory barriers for vm fault info",
                            "    - drm/amdgpu: fix gfx12 mes packet status return check",
                            "    - drm/xe: Increase global invalidation timeout to 1000us",
                            "    - perf/core: Fix address filter match with backing files",
                            "    - perf/core: Fix MMAP event path names with backing files",
                            "    - perf/core: Fix MMAP2 event device with backing files",
                            "    - drm/amd: Check whether secure display TA loaded successfully",
                            "    - PM: hibernate: Add pm_hibernation_mode_is_suspend()",
                            "    - drm/amd: Fix hybrid sleep",
                            "    - usb: gadget: Store endpoint pointer in usb_request",
                            "    - usb: gadget: Introduce free_usb_request helper",
                            "    - HID: multitouch: fix sticky fingers",
                            "    - dax: skip read lock assertion for read-only filesystems",
                            "    - coredump: fix core_pattern input validation",
                            "    - can: m_can: m_can_plat_remove(): add missing pm_runtime_disable()",
                            "    - can: m_can: m_can_handle_state_errors(): fix CAN state transition to",
                            "      Error Active",
                            "    - can: m_can: m_can_chip_config(): bring up interface in correct state",
                            "    - can: m_can: fix CAN state in system PM",
                            "    - net: mtk: wed: add dma mask limitation and GFP_DMA32 for device with",
                            "      more than 4GB DRAM",
                            "    - net: dlink: handle dma_map_single() failure properly",
                            "    - doc: fix seg6_flowlabel path",
                            "    - can: j1939: add missing calls in NETDEV_UNREGISTER notification handler",
                            "    - dpll: zl3073x: Refactor DPLL initialization",
                            "    - dpll: zl3073x: Handle missing or corrupted flash configuration",
                            "    - r8169: fix packet truncation after S4 resume on RTL8168H/RTL8111H",
                            "    - net: phy: bcm54811: Fix GMII/MII/MII-Lite selection",
                            "    - net: phy: realtek: Avoid PHYCR2 access if PHYCR2 not present",
                            "    - amd-xgbe: Avoid spurious link down messages during interface toggle",
                            "    - Octeontx2-af: Fix missing error code in cgx_probe()",
                            "    - tcp: fix tcp_tso_should_defer() vs large RTT",
                            "    - net: airoha: Take into account out-of-order tx completions in",
                            "      airoha_dev_xmit()",
                            "    - selftests: net: check jq command is supported",
                            "    - net: core: fix lockdep splat on device unregister",
                            "    - ksmbd: fix recursive locking in RPC handle list access",
                            "    - tg3: prevent use of uninitialized remote_adv and local_adv variables",
                            "    - tls: trim encrypted message to match the plaintext on short splice",
                            "    - tls: wait for async encrypt in case of error during latter iterations of",
                            "      sendmsg",
                            "    - tls: always set record_type in tls_process_cmsg",
                            "    - tls: don't rely on tx_work during send()",
                            "    - netdevsim: set the carrier when the device goes up",
                            "    - net: usb: lan78xx: fix use of improperly initialized dev->chipid in",
                            "      lan78xx_reset",
                            "    - drm/panthor: Ensure MCU is disabled on suspend",
                            "    - nvme-multipath: Skip nr_active increments in RETRY disposition",
                            "    - riscv: kprobes: Fix probe address validation",
                            "    - drm/bridge: lt9211: Drop check for last nibble of version register",
                            "    - powerpc/fadump: skip parameter area allocation when fadump is disabled",
                            "    - ASoC: codecs: Fix gain setting ranges for Renesas IDT821034 codec",
                            "    - ASoC: nau8821: Cancel jdet_work before handling jack ejection",
                            "    - ASoC: nau8821: Generalize helper to clear IRQ status",
                            "    - ASoC: nau8821: Consistently clear interrupts before unmasking",
                            "    - ASoC: nau8821: Add DMI quirk to bypass jack debounce circuit",
                            "    - drm/i915/guc: Skip communication warning on reset in progress",
                            "    - drm/i915/frontbuffer: Move bo refcounting",
                            "      intel_frontbuffer_{get,release}()",
                            "    - drm/i915/fb: Fix the set_tiling vs. addfb race, again",
                            "    - drm/amdgpu: add ip offset support for cyan skillfish",
                            "    - drm/amdgpu: add support for cyan skillfish without IP discovery",
                            "    - drm/amdgpu: fix handling of harvesting for ip_discovery firmware",
                            "    - drm/amdgpu: handle wrap around in reemit handling",
                            "    - drm/amdgpu: set an error on all fences from a bad context",
                            "    - drm/amdgpu: drop unused structures in amdgpu_drm.h",
                            "    - drm/amd/powerplay: Fix CIK shutdown temperature",
                            "    - drm/xe: Enable media sampler power gating",
                            "    - drm/draw: fix color truncation in drm_draw_fill24",
                            "    - drm/rockchip: vop2: use correct destination rectangle height check",
                            "    - HID: intel-thc-hid: Intel-quickspi: switch first interrupt from level to",
                            "      edge detection",
                            "    - sched/fair: Fix pelt lost idle time detection",
                            "    - ALSA: firewire: amdtp-stream: fix enum kernel-doc warnings",
                            "    - accel/qaic: Synchronize access to DBC request queue head & tail pointer",
                            "    - nvme-auth: update sc_c in host response",
                            "    - cxl/trace: Subtract to find an hpa_alias0 in cxl_poison events",
                            "    - selftests/bpf: make arg_parsing.c more robust to crashes",
                            "    - blk-mq: fix stale tag depth for shared sched tags in",
                            "      blk_mq_update_nr_requests()",
                            "    - block: Remove elevator_lock usage from blkg_conf frozen operations",
                            "    - HID: hid-input: only ignore 0 battery events for digitizers",
                            "    - HID: multitouch: fix name of Stylus input devices",
                            "    - drm/xe/evict: drop bogus assert",
                            "    - selftests: arg_parsing: Ensure data is flushed to disk before reading.",
                            "    - nvme/tcp: handle tls partially sent records in write_space()",
                            "    - rust: cpufreq: fix formatting",
                            "    - arm64: debug: always unmask interrupts in el0_softstp()",
                            "    - arm64: cputype: Add Neoverse-V3AE definitions",
                            "    - arm64: errata: Apply workarounds for Neoverse-V3AE",
                            "    - xfs: rename the old_crc variable in xlog_recover_process",
                            "    - xfs: fix log CRC mismatches between i386 and other architectures",
                            "    - NFSD: Rework encoding and decoding of nfsd4_deviceid",
                            "    - NFSD: Minor cleanup in layoutcommit processing",
                            "    - NFSD: Implement large extent array support in pNFS",
                            "    - NFSD: Fix last write offset handling in layoutcommit",
                            "    - phy: cdns-dphy: Store hs_clk_rate and return it",
                            "    - phy: cadence: cdns-dphy: Fix PLL lock and O_CMN_READY polling",
                            "    - x86/resctrl: Refactor resctrl_arch_rmid_read()",
                            "    - x86/resctrl: Fix miscount of bandwidth event when reactivating",
                            "      previously unavailable RMID",
                            "    - cxl: Fix match_region_by_range() to use region_res_match_cxl_range()",
                            "    - phy: cadence: cdns-dphy: Update calibration wait time for startup state",
                            "      machine",
                            "    - drm/xe: Use devm_ioremap_wc for VRAM mapping and drop manual unmap",
                            "    - drm/xe: Use dynamic allocation for tile and device VRAM region",
                            "      structures",
                            "    - drm/xe: Move struct xe_vram_region to a dedicated header",
                            "    - drm/xe: Unify the initialization of VRAM regions",
                            "    - drm/xe: Move rebar to be done earlier",
                            "    - PM: hibernate: Fix pm_hibernation_mode_is_suspend() build breakage",
                            "    - drm/xe: Fix an IS_ERR() vs NULL bug in xe_tile_alloc_vram()",
                            "    - Linux 6.17.5",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40086",
                            "    - drm/xe: Don't allow evicting of BOs in same VM in array of VM binds",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40087",
                            "    - NFSD: Define a proc_layoutcommit for the FlexFiles layout type",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40088",
                            "    - hfsplus: fix slab-out-of-bounds read in hfsplus_strcasecmp()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40162",
                            "    - ASoC: amd/sdw_utils: avoid NULL deref when devm_kasprintf() fails",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40085",
                            "    - ALSA: usb-audio: Fix NULL pointer deference in try_to_register_card",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40172",
                            "    - accel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40177",
                            "    - accel/qaic: Fix bootlog initialization ordering",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40163",
                            "    - sched/deadline: Stop dl_server before CPU goes offline",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40174",
                            "    - x86/mm: Fix SMP ordering in switch_mm_irqs_off()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40089",
                            "    - cxl/features: Add check for no entries in cxl_feature_info",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40176",
                            "    - tls: wait for pending async decryptions if tls_strp_msg_hold fails",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40164",
                            "    - usbnet: Fix using smp_processor_id() in preemptible code warnings",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40091",
                            "    - ixgbe: fix too early devlink_free() in ixgbe_remove()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40175",
                            "    - idpf: cleanup remaining SKBs in PTP flows",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40173",
                            "    - net/ip6_tunnel: Prevent perpetual tunnel growth",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40092",
                            "    - usb: gadget: f_ncm: Refactor bind path to use __free()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40093",
                            "    - usb: gadget: f_ecm: Refactor bind path to use __free()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40094",
                            "    - usb: gadget: f_acm: Refactor bind path to use __free()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40095",
                            "    - usb: gadget: f_rndis: Refactor bind path to use __free()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40165",
                            "    - media: nxp: imx8-isi: m2m: Fix streaming cleanup on release",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40096",
                            "    - drm/sched: Fix potential double free in",
                            "      drm_sched_job_add_resv_dependencies",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40097",
                            "    - ALSA: hda: Fix missing pointer check in hda_component_manager_init",
                            "      function",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40098",
                            "    - ALSA: hda: cs35l41: Fix NULL pointer dereference in",
                            "      cs35l41_get_acpi_mute_state()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40099",
                            "    - cifs: parse_dfs_referrals: prevent oob on malformed input",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40100",
                            "    - btrfs: do not assert we found block group item when creating free space",
                            "      tree",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40101",
                            "    - btrfs: fix memory leaks when rejecting a non SINGLE data profile without",
                            "      an RST",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40167",
                            "    - ext4: detect invalid INLINE_DATA + EXTENTS flag combination",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40102",
                            "    - KVM: arm64: Prevent access to vCPU events before init",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40103",
                            "    - smb: client: Fix refcount leak for cifs_sb_tlink",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40104",
                            "    - ixgbevf: fix mailbox API compatibility by negotiating supported features",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40166",
                            "    - drm/xe/guc: Check GuC running state before deregistering exec queue",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40105",
                            "    - vfs: Don't leak disconnected dentries on umount",
                            "  * The machine didn’t go into suspend and got stuck (LP: #2132095)",
                            "    - platform/x86: alienware-wmi-wmax: Fix NULL pointer dereference in sleep",
                            "      handlers",
                            "  * CAP_PERFMON insufficient to get perf data (LP: #2131046)",
                            "    - SAUCE: perf/core: Allow CAP_PERFMON for paranoid level 4",
                            "  * Poweroff not working consistently after upgrading kernel 6.14.0-17.17 or",
                            "    later (LP: #2115860)",
                            "    - drm/amd: Unify shutdown() callback behavior",
                            "    - drm/amd: Stop exporting amdgpu_device_ip_suspend() outside amdgpu_device",
                            "    - drm/amd: Remove comment about handling errors in",
                            "      amdgpu_device_ip_suspend_phase1()",
                            "    - drm/amd: Don't always set IP block HW status to false",
                            "    - drm/amd: Pass IP suspend errors up to callers",
                            "    - drm/amd: Avoid evicting resources at S5",
                            "  * Re-enable INTEL_SKL_INT3472 for kernels >= 6.16 for Intel IPU camera",
                            "    (LP: #2128792)",
                            "    - Revert \"UBUNTU: [Config] FTBFS: disable INTEL_SKL_INT3472\"",
                            "    - Revert \"UBUNTU: SAUCE: platform/x86: int3472: Add handshake GPIO",
                            "      function\"",
                            "  * Support Samsung S5K3J1 sensor for Intel MIPI camera (LP: #2121852)",
                            "    - SAUCE: media: ipu-bridge: Support s5k3j1 sensor",
                            "  * Questing update: v6.17.4 upstream stable release (LP: #2131259)",
                            "    - fs: always return zero on success from replace_fd()",
                            "    - fscontext: do not consume log entries when returning -EMSGSIZE",
                            "    - btrfs: fix the incorrect max_bytes value for find_lock_delalloc_range()",
                            "    - arm64: map [_text, _stext) virtual address range non-executable+read-",
                            "      only",
                            "    - rseq: Protect event mask against membarrier IPI",
                            "    - statmount: don't call path_put() under namespace semaphore",
                            "    - listmount: don't call path_put() under namespace semaphore",
                            "    - clocksource/drivers/clps711x: Fix resource leaks in error paths",
                            "    - memcg: skip cgroup_file_notify if spinning is not allowed",
                            "    - page_pool: Fix PP_MAGIC_MASK to avoid crashing on some 32-bit arches",
                            "    - PM: runtime: Update kerneldoc return codes",
                            "    - dma-mapping: fix direction in dma_alloc direction traces",
                            "    - cpufreq: Make drivers using CPUFREQ_ETERNAL specify transition latency",
                            "    - nfsd: unregister with rpcbind when deleting a transport",
                            "    - KVM: x86: Add helper to retrieve current value of user return MSR",
                            "    - KVM: SVM: Emulate PERF_CNTR_GLOBAL_STATUS_SET for PerfMonV2",
                            "    - iio: frequency: adf4350: Fix ADF4350_REG3_12BIT_CLKDIV_MODE",
                            "    - media: v4l2-subdev: Fix alloc failure check in",
                            "      v4l2_subdev_call_state_try()",
                            "    - asm-generic/io.h: Skip trace helpers if rwmmio events are disabled",
                            "    - clk: npcm: select CONFIG_AUXILIARY_BUS",
                            "    - clk: thead: th1520-ap: describe gate clocks with clk_gate",
                            "    - clk: thead: th1520-ap: fix parent of padctrl0 clock",
                            "    - clk: thead: Correct parent for DPU pixel clocks",
                            "    - clk: renesas: r9a08g045: Add MSTOP for GPIO",
                            "    - perf disasm: Avoid undefined behavior in incrementing NULL",
                            "    - perf test trace_btf_enum: Skip if permissions are insufficient",
                            "    - perf evsel: Avoid container_of on a NULL leader",
                            "    - libperf event: Ensure tracing data is multiple of 8 sized",
                            "    - clk: qcom: common: Fix NULL vs IS_ERR() check in qcom_cc_icc_register()",
                            "    - clk: qcom: Select the intended config in QCS_DISPCC_615",
                            "    - perf parse-events: Handle fake PMUs in CPU terms",
                            "    - clk: at91: peripheral: fix return value",
                            "    - clk: renesas: cpg-mssr: Fix memory leak in cpg_mssr_reserved_init()",
                            "    - perf: Completely remove possibility to override MAX_NR_CPUS",
                            "    - perf drm_pmu: Fix fd_dir leaks in for_each_drm_fdinfo_in_dir()",
                            "    - perf util: Fix compression checks returning -1 as bool",
                            "    - rtc: x1205: Fix Xicor X1205 vendor prefix",
                            "    - rtc: optee: fix memory leak on driver removal",
                            "    - perf arm_spe: Correct setting remote access",
                            "    - perf arm_spe: Correct memory level for remote access",
                            "    - perf vendor events arm64 AmpereOneX: Fix typo - should be",
                            "      l1d_cache_access_prefetches",
                            "    - perf test: AMD IBS swfilt skip kernel tests if paranoia is >1",
                            "    - perf test shell lbr: Avoid failures with perf event paranoia",
                            "    - perf trace: Fix IS_ERR() vs NULL check bug",
                            "    - perf session: Fix handling when buffer exceeds 2 GiB",
                            "    - perf test: Don't leak workload gopipe in PERF_RECORD_*",
                            "    - perf evsel: Fix uniquification when PMU given without suffix",
                            "    - perf test: Avoid uncore_imc/clockticks in uniquification test",
                            "    - perf evsel: Ensure the fallback message is always written to",
                            "    - perf build-id: Ensure snprintf string is empty when size is 0",
                            "    - clk: mediatek: mt8195-infra_ao: Fix parent for infra_ao_hdmi_26m",
                            "    - clk: mediatek: clk-mux: Do not pass flags to",
                            "      clk_mux_determine_rate_flags()",
                            "    - clk: nxp: lpc18xx-cgu: convert from round_rate() to determine_rate()",
                            "    - clk: nxp: Fix pll0 rate check condition in LPC18xx CGU driver",
                            "    - clk: tegra: do not overallocate memory for bpmp clocks",
                            "    - nfsd: fix assignment of ia_ctime.tv_nsec on delegated mtime update",
                            "    - nfsd: ignore ATTR_DELEG when checking ia_valid before notify_change()",
                            "    - vfs: add ATTR_CTIME_SET flag",
                            "    - nfsd: use ATTR_CTIME_SET for delegated ctime updates",
                            "    - nfsd: track original timestamps in nfs4_delegation",
                            "    - nfsd: fix SETATTR updates for delegated timestamps",
                            "    - nfsd: fix timestamp updates in CB_GETATTR",
                            "    - tracing: Fix the bug where bpf_get_stackid returns -EFAULT on the ARM64",
                            "    - PM: core: Annotate loops walking device links as _srcu",
                            "    - PM: core: Add two macros for walking device links",
                            "    - PM: sleep: Do not wait on SYNC_STATE_ONLY device links",
                            "    - cpufreq: tegra186: Set target frequency for all cpus in policy",
                            "    - scsi: mvsas: Fix use-after-free bugs in mvs_work_queue",
                            "    - perf bpf-filter: Fix opts declaration on older libbpfs",
                            "    - scsi: ufs: sysfs: Make HID attributes visible",
                            "    - mshv: Handle NEED_RESCHED_LAZY before transferring to guest",
                            "    - perf bpf_counter: Fix handling of cpumap fixing hybrid",
                            "    - ASoC: SOF: ipc4-topology: Correct the minimum host DMA buffer size",
                            "    - ASoC: SOF: ipc4-topology: Account for different ChainDMA host buffer",
                            "      size",
                            "    - ASoC: SOF: Intel: hda-pcm: Place the constraint on period time instead",
                            "      of buffer time",
                            "    - LoongArch: Add cflag -fno-isolate-erroneous-paths-dereference",
                            "    - LoongArch: Fix build error for LTO with LLVM-18",
                            "    - LoongArch: Init acpi_gbl_use_global_lock to false",
                            "    - ASoC: SOF: Intel: Read the LLP via the associated Link DMA channel",
                            "    - net: usb: lan78xx: Fix lost EEPROM read timeout error(-ETIMEDOUT) in",
                            "      lan78xx_read_raw_eeprom",
                            "    - net/mlx4: prevent potential use after free in mlx4_en_do_uc_filter()",
                            "    - drm/xe/hw_engine_group: Fix double write lock release in error path",
                            "    - drm/xe/i2c: Don't rely on d3cold.allowed flag in system PM path",
                            "    - s390/cio: Update purge function to unregister the unused subchannels",
                            "    - drm/vmwgfx: Fix a null-ptr access in the cursor snooper",
                            "    - drm/vmwgfx: Fix Use-after-free in validation",
                            "    - drm/vmwgfx: Fix copy-paste typo in validation",
                            "    - net/sctp: fix a null dereference in sctp_disposition",
                            "      sctp_sf_do_5_1D_ce()",
                            "    - tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request().",
                            "    - net: mscc: ocelot: Fix use-after-free caused by cyclic delayed work",
                            "    - selftest: net: ovpn: Fix uninit return values",
                            "    - ice: ice_adapter: release xa entry on adapter allocation failure",
                            "    - net: fsl_pq_mdio: Fix device node reference leak in fsl_pq_mdio_probe",
                            "    - tools build: Align warning options with perf",
                            "    - perf python: split Clang options when invoking Popen",
                            "    - tcp: take care of zero tp->window_clamp in tcp_set_rcvlowat()",
                            "    - mailbox: zynqmp-ipi: Remove redundant mbox_controller_unregister() call",
                            "    - mailbox: zynqmp-ipi: Remove dev.parent check in zynqmp_ipi_free_mboxes",
                            "    - mailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop",
                            "    - mailbox: zynqmp-ipi: Fix SGI cleanup on unbind",
                            "    - bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}",
                            "    - net: mdio: mdio-i2c: Hold the i2c bus lock during smbus transactions",
                            "    - net: sparx5/lan969x: fix flooding configuration on bridge join/leave",
                            "    - net/mlx5: Prevent tunnel mode conflicts between FDB and NIC IPsec tables",
                            "    - net/mlx5e: Prevent tunnel reformat when tunnel mode not allowed",
                            "    - mailbox: mtk-cmdq: Remove pm_runtime APIs from cmdq_mbox_send_data()",
                            "    - drm/amdgpu: Add additional DCE6 SCL registers",
                            "    - drm/amd/display: Add missing DCE6 SCL_HORZ_FILTER_INIT* SRIs",
                            "    - drm/amd/display: Properly clear SCL_*_FILTER_CONTROL on DCE6",
                            "    - drm/amd/display: Properly disable scaling on DCE6",
                            "    - drm/amd/display: Disable scaling on DCE6 for now",
                            "    - drm/amdkfd: Fix kfd process ref leaking when userptr unmapping",
                            "    - net: pse-pd: tps23881: Fix current measurement scaling",
                            "    - crypto: skcipher - Fix reqsize handling",
                            "    - netfilter: nft_objref: validate objref and objrefmap expressions",
                            "    - bridge: br_vlan_fill_forward_path_pvid: use br_vlan_group_rcu()",
                            "    - selftests: netfilter: nft_fib.sh: fix spurious test failures",
                            "    - selftests: netfilter: query conntrack state to check for port clash",
                            "      resolution",
                            "    - io_uring/zcrx: increment fallback loop src offset",
                            "    - net: airoha: Fix loopback mode configuration for GDM2 port",
                            "    - cifs: Fix copy_to_iter return value check",
                            "    - smb: client: fix missing timestamp updates after utime(2)",
                            "    - rtc: isl12022: Fix initial enable_irq/disable_irq balance",
                            "    - cifs: Query EA $LXMOD in cifs_query_path_info() for WSL reparse points",
                            "    - tpm_tis: Fix incorrect arguments in tpm_tis_probe_irq_single",
                            "    - gpio: wcd934x: mark the GPIO controller as sleeping",
                            "    - bpf: Avoid RCU context warning when unpinning htab with internal structs",
                            "    - kbuild: always create intermediate vmlinux.unstripped",
                            "    - kbuild: keep .modinfo section in vmlinux.unstripped",
                            "    - kbuild: Restore pattern to avoid stripping .rela.dyn from vmlinux",
                            "    - kbuild: Add '.rel.*' strip pattern for vmlinux",
                            "    - s390: vmlinux.lds.S: Reorder sections",
                            "    - s390/vmlinux.lds.S: Move .vmlinux.info to end of allocatable sections",
                            "    - ACPICA: acpidump: drop ACPI_NONSTRING attribute from file_name",
                            "    - ACPI: property: Fix buffer properties extraction for subnodes",
                            "    - ACPI: TAD: Add missing sysfs_remove_group() for ACPI_TAD_RT",
                            "    - ACPICA: Debugger: drop ACPI_NONSTRING attribute from name_seg",
                            "    - ACPI: debug: fix signedness issues in read/write helpers",
                            "    - ACPI: battery: Add synchronization between interface updates",
                            "    - arm64: dts: qcom: msm8916: Add missing MDSS reset",
                            "    - arm64: dts: qcom: msm8939: Add missing MDSS reset",
                            "    - arm64: dts: qcom: sdm845: Fix slimbam num-channels/ees",
                            "    - Revert \"UBUNTU: SAUCE: arm64: dts: qcom: x1e80100-pmics: Disable pm8010",
                            "      by default\"",
                            "    - arm64: dts: qcom: x1e80100-pmics: Disable pm8010 by default",
                            "    - arm64: dts: ti: k3-am62a-main: Fix main padcfg length",
                            "    - arm64: dts: ti: k3-am62p: Fix supported hardware for 1GHz OPP",
                            "    - arm64: kprobes: call set_memory_rox() for kprobe page",
                            "    - arm64: mte: Do not flag the zero page as PG_mte_tagged",
                            "    - ARM: AM33xx: Implement TI advisory 1.0.36 (EMU0/EMU1 pins state on",
                            "      reset)",
                            "    - ARM: OMAP2+: pm33xx-core: ix device node reference leaks in",
                            "      amx3_idle_init",
                            "    - firmware: arm_scmi: quirk: Prevent writes to string constants",
                            "    - perf/arm-cmn: Fix CMN S3 DTM offset",
                            "    - KVM: s390: Fix to clear PTE when discarding a swapped page",
                            "    - KVM: arm64: Fix debug checking for np-guests using huge mappings",
                            "    - KVM: arm64: Fix page leak in user_mem_abort()",
                            "    - x86/kvm: Force legacy PCI hole to UC when overriding MTRRs for TDX/SNP",
                            "    - KVM: SVM: Re-load current, not host, TSC_AUX on #VMEXIT from SEV-ES",
                            "      guest",
                            "    - KVM: TDX: Fix uninitialized error code for __tdx_bringup()",
                            "    - dt-bindings: phy: rockchip-inno-csi-dphy: make power-domains non-",
                            "      required",
                            "    - xen: take system_transition_mutex on suspend",
                            "    - xen/events: Cleanup find_virq() return codes",
                            "    - xen/manage: Fix suspend error path",
                            "    - xen/events: Return -EEXIST for bound VIRQs",
                            "    - xen/events: Update virq_to_irq on migration",
                            "    - firmware: exynos-acpm: fix PMIC returned errno",
                            "    - firmware: meson_sm: fix device leak at probe",
                            "    - media: cec: extron-da-hd-4k-plus: drop external-module make commands",
                            "    - media: cx18: Add missing check after DMA map",
                            "    - media: i2c: mt9p031: fix mbus code initialization",
                            "    - media: i2c: mt9v111: fix incorrect type for ret",
                            "    - media: mc: Fix MUST_CONNECT handling for pads with no links",
                            "    - media: pci: ivtv: Add missing check after DMA map",
                            "    - media: pci: mg4b: fix uninitialized iio scan data",
                            "    - media: platform: mtk-mdp3: Add missing MT8188 compatible to comp_dt_ids",
                            "    - media: s5p-mfc: remove an unused/uninitialized variable",
                            "    - media: staging/ipu7: fix isys device runtime PM usage in firmware",
                            "      closing",
                            "    - media: uvcvideo: Avoid variable shadowing in uvc_ctrl_cleanup_fh",
                            "    - media: venus: firmware: Use correct reset sequence for IRIS2",
                            "    - media: venus: pm_helpers: add fallback for the opp-table",
                            "    - media: vivid: fix disappearing <Vendor Command With ID> messages",
                            "    - media: vsp1: Export missing vsp1_isp_free_buffer symbol",
                            "    - media: ti: j721e-csi2rx: Use devm_of_platform_populate",
                            "    - media: ti: j721e-csi2rx: Fix source subdev link creation",
                            "    - media: lirc: Fix error handling in lirc_register()",
                            "    - drm/exynos: exynos7_drm_decon: remove ctx->suspended",
                            "    - drm/panthor: Fix memory leak in panthor_ioctl_group_create()",
                            "    - drm/msm/a6xx: Fix PDC sleep sequence",
                            "    - drm/rcar-du: dsi: Fix 1/2/3 lane support",
                            "    - drm/nouveau: fix bad ret code in nouveau_bo_move_prep",
                            "    - drm/xe/uapi: loosen used tracking restriction",
                            "    - drm/amd/display: Incorrect Mirror Cositing",
                            "    - drm/amd/display: Enable Dynamic DTBCLK Switch",
                            "    - drm/amd/display: Fix unsafe uses of kernel mode FPU",
                            "    - blk-crypto: fix missing blktrace bio split events",
                            "    - btrfs: avoid potential out-of-bounds in btrfs_encode_fh()",
                            "    - bus: mhi: ep: Fix chained transfer handling in read path",
                            "    - bus: mhi: host: Do not use uninitialized 'dev' pointer in",
                            "      mhi_init_irq_setup()",
                            "    - cdx: Fix device node reference leak in cdx_msi_domain_init",
                            "    - clk: qcom: tcsrcc-x1e80100: Set the bi_tcxo as parent to eDP refclk",
                            "    - clk: samsung: exynos990: Use PLL_CON0 for PLL parent muxes",
                            "    - clk: samsung: exynos990: Fix CMU_TOP mux/div bit widths",
                            "    - clk: samsung: exynos990: Replace bogus divs with fixed-factor clocks",
                            "    - copy_sighand: Handle architectures where sizeof(unsigned long) <",
                            "      sizeof(u64)",
                            "    - cpufreq: CPPC: Avoid using CPUFREQ_ETERNAL as transition delay",
                            "    - cpufreq: intel_pstate: Fix object lifecycle issue in",
                            "      update_qos_request()",
                            "    - crypto: aspeed - Fix dma_unmap_sg() direction",
                            "    - crypto: atmel - Fix dma_unmap_sg() direction",
                            "    - crypto: rockchip - Fix dma_unmap_sg() nents value",
                            "    - eventpoll: Replace rwlock with spinlock",
                            "    - fbdev: Fix logic error in \"offb\" name match",
                            "    - fs/ntfs3: Fix a resource leak bug in wnd_extend()",
                            "    - fs: quota: create dedicated workqueue for quota_release_work",
                            "    - fsnotify: pass correct offset to fsnotify_mmap_perm()",
                            "    - fuse: fix possibly missing fuse_copy_finish() call in fuse_notify()",
                            "    - fuse: fix livelock in synchronous file put from fuseblk workers",
                            "    - gpio: mpfs: fix setting gpio direction to output",
                            "    - i3c: Fix default I2C adapter timeout value",
                            "    - iio/adc/pac1934: fix channel disable configuration",
                            "    - iio: dac: ad5360: use int type to store negative error codes",
                            "    - iio: dac: ad5421: use int type to store negative error codes",
                            "    - iio: frequency: adf4350: Fix prescaler usage.",
                            "    - iio: xilinx-ams: Fix AMS_ALARM_THR_DIRECT_MASK",
                            "    - iio: xilinx-ams: Unmask interrupts after updating alarms",
                            "    - init: handle bootloader identifier in kernel parameters",
                            "    - iio: imu: inv_icm42600: Simplify pm_runtime setup",
                            "    - iio: imu: inv_icm42600: Drop redundant pm_runtime reinitialization in",
                            "      resume",
                            "    - iio: imu: inv_icm42600: Avoid configuring if already pm_runtime",
                            "      suspended",
                            "    - iommu/vt-d: PRS isn't usable if PDS isn't supported",
                            "    - ipmi: Rework user message limit handling",
                            "    - ipmi:msghandler:Change seq_lock to a mutex",
                            "    - kernel/sys.c: fix the racy usage of task_lock(tsk->group_leader) in",
                            "      sys_prlimit64() paths",
                            "    - KEYS: trusted_tpm1: Compare HMAC values in constant time",
                            "    - kho: only fill kimage if KHO is finalized",
                            "    - lib/genalloc: fix device leak in of_gen_pool_get()",
                            "    - loop: fix backing file reference leak on validation error",
                            "    - md: fix mssing blktrace bio split events",
                            "    - of: unittest: Fix device reference count leak in",
                            "      of_unittest_pci_node_verify",
                            "    - openat2: don't trigger automounts with RESOLVE_NO_XDEV",
                            "    - padata: Reset next CPU when reorder sequence wraps around",
                            "    - parisc: don't reference obsolete termio struct for TC* constants",
                            "    - parisc: Remove spurious if statement from raw_copy_from_user()",
                            "    - nvme-pci: Add TUXEDO IBS Gen8 to Samsung sleep quirk",
                            "    - pinctrl: samsung: Drop unused S3C24xx driver data",
                            "    - PM: EM: Fix late boot with holes in CPU topology",
                            "    - PM: hibernate: Fix hybrid-sleep",
                            "    - PM: hibernate: Restrict GFP mask in power_down()",
                            "    - power: supply: max77976_charger: fix constant current reporting",
                            "    - powerpc/powernv/pci: Fix underflow and leak issue",
                            "    - powerpc/pseries/msi: Fix potential underflow and leak issue",
                            "    - pwm: berlin: Fix wrong register in suspend/resume",
                            "    - pwm: Fix incorrect variable used in error message",
                            "    - Revert \"ipmi: fix msg stack when IPMI is disconnected\"",
                            "    - sched/deadline: Fix race in push_dl_task()",
                            "    - scsi: hpsa: Fix potential memory leak in hpsa_big_passthru_ioctl()",
                            "    - scsi: sd: Fix build warning in sd_revalidate_disk()",
                            "    - sctp: Fix MAC comparison to be constant-time",
                            "    - smb client: fix bug with newly created file in cached dir",
                            "    - sparc64: fix hugetlb for sun4u",
                            "    - sparc: fix error handling in scan_one_device()",
                            "    - xtensa: simdisk: add input size check in proc_write_simdisk",
                            "    - xsk: Harden userspace-supplied xdp_desc validation",
                            "    - mtd: rawnand: fsmc: Default to autodetect buswidth",
                            "    - mtd: nand: raw: gpmi: fix clocks when CONFIG_PM=N",
                            "    - mmc: core: SPI mode remove cmd7",
                            "    - mmc: mmc_spi: multiple block read remove read crc ack",
                            "    - memory: samsung: exynos-srom: Fix of_iomap leak in exynos_srom_probe",
                            "    - memory: stm32_omm: Fix req2ack update test",
                            "    - rtc: interface: Ensure alarm irq is enabled when UIE is enabled",
                            "    - rtc: interface: Fix long-standing race when setting alarm",
                            "    - rseq/selftests: Use weak symbol reference, not definition, to link with",
                            "      glibc",
                            "    - PCI: xilinx-nwl: Fix ECAM programming",
                            "    - PCI: tegra: Convert struct tegra_msi mask_lock into raw spinlock",
                            "    - PCI/sysfs: Ensure devices are powered for config reads",
                            "    - PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV",
                            "    - PCI/ERR: Fix uevent on failure to recover",
                            "    - PCI/AER: Fix missing uevent on recovery when a reset is requested",
                            "    - PCI/AER: Support errors introduced by PCIe r6.0",
                            "    - PCI: Ensure relaxed tail alignment does not increase min_align",
                            "    - PCI: Fix failure detection during resource resize",
                            "    - PCI: j721e: Fix module autoloading",
                            "    - PCI: j721e: Fix programming sequence of \"strap\" settings",
                            "    - PCI: keystone: Use devm_request_irq() to free \"ks-pcie-error-irq\" on",
                            "      exit",
                            "    - PCI: rcar-gen4: Fix PHY initialization",
                            "    - PCI: rcar-host: Drop PMSR spinlock",
                            "    - PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock",
                            "    - PCI: tegra194: Fix broken tegra_pcie_ep_raise_msi_irq()",
                            "    - PCI: tegra194: Handle errors in BPMP response",
                            "    - PCI: tegra194: Reset BARs when running in PCIe endpoint mode",
                            "    - PCI/pwrctrl: Fix device leak at registration",
                            "    - PCI/pwrctrl: Fix device and OF node leak at bus scan",
                            "    - PCI/pwrctrl: Fix device leak at device stop",
                            "    - spi: cadence-quadspi: Flush posted register writes before INDAC access",
                            "    - spi: cadence-quadspi: Flush posted register writes before DAC access",
                            "    - spi: cadence-quadspi: Fix cqspi_setup_flash()",
                            "    - xfs: use deferred intent items for reaping crosslinked blocks",
                            "    - x86/fred: Remove ENDBR64 from FRED entry points",
                            "    - x86/umip: Check that the instruction opcode is at least two bytes",
                            "    - x86/umip: Fix decoding of register forms of 0F 01 (SGDT and SIDT",
                            "      aliases)",
                            "    - mptcp: pm: in-kernel: usable client side with C-flag",
                            "    - mptcp: reset blackhole on success with non-loopback ifaces",
                            "    - selftests: mptcp: join: validate C-flag + def limit",
                            "    - s390/cio/ioasm: Fix __xsch() condition code handling",
                            "    - s390/dasd: enforce dma_alignment to ensure proper buffer validation",
                            "    - s390/dasd: Return BLK_STS_INVAL for EINVAL from do_dasd_request",
                            "    - s390: Add -Wno-pointer-sign to KBUILD_CFLAGS_DECOMPRESSOR",
                            "    - slab: prevent warnings when slab obj_exts vector allocation fails",
                            "    - slab: mark slab->obj_exts allocation failures unconditionally",
                            "    - wifi: ath11k: HAL SRNG: don't deinitialize and re-initialize again",
                            "    - wifi: iwlwifi: Fix dentry reference leak in iwl_mld_add_link_debugfs",
                            "    - wifi: rtw89: avoid possible TX wait initialization race",
                            "    - wifi: mt76: mt7925u: Add VID/PID for Netgear A9000",
                            "    - wifi: mt76: mt7921u: Add VID/PID for Netgear A7500",
                            "    - mm/thp: fix MTE tag mismatch when replacing zero-filled subpages",
                            "    - mm/rmap: fix soft-dirty and uffd-wp bit loss when remapping zero-filled",
                            "      mTHP subpage to shared zeropage",
                            "    - mm/page_alloc: only set ALLOC_HIGHATOMIC for __GPF_HIGH allocations",
                            "    - mm/hugetlb: early exit from hugetlb_pages_alloc_boot() when",
                            "      max_huge_pages=0",
                            "    - mm/damon/vaddr: do not repeat pte_offset_map_lock() until success",
                            "    - mm/damon/lru_sort: use param_ctx for damon_attrs staging",
                            "    - nfsd: decouple the xprtsec policy check from check_nfsd_access()",
                            "    - NFSD: Fix destination buffer size in nfsd4_ssc_setup_dul()",
                            "    - nfsd: nfserr_jukebox in nlm_fopen should lead to a retry",
                            "    - media: iris: Call correct power off callback in cleanup path",
                            "    - media: iris: Fix firmware reference leak and unmap memory after load",
                            "    - media: iris: fix module removal if firmware download failed",
                            "    - media: iris: vpu3x: Add MNoC low power handshake during hardware power-",
                            "      off",
                            "    - media: iris: Fix port streaming handling",
                            "    - media: iris: Fix buffer count reporting in internal buffer check",
                            "    - media: iris: Allow substate transition to load resources during output",
                            "      streaming",
                            "    - media: iris: Always destroy internal buffers on firmware release",
                            "      response",
                            "    - media: iris: Simplify session stop logic by relying on vb2 checks",
                            "    - media: iris: Update vbuf flags before v4l2_m2m_buf_done",
                            "    - media: iris: Send dummy buffer address for all codecs during drain",
                            "    - media: iris: Fix missing LAST flag handling during drain",
                            "    - media: iris: Fix format check for CAPTURE plane in try_fmt",
                            "    - media: iris: Allow stop on firmware only if start was issued.",
                            "    - ext4: add ext4_sb_bread_nofail() helper function for",
                            "      ext4_free_branches()",
                            "    - ext4: fail unaligned direct IO write with EINVAL",
                            "    - ext4: verify orphan file size is not too big",
                            "    - ext4: increase i_disksize to offset + len in",
                            "      ext4_update_disksize_before_punch()",
                            "    - ext4: correctly handle queries for metadata mappings",
                            "    - ext4: avoid potential buffer over-read in parse_apply_sb_mount_options()",
                            "    - ext4: fix an off-by-one issue during moving extents",
                            "    - ext4: guard against EA inode refcount underflow in xattr update",
                            "    - ext4: validate ea_ino and size in check_xattrs",
                            "    - ACPICA: Allow to skip Global Lock initialization",
                            "    - ext4: free orphan info with kvfree",
                            "    - ipmi: Fix handling of messages with provided receive message pointer",
                            "    - Squashfs: add additional inode sanity checking",
                            "    - Squashfs: reject negative file sizes in squashfs_read_inode()",
                            "    - mm/ksm: fix incorrect KSM counter handling in mm_struct during fork",
                            "    - media: mc: Clear minor number before put device",
                            "    - arm64: dts: qcom: qcs615: add missing dt property in QUP SEs",
                            "    - ACPI: property: Disregard references in data-only subnode lists",
                            "    - ACPI: property: Add code comments explaining what is going on",
                            "    - ACPI: property: Do not pass NULL handles to acpi_attach_data()",
                            "    - irqchip/sifive-plic: Avoid interrupt ID 0 handling during suspend/resume",
                            "    - copy_file_range: limit size if in compat mode",
                            "    - minixfs: Verify inode mode when loading from disk",
                            "    - pid: Add a judgment for ns null in pid_nr_ns",
                            "    - fs: Add 'initramfs_options' to set initramfs mount options",
                            "    - cramfs: Verify inode mode when loading from disk",
                            "    - nsfs: validate extensible ioctls",
                            "    - mnt_ns_tree_remove(): DTRT if mnt_ns had never been added to mnt_ns_list",
                            "    - writeback: Avoid softlockup when switching many inodes",
                            "    - writeback: Avoid excessively long inode switching times",
                            "    - iomap: error out on file IO when there is no inline_data buffer",
                            "    - pidfs: validate extensible ioctls",
                            "    - mount: handle NULL values in mnt_ns_release()",
                            "    - Linux 6.17.4",
                            "  * Questing update: v6.17.4 upstream stable release (LP: #2131259) // Race",
                            "    condition in perf build causes build failure due to missing unistd_64.h",
                            "    header on arm64 (LP: #2131702)",
                            "    - perf tools: Fix arm64 libjvmti build by generating unistd_64.h",
                            "  * Questing update: v6.17.3 upstream stable release (LP: #2129610)",
                            "    - arch: copy_thread: pass clone_flags as u64",
                            "    - filelock: add FL_RECLAIM to show_fl_flags() macro",
                            "    - init: INITRAMFS_PRESERVE_MTIME should depend on BLK_DEV_INITRD",
                            "    - pid: use ns_capable_noaudit() when determining net sysctl permissions",
                            "    - Fix CC_HAS_ASM_GOTO_OUTPUT on non-x86 architectures",
                            "    - [Config]: Update CC configs for v6.17.3",
                            "    - seccomp: Fix a race with WAIT_KILLABLE_RECV if the tracer replies too",
                            "      fast",
                            "    - kbuild: Add missing $(objtree) prefix to powerpc crtsavres.o artifact",
                            "    - selftests: arm64: Check fread return value in exec_target",
                            "    - selftests: arm64: Fix -Waddress warning in tpidr2 test",
                            "    - kselftest/arm64/gcs: Correctly check return value when disabling GCS",
                            "    - hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()",
                            "    - gfs2: Fix GLF_INVALIDATE_IN_PROGRESS flag clearing in do_xmote",
                            "    - gfs2: Remove space before newline",
                            "    - gfs2: Further sanitize lock_dlm.c",
                            "    - gfs2: Fix LM_FLAG_TRY* logic in add_to_queue",
                            "    - gfs2: Remove duplicate check in do_xmote",
                            "    - gfs2: Get rid of GLF_INVALIDATE_IN_PROGRESS",
                            "    - gfs2: do_xmote cleanup",
                            "    - gfs2: Add proper lockspace locking",
                            "    - powerpc/8xx: Remove left-over instruction and comments in",
                            "      DataStoreTLBMiss handler",
                            "    - powerpc/603: Really copy kernel PGD entries into all PGDIRs",
                            "    - powerpc/ftrace: ensure ftrace record ops are always set for NOPs",
                            "    - powerpc64/modules: correctly iterate over stubs in",
                            "      setup_ftrace_ool_stubs",
                            "    - uprobes: uprobe_warn should use passed task",
                            "    - raid6: riscv: Clean up unused header file inclusion",
                            "    - coresight: trbe: Prevent overflow in PERF_IDX2OFF()",
                            "    - perf: arm_spe: Prevent overflow in PERF_IDX2OFF()",
                            "    - erofs: avoid reading more for fragment maps",
                            "    - smb: client: fix sending the iwrap custom IRD/ORD negotiation messages",
                            "    - smb: server: fix IRD/ORD negotiation with the client",
                            "    - perf/x86/intel: Use early_initcall() to hook bts_init()",
                            "    - perf/x86/intel: Fix IA32_PMC_x_CFG_B MSRs access error",
                            "    - x86/vdso: Fix output operand size of RDPID",
                            "    - selftests: cgroup: Make test_pids backwards compatible",
                            "    - sched/fair: Get rid of sched_domains_curr_level hack for tl->cpumask()",
                            "    - [Config]: Update CONFIG_SCHED_MC for v6.17.3",
                            "    - lsm: CONFIG_LSM can depend on CONFIG_SECURITY",
                            "    - cpuset: fix failure to enable isolated partition when containing",
                            "      isolcpus",
                            "    - btrfs: return any hit error from extent_writepage_io()",
                            "    - btrfs: fix symbolic link reading when bs > ps",
                            "    - pinctrl: renesas: rzg2l: Fix invalid unsigned return in rzg3s_oen_read()",
                            "    - arm64: dts: renesas: rzg2lc-smarc: Disable CAN-FD channel0",
                            "    - bpf: Tidy verifier bug message",
                            "    - regmap: Remove superfluous check for !config in __regmap_init()",
                            "    - selftests/bpf: Copy test_kmods when installing selftest",
                            "    - rust: cpumask: Mark CpumaskVar as transparent",
                            "    - bpf/selftests: Fix test_tcpnotify_user",
                            "    - bpf: Remove migrate_disable in kprobe_multi_link_prog_run",
                            "    - libbpf: Fix reuse of DEVMAP",
                            "    - tools/nolibc: fix error return value of clock_nanosleep()",
                            "    - ARM: dts: renesas: porter: Fix CAN pin group",
                            "    - leds: max77705: Function return instead of variable assignment",
                            "    - leds: flash: leds-qcom-flash: Update torch current clamp setting",
                            "    - s390/bpf: Do not write tail call counter into helper and kfunc frames",
                            "    - s390/bpf: Write back tail call counter for BPF_PSEUDO_CALL",
                            "    - s390/bpf: Write back tail call counter for BPF_TRAMP_F_CALL_ORIG",
                            "    - cpufreq: scmi: Account for malformed DT in scmi_dev_used_by_cpus()",
                            "    - arm64: dts: renesas: sparrow-hawk: Invert microSD voltage selector on",
                            "      EVTB1",
                            "    - arm64: dts: renesas: sparrow-hawk: Set VDDQ18_25_AVB voltage on EVTB1",
                            "    - libbpf: Export bpf_object__prepare symbol",
                            "    - firmware: arm_scmi: Mark VirtIO ready before registering",
                            "      scmi_virtio_driver",
                            "    - arm64: dts: imx93-kontron: Fix GPIO for panel regulator",
                            "    - arm64: dts: imx93-kontron: Fix USB port assignment",
                            "    - arm64: dts: imx95: Correct the lpuart7 and lpuart8 srcid",
                            "    - bpf: Remove preempt_disable in bpf_try_get_buffers",
                            "    - ACPI: processor: idle: Fix memory leak when register cpuidle device",
                            "      failed",
                            "    - genirq: Add irq_chip_(startup/shutdown)_parent()",
                            "    - PCI/MSI: Add startup/shutdown for per device domains",
                            "    - irqchip/sg2042-msi: Fix broken affinity setting",
                            "    - scripts/misc-check: update export checks for EXPORT_SYMBOL_FOR_MODULES()",
                            "    - soc: qcom: rpmh-rsc: Unconditionally clear _TRIGGER bit for TCS",
                            "    - pinctrl: meson-gxl: add missing i2c_d pinmux",
                            "    - blk-mq: check kobject state_in_sysfs before deleting in",
                            "      blk_mq_unregister_hctx",
                            "    - selftests/futex: Remove the -g parameter from futex_priv_hash",
                            "    - ARM: at91: pm: fix MCKx restore routine",
                            "    - arm64: dts: apple: t8103-j457: Fix PCIe ethernet iommu-map",
                            "    - regulator: scmi: Use int type to store negative error codes",
                            "    - selftests/futex: Fix some futex_numa_mpol subtests",
                            "    - tools/nolibc: avoid error in dup2() if old fd equals new fd",
                            "    - selftests/nolibc: fix EXPECT_NZ macro",
                            "    - leds: leds-lp55xx: Use correct address for memory programming",
                            "    - PCI/MSI: Check MSI_FLAG_PCI_MSI_MASK_PARENT in",
                            "      cond_[startup|shutdown]_parent()",
                            "    - block: use int to store blk_stack_limits() return value",
                            "    - ARM: dts: stm32: stm32mp151c-plyaqm: Use correct dai-format property",
                            "    - dt-bindings: vendor-prefixes: Add undocumented vendor prefixes",
                            "    - genirq/test: Fix depth tests on architectures with NOREQUEST by default.",
                            "    - genirq/test: Select IRQ_DOMAIN",
                            "    - genirq/test: Depend on SPARSE_IRQ",
                            "    - genirq/test: Drop CONFIG_GENERIC_IRQ_MIGRATION assumptions",
                            "    - genirq/test: Ensure CPU 1 is online for hotplug test",
                            "    - selftests/bpf: Fix count write in testapp_xdp_metadata_copy()",
                            "    - vdso/datastore: Gate time data behind CONFIG_GENERIC_GETTIMEOFDAY",
                            "    - PM: sleep: core: Clear power.must_resume in noirq suspend error path",
                            "    - blk-mq: fix elevator depth_updated method",
                            "    - vdso: Add struct __kernel_old_timeval forward declaration to gettime.h",
                            "    - ARM: dts: ti: omap: am335x-baltos: Fix ti,en-ck32k-xtal property in DTS",
                            "      to use correct boolean syntax",
                            "    - ARM: dts: ti: omap: omap3-devkit8000-lcd: Fix ti,keep-vref-on property",
                            "      to use correct boolean syntax in DTS",
                            "    - ARM: dts: omap: am335x-cm-t335: Remove unused mcasp num-serializer",
                            "      property",
                            "    - PM / devfreq: mtk-cci: Fix potential error pointer dereference in",
                            "      probe()",
                            "    - power: supply: cw2015: Fix a alignment coding style issue",
                            "    - hwmon: (asus-ec-sensors) Narrow lock for X870E-CREATOR WIFI",
                            "    - pinctrl: renesas: Use int type to store negative error codes",
                            "    - pinctrl: eswin: Fix regulator error check and Kconfig dependency",
                            "    - null_blk: Fix the description of the cache_size module argument",
                            "    - blk-throttle: fix access race during throttle policy activation",
                            "    - selftests: vDSO: Fix -Wunitialized in powerpc VDSO_CALL() wrapper",
                            "    - selftests: vDSO: vdso_test_abi: Correctly skip whole test with missing",
                            "      vDSO",
                            "    - irqchip/gic-v5: Fix loop in gicv5_its_create_itt_two_level() cleanup",
                            "      path",
                            "    - irqchip/gic-v5: Fix error handling in gicv5_its_irq_domain_alloc()",
                            "    - tick: Do not set device to detached state in tick_shutdown()",
                            "    - arm64: dts: mediatek: mt8195: Remove suspend-breaking reset from pcie0",
                            "    - arm64: dts: mediatek: mt8183: Fix out of range pull values",
                            "    - nbd: restrict sockets to TCP and UDP",
                            "    - PM / devfreq: rockchip-dfi: double count on RK3588",
                            "    - firmware: firmware: meson-sm: fix compile-test default",
                            "    - dts: arm: amlogic: fix pwm node for c3",
                            "    - soc: mediatek: mtk-svs: fix device leaks on mt8183 probe failure",
                            "    - soc: mediatek: mtk-svs: fix device leaks on mt8192 probe failure",
                            "    - cpuidle: qcom-spm: fix device and OF node leaks at probe",
                            "    - block: cleanup bio_issue",
                            "    - block: initialize bio issue time in blk_mq_submit_bio()",
                            "    - block: factor out a helper bio_submit_split_bioset()",
                            "    - block: skip unnecessary checks for split bio",
                            "    - block: fix ordering of recursive split IO",
                            "    - blk-mq: remove useless checkings in blk_mq_update_nr_requests()",
                            "    - blk-mq: check invalid nr_requests in queue_requests_store()",
                            "    - blk-mq: convert to serialize updating nr_requests with",
                            "      update_nr_hwq_lock",
                            "    - blk-mq: cleanup shared tags case in blk_mq_update_nr_requests()",
                            "    - blk-mq: split bitmap grow and resize case in blk_mq_update_nr_requests()",
                            "    - blk-mq-sched: add new parameter nr_requests in blk_mq_alloc_sched_tags()",
                            "    - blk-mq: fix potential deadlock while nr_requests grown",
                            "    - arm64: dts: allwinner: a527: cubie-a5e: Add ethernet PHY reset setting",
                            "    - arm64: dts: allwinner: t527: avaota-a1: Add ethernet PHY reset setting",
                            "    - arm64: dts: rockchip: Add RTC on rk3576-evb1-v10",
                            "    - arm64: dts: rockchip: Add WiFi on rk3576-evb1-v10",
                            "    - arm64: dts: rockchip: Fix network on rk3576 evb1 board",
                            "    - arm64: dts: ti: k3-j742s2-mcu-wakeup: Override firmware-name for MCU R5F",
                            "      cores",
                            "    - arm64: dts: ti: k3: Rename rproc reserved-mem nodes to 'memory@addr'",
                            "    - Revert \"arm64: dts: ti: k3-j721e-sk: Fix reversed C6x carveout",
                            "      locations\"",
                            "    - Revert \"arm64: dts: ti: k3-j721e-beagleboneai64: Fix reversed C6x",
                            "      carveout locations\"",
                            "    - arm64: dts: mediatek: mt8188: Change efuse fallback compatible to mt8186",
                            "    - arm64: dts: mediatek: mt8186-tentacruel: Fix touchscreen model",
                            "    - arm64: dts: ti: k3-pinctrl: Fix the bug in existing macros",
                            "    - arm64: dts: renesas: r9a09g047e57-smarc: Fix gpio key's pin control node",
                            "    - arm64: dts: mediatek: mt6331: Fix pmic, regulators, rtc, keys node names",
                            "    - mmc: core: Fix variable shadowing in mmc_route_rpmb_frames()",
                            "    - arm64: dts: mediatek: mt6795-xperia-m5: Fix mmc0 latch-ck value",
                            "    - arm64: dts: mediatek: mt7986a: Fix PCI-Express T-PHY node address",
                            "    - arm64: dts: mediatek: mt8395-kontron-i1200: Fix MT6360 regulator nodes",
                            "    - arm64: dts: mediatek: mt8516-pumpkin: Fix machine compatible",
                            "    - arm64: dts: allwinner: a527: cubie-a5e: Add LEDs",
                            "    - arm64: dts: allwinner: a527: cubie-a5e: Drop external 32.768 KHz crystal",
                            "    - arm64: dts: allwinner: t527: avaota-a1: hook up external 32k crystal",
                            "    - arm64: dts: allwinner: t527: orangepi-4a: hook up external 32k crystal",
                            "    - pwm: tiehrpwm: Don't drop runtime PM reference in .free()",
                            "    - pwm: tiehrpwm: Make code comment in .free() more useful",
                            "    - pwm: tiehrpwm: Fix various off-by-one errors in duty-cycle calculation",
                            "    - pwm: tiehrpwm: Fix corner case in clock divisor calculation",
                            "    - ACPICA: Apply ACPI_NONSTRING",
                            "    - ACPICA: Fix largest possible resource descriptor index",
                            "    - riscv, bpf: Sign extend struct ops return values properly",
                            "    - nvme-auth: update bi_directional flag",
                            "    - nvmet-fc: move lsop put work to nvmet_fc_ls_req_op",
                            "    - nvmet-fcloop: call done callback even when remote port is gone",
                            "    - nvme-tcp: send only permitted commands for secure concat",
                            "    - i3c: master: svc: Use manual response for IBI events",
                            "    - i3c: master: svc: Recycle unused IBI slot",
                            "    - block: update validation of atomic writes boundary for stacked devices",
                            "    - block: fix stacking of atomic writes when atomics are not supported",
                            "    - selftests: watchdog: skip ping loop if WDIOF_KEEPALIVEPING not supported",
                            "    - selftests/kselftest_harness: Add harness-selftest.expected to TEST_FILES",
                            "    - blk-throttle: fix throtl_data leak during disk release",
                            "    - bpf: Explicitly check accesses to bpf_sock_addr",
                            "    - mmc: select REGMAP_MMIO with MMC_LOONGSON2",
                            "    - selftests/futex: Fix futex_wait() for 32bit ARM",
                            "    - selftest/futex: Make the error check more precise for futex_numa_mpol",
                            "    - selftest/futex: Compile also with libnuma < 2.0.16",
                            "    - bpf: dont report verifier bug for missing bpf_scc_visit on speculative",
                            "      path",
                            "    - bpf, arm64: Call bpf_jit_binary_pack_finalize() in bpf_jit_free()",
                            "    - arm64: dts: apple: t600x: Add missing WiFi properties",
                            "    - arm64: dts: apple: t600x: Add bluetooth device nodes",
                            "    - arm64: dts: apple: Add ethernet0 alias for J375 template",
                            "    - selftests: always install UAPI headers to the correct directory",
                            "    - smp: Fix up and expand the smp_call_function_many() kerneldoc",
                            "    - mfd: max77705: max77705_charger: move active discharge setting to mfd",
                            "      parent",
                            "    - power: supply: max77705_charger: refactoring: rename charger to chg",
                            "    - power: supply: max77705_charger: use regfields for config registers",
                            "    - power: supply: max77705_charger: rework interrupts",
                            "    - tools/nolibc: make time_t robust if __kernel_old_time_t is missing in",
                            "      host headers",
                            "    - spi: fix return code when spi device has too many chipselects",
                            "    - clocksource/drivers/timer-tegra186: Avoid 64-bit divide operation",
                            "    - clocksource/drivers/tegra186: Avoid 64-bit division",
                            "    - bpf: Mark kfuncs as __noclone",
                            "    - once: fix race by moving DO_ONCE to separate section",
                            "    - hwmon: (mlxreg-fan) Separate methods of fan setting coming from",
                            "      different subsystems",
                            "    - tools/nolibc: add stdbool.h to nolibc includes",
                            "    - thermal/drivers/qcom: Make LMH select QCOM_SCM",
                            "    - thermal/drivers/qcom/lmh: Add missing IRQ includes",
                            "    - i2c: mediatek: fix potential incorrect use of I2C_MASTER_WRRD",
                            "    - i2c: spacemit: ensure bus release check runs when wait_bus_idle() fails",
                            "    - i2c: spacemit: remove stop function to avoid bus error",
                            "    - i2c: spacemit: disable SDA glitch fix to avoid restart delay",
                            "    - i2c: spacemit: check SDA instead of SCL after bus reset",
                            "    - i2c: spacemit: ensure SDA is released after bus reset",
                            "    - i2c: designware: Fix clock issue when PM is disabled",
                            "    - i2c: designware: Add disabling clocks when probe fails",
                            "    - libbpf: Fix error when st-prefix_ops and ops from differ btf",
                            "    - bpf: Enforce expected_attach_type for tailcall compatibility",
                            "    - i3c: fix big-endian FIFO transfers",
                            "    - mfd: max77705: Setup the core driver as an interrupt controller",
                            "    - drm/sched: Fix a race in DRM_GPU_SCHED_STAT_NO_HANG test",
                            "    - drm/panel-edp: Add disable to 100ms for MNB601LS1-4",
                            "    - drm/display: bridge-connector: correct CEC bridge pointers in",
                            "      drm_bridge_connector_init",
                            "    - drm/panel-edp: Add 50ms disable delay for four panels",
                            "    - drm/vmwgfx: fix missing assignment to ts",
                            "    - drm/amd/display: Reduce Stack Usage by moving 'audio_output' into",
                            "      'stream_res' v4",
                            "    - drm/panel: novatek-nt35560: Fix invalid return value",
                            "    - drm/amdgpu: fix link error for !PM_SLEEP",
                            "    - drm/amdgpu: Fix jpeg v4.0.3 poison irq call trace on sriov guest",
                            "    - drm/amdgpu: Fix vcn v4.0.3 poison irq call trace on sriov guest",
                            "    - PCI: endpoint: pci-ep-msi: Fix NULL vs IS_ERR() check in",
                            "      pci_epf_write_msi_msg()",
                            "    - PCI: xgene-msi: Return negative -EINVAL in xgene_msi_handler_setup()",
                            "    - drm/radeon/r600_cs: clean up of dead code in r600_cs",
                            "    - f2fs: fix condition in __allow_reserved_blocks()",
                            "    - f2fs: fix to avoid overflow while left shift operation",
                            "    - f2fs: fix to zero data after EOF for compressed file correctly",
                            "    - drm/bridge: it6505: select REGMAP_I2C",
                            "    - wifi: rtw88: Lock rtwdev->mutex before setting the LED",
                            "    - HID: steelseries: refactor probe() and remove()",
                            "    - media: zoran: Remove zoran_fh structure",
                            "    - phy: rockchip: naneng-combphy: Enable U3 OTG port for RK3568",
                            "    - drm/bridge: cdns-dsi: Fix the _atomic_check()",
                            "    - usb: host: max3421-hcd: Fix error pointer dereference in probe cleanup",
                            "    - usb: misc: qcom_eud: Access EUD_MODE_MANAGER2 through secure calls",
                            "    - PCI/pwrctrl: Fix double cleanup on devm_add_action_or_reset() failure",
                            "    - misc: pci_endpoint_test: Fix array underflow in",
                            "      pci_endpoint_test_ioctl()",
                            "    - serial: max310x: Add error checking in probe()",
                            "    - drm/amd/display: Remove redundant semicolons",
                            "    - drm/amd/display: Add NULL pointer checks in dc_stream cursor attribute",
                            "      functions",
                            "    - crypto: keembay - Add missing check after sg_nents_for_len()",
                            "    - hwrng: nomadik - add ARM_AMBA dependency",
                            "    - docs: iio: ad3552r: Fix malformed code-block directive",
                            "    - fwctl/mlx5: Fix memory alloc/free in mlx5ctl_fw_rpc()",
                            "    - scsi: pm80xx: Restore support for expanders",
                            "    - scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod",
                            "    - scsi: libsas: Add dev_parent_is_expander() helper",
                            "    - scsi: pm80xx: Use dev_parent_is_expander() helper",
                            "    - scsi: pm80xx: Add helper function to get the local phy id",
                            "    - scsi: pm80xx: Fix pm8001_abort_task() for chip_8006 when using an",
                            "      expander",
                            "    - mptcp: Fix up subflow's memcg when CONFIG_SOCK_CGROUP_DATA=n.",
                            "    - scsi: myrs: Fix dma_alloc_coherent() error check",
                            "    - f2fs: fix to clear unusable_cap for checkpoint=enable",
                            "    - f2fs: fix to avoid NULL pointer dereference in",
                            "      f2fs_check_quota_consistency()",
                            "    - f2fs: fix to allow removing qf_name",
                            "    - Revert \"UBUNTU: SAUCE: drm/dp: drm_edp_backlight_set_level: do not",
                            "      always send 3-byte commands\"",
                            "    - drm/dp: drm_edp_backlight_set_level: do not always send 3-byte commands",
                            "    - crypto: octeontx2 - Call strscpy() with correct size argument",
                            "    - drm: re-allow no-op changes on non-primary planes in async flips",
                            "    - media: rj54n1cb0c: Fix memleak in rj54n1_probe()",
                            "    - media: staging/ipu7: convert to use pci_alloc_irq_vectors() API",
                            "    - media: staging/ipu7: Don't set name for IPU7 PCI device",
                            "    - media: staging/ipu7: cleanup the MMU correctly in IPU7 driver release",
                            "    - media: i2c: vd55g1: Fix duster register address",
                            "    - drm/panel: Allow powering on panel follower after panel is enabled",
                            "    - HID: i2c-hid: Make elan touch controllers power on after panel is",
                            "      enabled",
                            "    - RDMA/mlx5: Better estimate max_qp_wr to reflect WQE count",
                            "    - RDMA/mlx5: Fix vport loopback forcing for MPV device",
                            "    - wifi: rtw88: Use led->brightness_set_blocking for PCI too",
                            "    - net: phy: introduce phy_id_compare_vendor() PHY ID helper",
                            "    - net: phy: as21xxx: better handle PHY HW reset on soft-reboot",
                            "    - PCI: rcar-host: Pass proper IRQ domain to generic_handle_domain_irq()",
                            "    - fuse: remove unneeded offset assignment when filling write pages",
                            "    - PCI: qcom: Restrict port parsing only to PCIe bridge child nodes",
                            "    - cdx: don't select CONFIG_GENERIC_MSI_IRQ",
                            "    - PCI/ACPI: Fix pci_acpi_preserve_config() memory leak",
                            "    - HID: i2c-hid: Fix test in i2c_hid_core_register_panel_follower()",
                            "    - ALSA: lx_core: use int type to store negative error codes",
                            "    - media: st-delta: avoid excessive stack usage",
                            "    - drm/amdgpu/vcn: Add regdump helper functions",
                            "    - drm/amdgpu/vcn: Hold pg_lock before vcn power off",
                            "    - drm/amdgpu: Check vcn state before profile switch",
                            "    - accel/amdxdna: Use int instead of u32 to store error codes",
                            "    - efi: Explain OVMF acronym in OVMF_DEBUG_LOG help text",
                            "    - net: dst: introduce dst->dev_rcu",
                            "    - ipv6: mcast: Add ip6_mc_find_idev() helper",
                            "    - ipv6: start using dst_dev_rcu()",
                            "    - ipv6: use RCU in ip6_xmit()",
                            "    - ipv6: use RCU in ip6_output()",
                            "    - net: use dst_dev_rcu() in sk_setup_caps()",
                            "    - tcp_metrics: use dst_dev_net_rcu()",
                            "    - ipv4: start using dst_dev_rcu()",
                            "    - crypto: hisilicon/zip - remove unnecessary validation for high-",
                            "      performance mode configurations",
                            "    - crypto: hisilicon - re-enable address prefetch after device resuming",
                            "    - crypto: hisilicon - check the sva module status while enabling or",
                            "      disabling address prefetch",
                            "    - crypto: hisilicon/qm - check whether the input function and PF are on",
                            "      the same device",
                            "    - crypto: hisilicon/qm - request reserved interrupt for virtual function",
                            "    - inet: ping: check sock_net() in ping_get_port() and ping_lookup()",
                            "    - dmaengine: Fix dma_async_tx_descriptor->tx_submit documentation",
                            "    - coresight: trbe: Add ISB after TRBLIMITR write",
                            "    - coresight: Fix missing include for FIELD_GET",
                            "    - coresight: Only register perf symlink for sinks with alloc_buffer",
                            "    - drm/amdgpu: Power up UVD 3 for FW validation (v2)",
                            "    - drm/amd/pm: Disable ULV even if unsupported (v3)",
                            "    - drm/amd/pm: Fix si_upload_smc_data (v3)",
                            "    - drm/amd/pm: Adjust si_upload_smc_data register programming (v3)",
                            "    - drm/amd/pm: Treat zero vblank time as too short in si_dpm (v3)",
                            "    - drm/amd/pm: Disable MCLK switching with non-DC at 120 Hz+ (v2)",
                            "    - drm/amd/pm: Disable SCLK switching on Oland with high pixel clocks (v3)",
                            "    - wifi: mac80211: Make CONNECTION_MONITOR optional for MLO sta",
                            "    - wifi: mwifiex: send world regulatory domain to driver",
                            "    - wifi: brcmfmac: fix 43752 SDIO FWVID incorrectly labelled as Cypress",
                            "      (CYW)",
                            "    - drm/msm: Do not validate SSPP when it is not ready",
                            "    - PCI: tegra: Fix devm_kcalloc() argument order for port->phys allocation",
                            "    - wifi: mac80211: consider links for validating SCAN_FLAG_AP in scan",
                            "      request during MLO",
                            "    - PCI: qcom: Add equalization settings for 8.0 GT/s and 32.0 GT/s",
                            "    - tcp: fix __tcp_close() to only send RST when required",
                            "    - fanotify: Validate the return value of mnt_ns_from_dentry() before",
                            "      dereferencing",
                            "    - drm/amdkfd: Fix error code sign for EINVAL in svm_ioctl()",
                            "    - usb: phy: twl6030: Fix incorrect type for ret",
                            "    - usb: gadget: configfs: Correctly set use_os_string at bind",
                            "    - tty: n_gsm: Don't block input queue by waiting MSC",
                            "    - misc: genwqe: Fix incorrect cmd field being reported in error",
                            "    - pps: fix warning in pps_register_cdev when register device fail",
                            "    - drm/msm: Fix obj leak in VM_BIND error path",
                            "    - drm/msm: Fix missing VM_BIND offset/range validation",
                            "    - wifi: iwlwifi: Remove redundant header files",
                            "    - drm/msm/mdp4: stop supporting no-IOMMU configuration",
                            "    - drm/msm: stop supporting no-IOMMU configuration",
                            "    - idpf: fix Rx descriptor ready check barrier in splitq",
                            "    - ASoC: Intel: bytcht_es8316: Fix invalid quirk input mapping",
                            "    - ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping",
                            "    - ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping",
                            "    - ipv6: snmp: do not use SNMP_MIB_SENTINEL anymore",
                            "    - ipv6: snmp: do not track per idev ICMP6_MIB_RATELIMITHOST",
                            "    - drm/msm: Fix bootup splat with separate_gpu_drm modparam",
                            "    - drm/msm/dpu: fix incorrect type for ret",
                            "    - wifi: mac80211: fix reporting of all valid links in sta_set_sinfo()",
                            "    - fs: ntfs3: Fix integer overflow in run_unpack()",
                            "    - fs/ntfs3: reject index allocation if $BITMAP is empty but blocks exist",
                            "    - iio: consumers: Fix handling of negative channel scale in",
                            "      iio_convert_raw_to_processed()",
                            "    - iio: consumers: Fix offset handling in iio_convert_raw_to_processed()",
                            "    - mm/slub: Fix cmp_loc_by_count() to return 0 when counts are equal",
                            "    - tools: ynl: fix undefined variable name",
                            "    - RDMA/mlx5: Fix page size bitmap calculation for KSM mode",
                            "    - netfilter: ipset: Remove unused htable_bits in macro ahash_region",
                            "    - ipvs: Use READ_ONCE/WRITE_ONCE for ipvs->enable",
                            "    - HID: steelseries: Fix STEELSERIES_SRWS1 handling in steelseries_remove()",
                            "    - watchdog: intel_oc_wdt: Do not try to write into const memory",
                            "    - watchdog: mpc8xxx_wdt: Reload the watchdog timer when enabling the",
                            "      watchdog",
                            "    - PCI: endpoint: pci-epf-test: Fix doorbell test support",
                            "    - drivers/base/node: handle error properly in register_one_node()",
                            "    - RDMA/cm: Rate limit destroy CM ID timeout error message",
                            "    - wifi: mt76: mt7996: Fix mt7996_mcu_sta_ba wcid configuration",
                            "    - wifi: mt76: mt7996: Fix mt7996_mcu_bss_mld_tlv routine",
                            "    - wifi: mt76: fix potential memory leak in mt76_wmac_probe()",
                            "    - wifi: mt76: mt7996: Use proper link_id in link_sta_rc_update callback",
                            "    - wifi: mt76: mt7996: Check phy before init msta_link in",
                            "      mt7996_mac_sta_add_links()",
                            "    - wifi: mt76: mt7996: Fix tx-queues initialization for second phy on",
                            "      mt7996",
                            "    - wifi: mt76: mt7996: Fix RX packets configuration for primary WED device",
                            "    - wifi: mt76: mt7996: Convert mt7996_wed_rro_addr to LE",
                            "    - wifi: mt76: mt7915: fix mt7981 pre-calibration",
                            "    - wifi: mt76: mt7996: remove redundant per-phy mac80211 calls during",
                            "      restart",
                            "    - ASoC: Intel: hda-sdw-bpt: set persistent_buffer false",
                            "    - srcu/tiny: Remove preempt_disable/enable() in srcu_gp_start_if_needed()",
                            "    - drm/amdgpu: Fix allocating extra dwords for rings (v2)",
                            "    - f2fs: fix to update map->m_next_extent correctly in f2fs_map_blocks()",
                            "    - f2fs: fix to truncate first page in error path of f2fs_truncate()",
                            "    - f2fs: fix to avoid migrating empty section",
                            "    - f2fs: fix to mitigate overhead of f2fs_zero_post_eof_page()",
                            "    - RISC-V: KVM: Write hgatp register with valid mode bits",
                            "    - ALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on",
                            "      PREEMPT_RT",
                            "    - ACPI: NFIT: Fix incorrect ndr_desc being reportedin dev_err message",
                            "    - scsi: qla2xxx: edif: Fix incorrect sign of error code",
                            "    - scsi: qla2xxx: Fix incorrect sign of error code in START_SP_W_RETRIES()",
                            "    - scsi: qla2xxx: Fix incorrect sign of error code in qla_nvme_xmt_ls_rsp()",
                            "    - HID: hidraw: tighten ioctl command parsing",
                            "    - f2fs: fix zero-sized extent for precache extents",
                            "    - smc: Fix use-after-free in __pnet_find_base_ndev().",
                            "    - smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().",
                            "    - smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().",
                            "    - smc: Use __sk_dst_get() and dst_dev_rcu() in smc_vlan_by_tcpsk().",
                            "    - tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().",
                            "    - mptcp: Call dst_release() in mptcp_active_enable().",
                            "    - mptcp: Use __sk_dst_get() and dst_dev_rcu() in mptcp_active_enable().",
                            "    - Revert \"usb: xhci: Avoid Stop Endpoint retry loop if the endpoint seems",
                            "      Running\"",
                            "    - RDMA/core: Resolve MAC of next-hop device without ARP support",
                            "    - IB/sa: Fix sa_local_svc_timeout_ms read race",
                            "    - Documentation: trace: historgram-design: Separate sched_waking histogram",
                            "      section heading and the following diagram",
                            "    - ASoC: SOF: ipc4-pcm: Fix incorrect comparison with number of tdm_slots",
                            "    - wifi: ath12k: initialize eirp_power before use",
                            "    - wifi: ath12k: fix overflow warning on num_pwr_levels",
                            "    - wifi: ath12k: fix signal in radiotap for WCN7850",
                            "    - wifi: ath12k: fix HAL_PHYRX_COMMON_USER_INFO handling in monitor mode",
                            "    - wifi: ath12k: fix the fetching of combined rssi",
                            "    - wifi: ath12k: Add fallback for invalid channel number in PHY metadata",
                            "    - wifi: ath12k: fix wrong logging ID used for CE",
                            "    - wifi: ath10k: avoid unnecessary wait for service ready message",
                            "    - iommu/vt-d: debugfs: Fix legacy mode page table dump logic",
                            "    - wifi: mac80211: fix Rx packet handling when pubsta information is not",
                            "      available",
                            "    - ASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback",
                            "    - sparc: fix accurate exception reporting in copy_{from_to}_user for",
                            "      UltraSPARC",
                            "    - sparc: fix accurate exception reporting in copy_{from_to}_user for",
                            "      UltraSPARC III",
                            "    - sparc: fix accurate exception reporting in copy_{from_to}_user for",
                            "      Niagara",
                            "    - sparc: fix accurate exception reporting in copy_to_user for Niagara 4",
                            "    - sparc: fix accurate exception reporting in copy_{from,to}_user for M7",
                            "    - vfio/pds: replace bitmap_free with vfree",
                            "    - crypto: comp - Use same definition of context alloc and free ops",
                            "    - crypto: hisilicon/qm - set NULL to qm->debug.qm_diff_regs",
                            "    - wifi: ath12k: Fix peer lookup in ath12k_dp_mon_rx_deliver_msdu()",
                            "    - rpmsg: qcom_smd: Fix fallback to qcom,ipc parse",
                            "    - remoteproc: qcom_q6v5_mss: support loading MBN file on msm8974",
                            "    - RDMA/rxe: Fix race in do_task() when draining",
                            "    - selftests/mm: fix va_high_addr_switch.sh failure on x86_64",
                            "    - wifi: rtw89: fix leak in rtw89_core_send_nullfunc()",
                            "    - wifi: rtw89: avoid circular locking dependency in ser_state_run()",
                            "    - PCI: tegra194: Fix duplicate PLL disable in",
                            "      pex_ep_event_pex_rst_assert()",
                            "    - remoteproc: qcom: q6v5: Avoid disabling handover IRQ twice",
                            "    - remoteproc: qcom: pas: Shutdown lite ADSP DTB on X1E",
                            "    - wifi: ath12k: Refactor RX TID deletion handling into helper function",
                            "    - wifi: ath12k: Fix flush cache failure during RX queue update",
                            "    - wifi: cfg80211: fix width unit in cfg80211_radio_chandef_valid()",
                            "    - dm vdo: return error on corrupted metadata in start_restoring_volume",
                            "      functions",
                            "    - coresight: fix indentation error in cscfg_remove_owned_csdev_configs()",
                            "    - coresight-etm4x: Conditionally access register TRCEXTINSELR",
                            "    - coresight: tmc: Support atclk",
                            "    - coresight: catu: Support atclk",
                            "    - coresight: etm4x: Support atclk",
                            "    - coresight: Appropriately disable programming clocks",
                            "    - coresight: Appropriately disable trace bus clocks",
                            "    - coresight: Avoid enable programming clock duplicately",
                            "    - coresight: trbe: Return NULL pointer for allocation failures",
                            "    - coresight: tpda: fix the logic to setup the element size",
                            "    - coresight: Fix incorrect handling for return value of devm_kzalloc",
                            "    - NFSv4.1: fix backchannel max_resp_sz verification check",
                            "    - net: ethtool: tsconfig: set command must provide a reply",
                            "    - netfilter: nfnetlink: reset nlh pointer during batch replay",
                            "    - netfilter: nf_conntrack: do not skip entries in /proc/net/nf_conntrack",
                            "    - scsi: ufs: core: Fix data race in CPU latency PM QoS request handling",
                            "    - scsi: mpt3sas: Fix crash in transport port remove by using ioc_info()",
                            "    - usb: vhci-hcd: Prevent suspending virtually attached devices",
                            "    - PCI: rcar-gen4: Add missing 1ms delay after PWR reset assertion",
                            "    - PCI: rcar-gen4: Assure reset occurs before DBI access",
                            "    - PCI: rcar-gen4: Fix inverted break condition in PHY initialization",
                            "    - ASoC: qcom: sc8280xp: use sa8775p/ subdir for QCS9100 / QCS9075",
                            "    - iommu/vt-d: Disallow dirty tracking if incoherent page walk",
                            "    - iommu/selftest: prevent use of uninitialized variable",
                            "    - RDMA/siw: Always report immediate post SQ errors",
                            "    - net: enetc: Fix probing error message typo for the ENETCv4 PF driver",
                            "    - net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast",
                            "    - ptp: Add a upper bound on max_vclocks",
                            "    - vhost: vringh: Fix copy_to_iter return value check",
                            "    - net: macb: remove illusion about TBQPH/RBQPH being per-queue",
                            "    - net: macb: move ring size computation to functions",
                            "    - net: macb: single dma_alloc_coherent() for DMA descriptors",
                            "    - Bluetooth: btintel_pcie: Refactor Device Coredump",
                            "    - Bluetooth: MGMT: Fix not exposing debug UUID on",
                            "      MGMT_OP_READ_EXP_FEATURES_INFO",
                            "    - Bluetooth: ISO: Fix possible UAF on iso_conn_free",
                            "    - Bluetooth: ISO: free rx_skb if not consumed",
                            "    - Bluetooth: ISO: don't leak skb in ISO_CONT RX",
                            "    - Bluetooth: hci_sync: Fix using random address for BIG/PA advertisements",
                            "    - KEYS: X.509: Fix Basic Constraints CA flag parsing",
                            "    - hwrng: ks-sa - fix division by zero in ks_sa_rng_init",
                            "    - cramfs: fix incorrect physical page address calculation",
                            "    - ocfs2: fix double free in user_cluster_connect()",
                            "    - drivers/base/node: fix double free in register_one_node()",
                            "    - f2fs: fix UAF issue in f2fs_merge_page_bio()",
                            "    - mtd: rawnand: atmel: Fix error handling path in",
                            "      atmel_nand_controller_add_nands",
                            "    - PCI: j721e: Fix incorrect error message in probe()",
                            "    - idpf: fix mismatched free function for dma_alloc_coherent",
                            "    - tcp: use skb->len instead of skb->truesize in tcp_can_ingest()",
                            "    - nfp: fix RSS hash key size when RSS is not supported",
                            "    - net: ena: return 0 in ena_get_rxfh_key_size() when RSS hash key is not",
                            "      configurable",
                            "    - net: dlink: handle copy_thresh allocation failure",
                            "    - net/mlx5: Stop polling for command response if interface goes down",
                            "    - net/mlx5: pagealloc: Fix reclaim race during command interface teardown",
                            "    - net/mlx5: fw reset, add reset timeout work",
                            "    - smb: client: fix crypto buffers in non-linear memory",
                            "    - bonding: fix xfrm offload feature setup on active-backup mode",
                            "    - net: enetc: initialize SW PIR and CIR based HW PIR and CIR values",
                            "    - iommufd: Register iommufd mock devices with fwspec",
                            "    - Revert \"net/mlx5e: Update and set Xon/Xoff upon MTU set\"",
                            "    - NFSD: filecache: add STATX_DIOALIGN and STATX_DIO_READ_ALIGN support",
                            "    - nfs/localio: avoid issuing misaligned IO using O_DIRECT",
                            "    - octeontx2-vf: fix bitmap leak",
                            "    - octeontx2-pf: fix bitmap leak",
                            "    - vhost: vringh: Modify the return value check",
                            "    - selftests/bpf: Fix typos and grammar in test sources",
                            "    - selftests/bpf: move get_ksyms and get_addrs to trace_helpers.c",
                            "    - selftests/bpf: Fix realloc size in bpf_get_addrs",
                            "    - bpf: Skip scalar adjustment for BPF_NEG if dst is a pointer",
                            "    - bpf: Reject negative offsets for ALU ops",
                            "    - tpm: Disable TPM2_TCG_HMAC by default",
                            "    - ALSA: hda/hdmi: Add pin fix for HP ProDesk model",
                            "    - ALSA: hda/realtek: Add quirk for HP Spectre 14t-ea100",
                            "    - Squashfs: fix uninit-value in squashfs_get_parent",
                            "    - uio_hv_generic: Let userspace take care of interrupt mask",
                            "    - hisi_acc_vfio_pci: Fix reference leak in hisi_acc_vfio_debug_init",
                            "    - io_uring/waitid: always prune wait queue entry in io_waitid_wait()",
                            "    - io_uring/zcrx: fix overshooting recv limit",
                            "    - ASoC: wcd934x: fix error handling in wcd934x_codec_parse_data()",
                            "    - ASoC: SOF: ipc3-topology: Fix multi-core and static pipelines tear down",
                            "    - ASoC: codecs: wcd937x: set the comp soundwire port correctly",
                            "    - ASoC: codecs: wcd937x: make stub functions inline",
                            "    - ASoC: SOF: ipc4-pcm: fix delay calculation when DSP resamples",
                            "    - ASoC: SOF: ipc4-pcm: fix start offset calculation for chain DMA",
                            "    - fs: udf: fix OOB read in lengthAllocDescs handling",
                            "    - net: nfc: nci: Add parameter validation for packet data",
                            "    - mfd: rz-mtu3: Fix MTU5 NFCR register offset",
                            "    - mfd: intel_soc_pmic_chtdc_ti: Set use_single_read regmap_config flag",
                            "    - mfd: vexpress-sysreg: Check the return value of devm_gpiochip_add_data()",
                            "    - tracing: Fix lock imbalance in s_start() memory allocation failure path",
                            "    - tracing: Fix race condition in kprobe initialization causing NULL",
                            "      pointer dereference",
                            "    - tracing: Fix wakeup tracers on failure of acquiring calltime",
                            "    - tracing: Fix irqoff tracers on failure of acquiring calltime",
                            "    - tracing: Have trace_marker use per-cpu data to read user space",
                            "    - tracing: Fix tracing_mark_raw_write() to use buf and not ubuf",
                            "    - tracing: Stop fortify-string from warning in tracing_mark_raw_write()",
                            "    - dm: fix queue start/stop imbalance under suspend/load/resume races",
                            "    - dm: fix NULL pointer dereference in __dm_suspend()",
                            "    - LoongArch: Automatically disable kaslr if boot from kexec_file",
                            "    - pwm: loongson: Fix LOONGSON_PWM_FREQ_DEFAULT",
                            "    - LoongArch: BPF: Sign-extend struct ops return values properly",
                            "    - LoongArch: BPF: No support of struct argument in trampoline programs",
                            "    - LoongArch: BPF: Don't align trampoline size",
                            "    - LoongArch: BPF: Make trampoline size stable",
                            "    - LoongArch: BPF: Make error handling robust in",
                            "      arch_prepare_bpf_trampoline()",
                            "    - LoongArch: BPF: Remove duplicated bpf_flush_icache()",
                            "    - LoongArch: BPF: No text_poke() for kernel text",
                            "    - LoongArch: BPF: Remove duplicated flags check",
                            "    - LoongArch: BPF: Fix uninitialized symbol 'retval_off'",
                            "    - mm/ksm: fix flag-dropping behavior in ksm_madvise",
                            "    - ksmbd: Fix race condition in RPC handle list access",
                            "    - ksmbd: fix error code overwriting in smb2_get_info_filesystem()",
                            "    - ksmbd: add max ip connections parameter",
                            "    - ext4: fix potential null deref in ext4_mb_init()",
                            "    - ext4: fix checks for orphan inodes",
                            "    - KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn't valid",
                            "    - fbdev: simplefb: Fix use after free in simplefb_detach_genpds()",
                            "    - mm: hugetlb: avoid soft lockup when mprotect to large memory area",
                            "    - selftests/mm: skip soft-dirty tests when CONFIG_MEM_SOFT_DIRTY is",
                            "      disabled",
                            "    - nvdimm: ndtest: Return -ENOMEM if devm_kcalloc() fails in ndtest_probe()",
                            "    - misc: fastrpc: Save actual DMA size in fastrpc_map structure",
                            "    - misc: fastrpc: Fix fastrpc_map_lookup operation",
                            "    - misc: fastrpc: fix possible map leak in fastrpc_put_args",
                            "    - misc: fastrpc: Skip reference for DMA handles",
                            "    - Input: atmel_mxt_ts - allow reset GPIO to sleep",
                            "    - Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info",
                            "      leak",
                            "    - sunrpc: fix null pointer dereference on zero-length checksum",
                            "    - PCI/AER: Avoid NULL pointer dereference in aer_ratelimit()",
                            "    - remoteproc: pru: Fix potential NULL pointer dereference in",
                            "      pru_rproc_set_ctable()",
                            "    - PCI: endpoint: pci-epf-test: Add NULL check for DMA channels before",
                            "      release",
                            "    - thunderbolt: Fix use-after-free in tb_dp_dprx_work",
                            "    - tee: fix register_shm_helper()",
                            "    - pinctrl: check the return value of pinmux_ops::get_function_name()",
                            "    - bus: fsl-mc: Check return value of platform_get_resource()",
                            "    - net/9p: Fix buffer overflow in USB transport layer",
                            "    - net: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock",
                            "    - usb: typec: tipd: Clear interrupts first",
                            "    - arm64: dts: qcom: qcm2290: Disable USB SS bus instances in park mode",
                            "    - usb: cdns3: cdnsp-pci: remove redundant pci_disable_device() call",
                            "    - scsi: ufs: core: Fix PM QoS mutex initialization",
                            "    - drm/amdgpu/vcn: Fix double-free of vcn dump buffer",
                            "    - Linux 6.17.3",
                            "  * CVE-2025-40019",
                            "    - crypto: essiv - Check ssize for decryption and in-place encryption",
                            "  * CVE-2025-40214",
                            "    - af_unix: Initialise scc_index in unix_add_edge().",
                            "  * Miscellaneous Ubuntu changes",
                            "    - [SAUCE] Fix selftest/net/rtnetlink.sh for Big Endian",
                            "",
                            "  [ Ubuntu-riscv: 6.17.0-12.12.1 ]",
                            "",
                            "  * questing/linux-riscv: 6.17.0-12.12.1 -proposed tracker (LP: #2138113)",
                            "  [ Ubuntu: 6.17.0-12.12 ]",
                            "  * questing/linux: 6.17.0-12.12 -proposed tracker (LP: #2138115)",
                            "  * CVE-2025-40019",
                            "    - crypto: essiv - Check ssize for decryption and in-place encryption",
                            "  * CVE-2025-40214",
                            "    - af_unix: Initialise scc_index in unix_add_edge().",
                            ""
                        ],
                        "package": "linux-riscv-6.17",
                        "version": "6.17.0-14.14.1~24.04.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2137844,
                            2013232,
                            2074082,
                            2137845,
                            1786013,
                            2137849,
                            1786013,
                            2136820,
                            2137698,
                            2129812,
                            2125022,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136813,
                            2132317,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2132095,
                            2131046,
                            2115860,
                            2128792,
                            2121852,
                            2131259,
                            2131259,
                            2131702,
                            2129610,
                            2138113,
                            2138115
                        ],
                        "author": "Emil Renner Berthing <emil.renner.berthing@canonical.com>",
                        "date": "Tue, 27 Jan 2026 20:04:21 +0100"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * noble/linux-riscv-6.17: 6.17.0-9.9.1~24.04.1 -proposed tracker (LP: #2133507)",
                            "",
                            "  * Enable Nezha board (LP: #1975592)",
                            "    - SAUCE: mmc: pwrseq_simple: always fall back to GPIO based reset control",
                            "    - SAUCE: nvmem: core: update cell->bytes after shifting bits",
                            "    - SAUCE: dt-bindings: pwm: Add binding for Allwinner D1/T113-S3/R329 PWM",
                            "      controller",
                            "    - SAUCE: pwm: Add Allwinner's D1/T113-S3/R329 SoCs PWM support",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add pwm node",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add PWM pins",
                            "    - SAUCE: mmc: sunxi-mmc: Correct the maximum segment size",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add misc nodes",
                            "    - SAUCE: riscv: dts: allwinner: Keep aldo regulator on",
                            "    - SAUCE: riscv: dts: allwinner: Add button on the Nezha board",
                            "    - SAUCE: riscv: dts: allwinner: Add button on the Lichee RV Dock",
                            "    - SAUCE: regulator: dt-bindings: Add Allwinner D1 LDOs",
                            "    - SAUCE: regulator: sun20i: Add support for Allwinner D1 analog LDOs",
                            "    - SAUCE: regulator: sun20i: Use device_node_to_regmap()",
                            "    - SAUCE: dt-bindings: thermal: sun8i: Add compatible for D1",
                            "    - SAUCE: thermal: sun8i: Set the event type for new samples",
                            "    - SAUCE: thermal: sun8i: Ensure vref is powered",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add thermal sensor and zone",
                            "    - SAUCE: riscv: dts: allwinner: d1: Hook up PWM-controlled CPU voltage",
                            "      regulators",
                            "    - SAUCE: drm/sun4i: dsi: Allow panel attach before card registration",
                            "    - SAUCE: drm/sun4i: mixer: Remove unused CMA headers",
                            "    - SAUCE: drm/sun4i: tcon: Always protect the LCD dotclock rate",
                            "    - SAUCE: drm/sun4i: tcon_top: Register reset, clock gates in probe",
                            "    - SAUCE: riscv: dts: allwinner: lichee-rv-86-panel-480p: Add panel",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add HDMI pipeline",
                            "    - SAUCE: riscv: dts: allwinner: d1: Enable HDMI on supported boards",
                            "    - SAUCE: dt-bindings: display: sun4i-tcon: Add external LVDS PHY",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add LVDS0 PHY",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add LED controller node",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add RGB LEDs to boards",
                            "    - SAUCE: ASoC: sun20i-codec: New driver for D1 internal codec",
                            "    - SAUCE: [WIP] ASoC: sun20i-codec: What is this ramp thing?",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add sound cards to boards",
                            "    - SAUCE: dt-bindings: display: sun8i-a83t-dw-hdmi: Remove #phy-cells",
                            "    - SAUCE: dt-bindings: display: Add D1 HDMI compatibles",
                            "    - SAUCE: drm/sun4i: Add support for D1 HDMI",
                            "    - SAUCE: drm/sun4i: sun8i-hdmi-phy: Add support for D1 PHY",
                            "    - SAUCE: [HACK] drm/sun4i: Copy in BSP code for D1 HDMI PHY",
                            "    - SAUCE: riscv: dts: allwinner: Add Nezha and Lichee RV SPI nodes",
                            "    - SAUCE: dt-bindings: display: Add Sitronix ST7701s panel binding",
                            "    - SAUCE: drm/panel: Add driver for ST7701s DPI LCD panel",
                            "    - [Config] riscv: updateconfigs for D1 support",
                            "",
                            "  * Enable StarFive VisionFive 2 board (LP: #2013232)",
                            "    - SAUCE: PCI: starfive: Offload the NVMe timeout workaround to host",
                            "      drivers.",
                            "    - SAUCE: pwm: opencores: Add PWM driver support",
                            "    - riscv: dts: starfive: jh7110-common: drop no-sdio property from mmc1",
                            "    - dt-bindings: memory-controllers: add StarFive JH7110 SoC DMC",
                            "    - riscv: dts: starfive: jh7110: add DMC memory controller",
                            "    - riscv: dts: starfive: jh7110: bootph-pre-ram hinting needed by boot",
                            "      loader",
                            "    - riscv: dts: starfive: jh7110-common: drop no-mmc property from mmc1",
                            "    - riscv: dts: starfive: jh7110-common: drop mmc post-power-on-delay-ms",
                            "    - riscv: dts: starfive: add common board dtsi for Milk-V Mars CM variants",
                            "    - dt-bindings: riscv: starfive: add milkv,marscm-emmc",
                            "    - riscv: dts: starfive: add Milk-V Mars CM system-on-module",
                            "    - dt-bindings: riscv: starfive: add milkv,marscm-lite",
                            "    - riscv: dts: starfive: add Milk-V Mars CM Lite system-on-module",
                            "    - SAUCE: dts: starfive: jh7110-common: split out mmc0 reset pins from",
                            "      common into boards",
                            "    - SAUCE: dt-bindings: riscv: Add StarFive JH7110S SoC and VisionFive 2",
                            "      Lite board",
                            "    - SAUCE: riscv: dts: starfive: jh7110-common: Move out some nodes to the",
                            "      board dts",
                            "    - SAUCE: riscv: dts: starfive: Add common board dtsi for VisionFive 2 Lite",
                            "      variants",
                            "    - SAUCE: riscv: dts: starfive: Add VisionFive 2 Lite board device tree",
                            "    - SAUCE: riscv: dts: starfive: Add VisionFive 2 Lite eMMC board device",
                            "      tree",
                            "    - SAUCE: dt-bindings: riscv: starfive: add xunlong,orangepi-rv",
                            "    - SAUCE: riscv: dts: starfive: add Orange Pi RV",
                            "    - [Config] riscv: updateconfigs for JH7110 support",
                            "",
                            "  * Miscellaneous Ubuntu changes",
                            "    - SAUCE: tools/lib/perf: Fix -Werror=alloc-size-larger-than in cpumap.c",
                            "    - [Config] Enable pre-RVA23 hardware",
                            ""
                        ],
                        "package": "linux-riscv-6.17",
                        "version": "6.17.0-9.9.1~24.04.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2133507,
                            1975592,
                            2013232
                        ],
                        "author": "Emil Renner Berthing <emil.renner.berthing@canonical.com>",
                        "date": "Thu, 18 Dec 2025 14:49:05 +0100"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Create Noble backport",
                            "",
                            "  [ Ubuntu: 6.17.0-9.9.1 ]",
                            ""
                        ],
                        "package": "linux-riscv-6.17",
                        "version": "6.17.0-9.9.1~24.04.0",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [],
                        "author": "Emil Renner Berthing <emil.renner.berthing@canonical.com>",
                        "date": "Thu, 18 Dec 2025 14:06:20 +0100"
                    }
                ],
                "notes": "For a newly added package only the three most recent changelog entries are shown.",
                "is_version_downgrade": false
            },
            {
                "name": "linux-modules-6.17.0-14-generic",
                "from_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "to_version": {
                    "source_package_name": "linux-riscv-6.17",
                    "source_package_version": "6.17.0-14.14.1~24.04.1",
                    "version": "6.17.0-14.14.1~24.04.1"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-40256",
                        "url": "https://ubuntu.com/security/CVE-2025-40256",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68204",
                        "url": "https://ubuntu.com/security/CVE-2025-68204",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68203",
                        "url": "https://ubuntu.com/security/CVE-2025-68203",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40267",
                        "url": "https://ubuntu.com/security/CVE-2025-40267",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68198",
                        "url": "https://ubuntu.com/security/CVE-2025-68198",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68199",
                        "url": "https://ubuntu.com/security/CVE-2025-68199",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40268",
                        "url": "https://ubuntu.com/security/CVE-2025-40268",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40269",
                        "url": "https://ubuntu.com/security/CVE-2025-40269",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68205",
                        "url": "https://ubuntu.com/security/CVE-2025-68205",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40270",
                        "url": "https://ubuntu.com/security/CVE-2025-40270",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40271",
                        "url": "https://ubuntu.com/security/CVE-2025-40271",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40272",
                        "url": "https://ubuntu.com/security/CVE-2025-40272",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68245",
                        "url": "https://ubuntu.com/security/CVE-2025-68245",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68240",
                        "url": "https://ubuntu.com/security/CVE-2025-68240",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68241",
                        "url": "https://ubuntu.com/security/CVE-2025-68241",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68211",
                        "url": "https://ubuntu.com/security/CVE-2025-68211",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68246",
                        "url": "https://ubuntu.com/security/CVE-2025-68246",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40273",
                        "url": "https://ubuntu.com/security/CVE-2025-40273",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40212",
                        "url": "https://ubuntu.com/security/CVE-2025-40212",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40274",
                        "url": "https://ubuntu.com/security/CVE-2025-40274",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68202",
                        "url": "https://ubuntu.com/security/CVE-2025-68202",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68239",
                        "url": "https://ubuntu.com/security/CVE-2025-68239",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68247",
                        "url": "https://ubuntu.com/security/CVE-2025-68247",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68208",
                        "url": "https://ubuntu.com/security/CVE-2025-68208",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68200",
                        "url": "https://ubuntu.com/security/CVE-2025-68200",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40275",
                        "url": "https://ubuntu.com/security/CVE-2025-40275",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68242",
                        "url": "https://ubuntu.com/security/CVE-2025-68242",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68243",
                        "url": "https://ubuntu.com/security/CVE-2025-68243",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40276",
                        "url": "https://ubuntu.com/security/CVE-2025-40276",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40277",
                        "url": "https://ubuntu.com/security/CVE-2025-40277",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68206",
                        "url": "https://ubuntu.com/security/CVE-2025-68206",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68209",
                        "url": "https://ubuntu.com/security/CVE-2025-68209",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40278",
                        "url": "https://ubuntu.com/security/CVE-2025-40278",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40279",
                        "url": "https://ubuntu.com/security/CVE-2025-40279",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40280",
                        "url": "https://ubuntu.com/security/CVE-2025-40280",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40281",
                        "url": "https://ubuntu.com/security/CVE-2025-40281",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40282",
                        "url": "https://ubuntu.com/security/CVE-2025-40282",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40283",
                        "url": "https://ubuntu.com/security/CVE-2025-40283",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40284",
                        "url": "https://ubuntu.com/security/CVE-2025-40284",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68210",
                        "url": "https://ubuntu.com/security/CVE-2025-68210",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40285",
                        "url": "https://ubuntu.com/security/CVE-2025-40285",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40286",
                        "url": "https://ubuntu.com/security/CVE-2025-40286",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40287",
                        "url": "https://ubuntu.com/security/CVE-2025-40287",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40288",
                        "url": "https://ubuntu.com/security/CVE-2025-40288",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40289",
                        "url": "https://ubuntu.com/security/CVE-2025-40289",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68201",
                        "url": "https://ubuntu.com/security/CVE-2025-68201",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68207",
                        "url": "https://ubuntu.com/security/CVE-2025-68207",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68244",
                        "url": "https://ubuntu.com/security/CVE-2025-68244",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68316",
                        "url": "https://ubuntu.com/security/CVE-2025-68316",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40292",
                        "url": "https://ubuntu.com/security/CVE-2025-40292",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68180",
                        "url": "https://ubuntu.com/security/CVE-2025-68180",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40327",
                        "url": "https://ubuntu.com/security/CVE-2025-40327",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40328",
                        "url": "https://ubuntu.com/security/CVE-2025-40328",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40291",
                        "url": "https://ubuntu.com/security/CVE-2025-40291",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68322",
                        "url": "https://ubuntu.com/security/CVE-2025-68322",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40293",
                        "url": "https://ubuntu.com/security/CVE-2025-40293",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40294",
                        "url": "https://ubuntu.com/security/CVE-2025-40294",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40329",
                        "url": "https://ubuntu.com/security/CVE-2025-40329",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40295",
                        "url": "https://ubuntu.com/security/CVE-2025-40295",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40296",
                        "url": "https://ubuntu.com/security/CVE-2025-40296",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40297",
                        "url": "https://ubuntu.com/security/CVE-2025-40297",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68320",
                        "url": "https://ubuntu.com/security/CVE-2025-68320",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68169",
                        "url": "https://ubuntu.com/security/CVE-2025-68169",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68197",
                        "url": "https://ubuntu.com/security/CVE-2025-68197",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40330",
                        "url": "https://ubuntu.com/security/CVE-2025-40330",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68192",
                        "url": "https://ubuntu.com/security/CVE-2025-68192",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40331",
                        "url": "https://ubuntu.com/security/CVE-2025-40331",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68187",
                        "url": "https://ubuntu.com/security/CVE-2025-68187",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68167",
                        "url": "https://ubuntu.com/security/CVE-2025-68167",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68319",
                        "url": "https://ubuntu.com/security/CVE-2025-68319",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40298",
                        "url": "https://ubuntu.com/security/CVE-2025-40298",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40299",
                        "url": "https://ubuntu.com/security/CVE-2025-40299",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40301",
                        "url": "https://ubuntu.com/security/CVE-2025-40301",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40358",
                        "url": "https://ubuntu.com/security/CVE-2025-40358",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68186",
                        "url": "https://ubuntu.com/security/CVE-2025-68186",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68184",
                        "url": "https://ubuntu.com/security/CVE-2025-68184",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40302",
                        "url": "https://ubuntu.com/security/CVE-2025-40302",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40303",
                        "url": "https://ubuntu.com/security/CVE-2025-40303",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40362",
                        "url": "https://ubuntu.com/security/CVE-2025-40362",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40332",
                        "url": "https://ubuntu.com/security/CVE-2025-40332",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40304",
                        "url": "https://ubuntu.com/security/CVE-2025-40304",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40305",
                        "url": "https://ubuntu.com/security/CVE-2025-40305",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68318",
                        "url": "https://ubuntu.com/security/CVE-2025-68318",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40209",
                        "url": "https://ubuntu.com/security/CVE-2025-40209",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68183",
                        "url": "https://ubuntu.com/security/CVE-2025-68183",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68173",
                        "url": "https://ubuntu.com/security/CVE-2025-68173",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40306",
                        "url": "https://ubuntu.com/security/CVE-2025-40306",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40307",
                        "url": "https://ubuntu.com/security/CVE-2025-40307",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40308",
                        "url": "https://ubuntu.com/security/CVE-2025-40308",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40309",
                        "url": "https://ubuntu.com/security/CVE-2025-40309",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68174",
                        "url": "https://ubuntu.com/security/CVE-2025-68174",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40310",
                        "url": "https://ubuntu.com/security/CVE-2025-40310",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40361",
                        "url": "https://ubuntu.com/security/CVE-2025-40361",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40311",
                        "url": "https://ubuntu.com/security/CVE-2025-40311",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68185",
                        "url": "https://ubuntu.com/security/CVE-2025-68185",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68176",
                        "url": "https://ubuntu.com/security/CVE-2025-68176",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68190",
                        "url": "https://ubuntu.com/security/CVE-2025-68190",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68168",
                        "url": "https://ubuntu.com/security/CVE-2025-68168",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40312",
                        "url": "https://ubuntu.com/security/CVE-2025-40312",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40333",
                        "url": "https://ubuntu.com/security/CVE-2025-40333",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68321",
                        "url": "https://ubuntu.com/security/CVE-2025-68321",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40334",
                        "url": "https://ubuntu.com/security/CVE-2025-40334",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68191",
                        "url": "https://ubuntu.com/security/CVE-2025-68191",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68309",
                        "url": "https://ubuntu.com/security/CVE-2025-68309",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40313",
                        "url": "https://ubuntu.com/security/CVE-2025-40313",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40335",
                        "url": "https://ubuntu.com/security/CVE-2025-40335",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40314",
                        "url": "https://ubuntu.com/security/CVE-2025-40314",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40336",
                        "url": "https://ubuntu.com/security/CVE-2025-40336",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68193",
                        "url": "https://ubuntu.com/security/CVE-2025-68193",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68175",
                        "url": "https://ubuntu.com/security/CVE-2025-68175",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68188",
                        "url": "https://ubuntu.com/security/CVE-2025-68188",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68315",
                        "url": "https://ubuntu.com/security/CVE-2025-68315",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40337",
                        "url": "https://ubuntu.com/security/CVE-2025-40337",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40338",
                        "url": "https://ubuntu.com/security/CVE-2025-40338",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40339",
                        "url": "https://ubuntu.com/security/CVE-2025-40339",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68194",
                        "url": "https://ubuntu.com/security/CVE-2025-68194",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40363",
                        "url": "https://ubuntu.com/security/CVE-2025-40363",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68311",
                        "url": "https://ubuntu.com/security/CVE-2025-68311",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40340",
                        "url": "https://ubuntu.com/security/CVE-2025-40340",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68196",
                        "url": "https://ubuntu.com/security/CVE-2025-68196",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68178",
                        "url": "https://ubuntu.com/security/CVE-2025-68178",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40341",
                        "url": "https://ubuntu.com/security/CVE-2025-40341",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40342",
                        "url": "https://ubuntu.com/security/CVE-2025-40342",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40343",
                        "url": "https://ubuntu.com/security/CVE-2025-40343",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68177",
                        "url": "https://ubuntu.com/security/CVE-2025-68177",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68317",
                        "url": "https://ubuntu.com/security/CVE-2025-68317",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40315",
                        "url": "https://ubuntu.com/security/CVE-2025-40315",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40316",
                        "url": "https://ubuntu.com/security/CVE-2025-40316",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40360",
                        "url": "https://ubuntu.com/security/CVE-2025-40360",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68179",
                        "url": "https://ubuntu.com/security/CVE-2025-68179",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68310",
                        "url": "https://ubuntu.com/security/CVE-2025-68310",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40317",
                        "url": "https://ubuntu.com/security/CVE-2025-40317",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40359",
                        "url": "https://ubuntu.com/security/CVE-2025-40359",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68181",
                        "url": "https://ubuntu.com/security/CVE-2025-68181",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68170",
                        "url": "https://ubuntu.com/security/CVE-2025-68170",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40213",
                        "url": "https://ubuntu.com/security/CVE-2025-40213",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40318",
                        "url": "https://ubuntu.com/security/CVE-2025-40318",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68312",
                        "url": "https://ubuntu.com/security/CVE-2025-68312",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40344",
                        "url": "https://ubuntu.com/security/CVE-2025-40344",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68172",
                        "url": "https://ubuntu.com/security/CVE-2025-68172",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40319",
                        "url": "https://ubuntu.com/security/CVE-2025-40319",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68182",
                        "url": "https://ubuntu.com/security/CVE-2025-68182",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68314",
                        "url": "https://ubuntu.com/security/CVE-2025-68314",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68189",
                        "url": "https://ubuntu.com/security/CVE-2025-68189",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68171",
                        "url": "https://ubuntu.com/security/CVE-2025-68171",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68313",
                        "url": "https://ubuntu.com/security/CVE-2025-68313",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40320",
                        "url": "https://ubuntu.com/security/CVE-2025-40320",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40321",
                        "url": "https://ubuntu.com/security/CVE-2025-40321",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40322",
                        "url": "https://ubuntu.com/security/CVE-2025-40322",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40211",
                        "url": "https://ubuntu.com/security/CVE-2025-40211",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40323",
                        "url": "https://ubuntu.com/security/CVE-2025-40323",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40210",
                        "url": "https://ubuntu.com/security/CVE-2025-40210",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40324",
                        "url": "https://ubuntu.com/security/CVE-2025-40324",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40326",
                        "url": "https://ubuntu.com/security/CVE-2025-40326",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40084",
                        "url": "https://ubuntu.com/security/CVE-2025-40084",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40222",
                        "url": "https://ubuntu.com/security/CVE-2025-40222",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40223",
                        "url": "https://ubuntu.com/security/CVE-2025-40223",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40106",
                        "url": "https://ubuntu.com/security/CVE-2025-40106",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40224",
                        "url": "https://ubuntu.com/security/CVE-2025-40224",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40225",
                        "url": "https://ubuntu.com/security/CVE-2025-40225",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40226",
                        "url": "https://ubuntu.com/security/CVE-2025-40226",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40227",
                        "url": "https://ubuntu.com/security/CVE-2025-40227",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40228",
                        "url": "https://ubuntu.com/security/CVE-2025-40228",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40229",
                        "url": "https://ubuntu.com/security/CVE-2025-40229",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40230",
                        "url": "https://ubuntu.com/security/CVE-2025-40230",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40231",
                        "url": "https://ubuntu.com/security/CVE-2025-40231",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40233",
                        "url": "https://ubuntu.com/security/CVE-2025-40233",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40235",
                        "url": "https://ubuntu.com/security/CVE-2025-40235",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40236",
                        "url": "https://ubuntu.com/security/CVE-2025-40236",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40237",
                        "url": "https://ubuntu.com/security/CVE-2025-40237",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40238",
                        "url": "https://ubuntu.com/security/CVE-2025-40238",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40239",
                        "url": "https://ubuntu.com/security/CVE-2025-40239",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40240",
                        "url": "https://ubuntu.com/security/CVE-2025-40240",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40241",
                        "url": "https://ubuntu.com/security/CVE-2025-40241",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40242",
                        "url": "https://ubuntu.com/security/CVE-2025-40242",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40243",
                        "url": "https://ubuntu.com/security/CVE-2025-40243",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40244",
                        "url": "https://ubuntu.com/security/CVE-2025-40244",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40245",
                        "url": "https://ubuntu.com/security/CVE-2025-40245",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40086",
                        "url": "https://ubuntu.com/security/CVE-2025-40086",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40087",
                        "url": "https://ubuntu.com/security/CVE-2025-40087",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40088",
                        "url": "https://ubuntu.com/security/CVE-2025-40088",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40162",
                        "url": "https://ubuntu.com/security/CVE-2025-40162",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40085",
                        "url": "https://ubuntu.com/security/CVE-2025-40085",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40172",
                        "url": "https://ubuntu.com/security/CVE-2025-40172",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40177",
                        "url": "https://ubuntu.com/security/CVE-2025-40177",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40163",
                        "url": "https://ubuntu.com/security/CVE-2025-40163",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40174",
                        "url": "https://ubuntu.com/security/CVE-2025-40174",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40089",
                        "url": "https://ubuntu.com/security/CVE-2025-40089",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40176",
                        "url": "https://ubuntu.com/security/CVE-2025-40176",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40164",
                        "url": "https://ubuntu.com/security/CVE-2025-40164",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40091",
                        "url": "https://ubuntu.com/security/CVE-2025-40091",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40175",
                        "url": "https://ubuntu.com/security/CVE-2025-40175",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40173",
                        "url": "https://ubuntu.com/security/CVE-2025-40173",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40092",
                        "url": "https://ubuntu.com/security/CVE-2025-40092",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40093",
                        "url": "https://ubuntu.com/security/CVE-2025-40093",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40094",
                        "url": "https://ubuntu.com/security/CVE-2025-40094",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40095",
                        "url": "https://ubuntu.com/security/CVE-2025-40095",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40165",
                        "url": "https://ubuntu.com/security/CVE-2025-40165",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40096",
                        "url": "https://ubuntu.com/security/CVE-2025-40096",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40097",
                        "url": "https://ubuntu.com/security/CVE-2025-40097",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40098",
                        "url": "https://ubuntu.com/security/CVE-2025-40098",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40099",
                        "url": "https://ubuntu.com/security/CVE-2025-40099",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40100",
                        "url": "https://ubuntu.com/security/CVE-2025-40100",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40101",
                        "url": "https://ubuntu.com/security/CVE-2025-40101",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40167",
                        "url": "https://ubuntu.com/security/CVE-2025-40167",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40102",
                        "url": "https://ubuntu.com/security/CVE-2025-40102",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40103",
                        "url": "https://ubuntu.com/security/CVE-2025-40103",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40104",
                        "url": "https://ubuntu.com/security/CVE-2025-40104",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40166",
                        "url": "https://ubuntu.com/security/CVE-2025-40166",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40105",
                        "url": "https://ubuntu.com/security/CVE-2025-40105",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40019",
                        "url": "https://ubuntu.com/security/CVE-2025-40019",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40214",
                        "url": "https://ubuntu.com/security/CVE-2025-40214",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [
                    2137844,
                    2013232,
                    2074082,
                    2137845,
                    1786013,
                    2137849,
                    1786013,
                    2136820,
                    2137698,
                    2129812,
                    2125022,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136813,
                    2132317,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2132095,
                    2131046,
                    2115860,
                    2128792,
                    2121852,
                    2131259,
                    2131259,
                    2131702,
                    2129610,
                    2138113,
                    2138115,
                    2133507,
                    1975592,
                    2013232
                ],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-40256",
                                "url": "https://ubuntu.com/security/CVE-2025-40256",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68204",
                                "url": "https://ubuntu.com/security/CVE-2025-68204",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68203",
                                "url": "https://ubuntu.com/security/CVE-2025-68203",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40267",
                                "url": "https://ubuntu.com/security/CVE-2025-40267",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68198",
                                "url": "https://ubuntu.com/security/CVE-2025-68198",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68199",
                                "url": "https://ubuntu.com/security/CVE-2025-68199",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40268",
                                "url": "https://ubuntu.com/security/CVE-2025-40268",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40269",
                                "url": "https://ubuntu.com/security/CVE-2025-40269",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68205",
                                "url": "https://ubuntu.com/security/CVE-2025-68205",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40270",
                                "url": "https://ubuntu.com/security/CVE-2025-40270",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40271",
                                "url": "https://ubuntu.com/security/CVE-2025-40271",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40272",
                                "url": "https://ubuntu.com/security/CVE-2025-40272",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68245",
                                "url": "https://ubuntu.com/security/CVE-2025-68245",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68240",
                                "url": "https://ubuntu.com/security/CVE-2025-68240",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68241",
                                "url": "https://ubuntu.com/security/CVE-2025-68241",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68211",
                                "url": "https://ubuntu.com/security/CVE-2025-68211",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68246",
                                "url": "https://ubuntu.com/security/CVE-2025-68246",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40273",
                                "url": "https://ubuntu.com/security/CVE-2025-40273",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40212",
                                "url": "https://ubuntu.com/security/CVE-2025-40212",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40274",
                                "url": "https://ubuntu.com/security/CVE-2025-40274",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68202",
                                "url": "https://ubuntu.com/security/CVE-2025-68202",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68239",
                                "url": "https://ubuntu.com/security/CVE-2025-68239",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68247",
                                "url": "https://ubuntu.com/security/CVE-2025-68247",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68208",
                                "url": "https://ubuntu.com/security/CVE-2025-68208",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68200",
                                "url": "https://ubuntu.com/security/CVE-2025-68200",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40275",
                                "url": "https://ubuntu.com/security/CVE-2025-40275",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68242",
                                "url": "https://ubuntu.com/security/CVE-2025-68242",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68243",
                                "url": "https://ubuntu.com/security/CVE-2025-68243",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40276",
                                "url": "https://ubuntu.com/security/CVE-2025-40276",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40277",
                                "url": "https://ubuntu.com/security/CVE-2025-40277",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68206",
                                "url": "https://ubuntu.com/security/CVE-2025-68206",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68209",
                                "url": "https://ubuntu.com/security/CVE-2025-68209",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40278",
                                "url": "https://ubuntu.com/security/CVE-2025-40278",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40279",
                                "url": "https://ubuntu.com/security/CVE-2025-40279",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40280",
                                "url": "https://ubuntu.com/security/CVE-2025-40280",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40281",
                                "url": "https://ubuntu.com/security/CVE-2025-40281",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40282",
                                "url": "https://ubuntu.com/security/CVE-2025-40282",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40283",
                                "url": "https://ubuntu.com/security/CVE-2025-40283",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40284",
                                "url": "https://ubuntu.com/security/CVE-2025-40284",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68210",
                                "url": "https://ubuntu.com/security/CVE-2025-68210",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40285",
                                "url": "https://ubuntu.com/security/CVE-2025-40285",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40286",
                                "url": "https://ubuntu.com/security/CVE-2025-40286",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40287",
                                "url": "https://ubuntu.com/security/CVE-2025-40287",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40288",
                                "url": "https://ubuntu.com/security/CVE-2025-40288",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40289",
                                "url": "https://ubuntu.com/security/CVE-2025-40289",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68201",
                                "url": "https://ubuntu.com/security/CVE-2025-68201",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68207",
                                "url": "https://ubuntu.com/security/CVE-2025-68207",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68244",
                                "url": "https://ubuntu.com/security/CVE-2025-68244",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68316",
                                "url": "https://ubuntu.com/security/CVE-2025-68316",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40292",
                                "url": "https://ubuntu.com/security/CVE-2025-40292",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68180",
                                "url": "https://ubuntu.com/security/CVE-2025-68180",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40327",
                                "url": "https://ubuntu.com/security/CVE-2025-40327",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40328",
                                "url": "https://ubuntu.com/security/CVE-2025-40328",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40291",
                                "url": "https://ubuntu.com/security/CVE-2025-40291",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68322",
                                "url": "https://ubuntu.com/security/CVE-2025-68322",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40293",
                                "url": "https://ubuntu.com/security/CVE-2025-40293",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40294",
                                "url": "https://ubuntu.com/security/CVE-2025-40294",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40329",
                                "url": "https://ubuntu.com/security/CVE-2025-40329",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40295",
                                "url": "https://ubuntu.com/security/CVE-2025-40295",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40296",
                                "url": "https://ubuntu.com/security/CVE-2025-40296",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40297",
                                "url": "https://ubuntu.com/security/CVE-2025-40297",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68320",
                                "url": "https://ubuntu.com/security/CVE-2025-68320",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68169",
                                "url": "https://ubuntu.com/security/CVE-2025-68169",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68197",
                                "url": "https://ubuntu.com/security/CVE-2025-68197",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40330",
                                "url": "https://ubuntu.com/security/CVE-2025-40330",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68192",
                                "url": "https://ubuntu.com/security/CVE-2025-68192",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40331",
                                "url": "https://ubuntu.com/security/CVE-2025-40331",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68187",
                                "url": "https://ubuntu.com/security/CVE-2025-68187",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68167",
                                "url": "https://ubuntu.com/security/CVE-2025-68167",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68319",
                                "url": "https://ubuntu.com/security/CVE-2025-68319",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40298",
                                "url": "https://ubuntu.com/security/CVE-2025-40298",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40299",
                                "url": "https://ubuntu.com/security/CVE-2025-40299",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40301",
                                "url": "https://ubuntu.com/security/CVE-2025-40301",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40358",
                                "url": "https://ubuntu.com/security/CVE-2025-40358",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68186",
                                "url": "https://ubuntu.com/security/CVE-2025-68186",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68184",
                                "url": "https://ubuntu.com/security/CVE-2025-68184",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40302",
                                "url": "https://ubuntu.com/security/CVE-2025-40302",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40303",
                                "url": "https://ubuntu.com/security/CVE-2025-40303",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40362",
                                "url": "https://ubuntu.com/security/CVE-2025-40362",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40332",
                                "url": "https://ubuntu.com/security/CVE-2025-40332",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40304",
                                "url": "https://ubuntu.com/security/CVE-2025-40304",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40305",
                                "url": "https://ubuntu.com/security/CVE-2025-40305",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68318",
                                "url": "https://ubuntu.com/security/CVE-2025-68318",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40209",
                                "url": "https://ubuntu.com/security/CVE-2025-40209",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68183",
                                "url": "https://ubuntu.com/security/CVE-2025-68183",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68173",
                                "url": "https://ubuntu.com/security/CVE-2025-68173",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40306",
                                "url": "https://ubuntu.com/security/CVE-2025-40306",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40307",
                                "url": "https://ubuntu.com/security/CVE-2025-40307",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40308",
                                "url": "https://ubuntu.com/security/CVE-2025-40308",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40309",
                                "url": "https://ubuntu.com/security/CVE-2025-40309",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68174",
                                "url": "https://ubuntu.com/security/CVE-2025-68174",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40310",
                                "url": "https://ubuntu.com/security/CVE-2025-40310",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40361",
                                "url": "https://ubuntu.com/security/CVE-2025-40361",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40311",
                                "url": "https://ubuntu.com/security/CVE-2025-40311",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68185",
                                "url": "https://ubuntu.com/security/CVE-2025-68185",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68176",
                                "url": "https://ubuntu.com/security/CVE-2025-68176",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68190",
                                "url": "https://ubuntu.com/security/CVE-2025-68190",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68168",
                                "url": "https://ubuntu.com/security/CVE-2025-68168",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40312",
                                "url": "https://ubuntu.com/security/CVE-2025-40312",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40333",
                                "url": "https://ubuntu.com/security/CVE-2025-40333",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68321",
                                "url": "https://ubuntu.com/security/CVE-2025-68321",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40334",
                                "url": "https://ubuntu.com/security/CVE-2025-40334",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68191",
                                "url": "https://ubuntu.com/security/CVE-2025-68191",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68309",
                                "url": "https://ubuntu.com/security/CVE-2025-68309",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40313",
                                "url": "https://ubuntu.com/security/CVE-2025-40313",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40335",
                                "url": "https://ubuntu.com/security/CVE-2025-40335",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40314",
                                "url": "https://ubuntu.com/security/CVE-2025-40314",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40336",
                                "url": "https://ubuntu.com/security/CVE-2025-40336",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68193",
                                "url": "https://ubuntu.com/security/CVE-2025-68193",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68175",
                                "url": "https://ubuntu.com/security/CVE-2025-68175",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68188",
                                "url": "https://ubuntu.com/security/CVE-2025-68188",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68315",
                                "url": "https://ubuntu.com/security/CVE-2025-68315",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40337",
                                "url": "https://ubuntu.com/security/CVE-2025-40337",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40338",
                                "url": "https://ubuntu.com/security/CVE-2025-40338",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40339",
                                "url": "https://ubuntu.com/security/CVE-2025-40339",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68194",
                                "url": "https://ubuntu.com/security/CVE-2025-68194",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40363",
                                "url": "https://ubuntu.com/security/CVE-2025-40363",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68311",
                                "url": "https://ubuntu.com/security/CVE-2025-68311",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40340",
                                "url": "https://ubuntu.com/security/CVE-2025-40340",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68196",
                                "url": "https://ubuntu.com/security/CVE-2025-68196",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68178",
                                "url": "https://ubuntu.com/security/CVE-2025-68178",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40341",
                                "url": "https://ubuntu.com/security/CVE-2025-40341",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40342",
                                "url": "https://ubuntu.com/security/CVE-2025-40342",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40343",
                                "url": "https://ubuntu.com/security/CVE-2025-40343",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68177",
                                "url": "https://ubuntu.com/security/CVE-2025-68177",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68317",
                                "url": "https://ubuntu.com/security/CVE-2025-68317",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40315",
                                "url": "https://ubuntu.com/security/CVE-2025-40315",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40316",
                                "url": "https://ubuntu.com/security/CVE-2025-40316",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40360",
                                "url": "https://ubuntu.com/security/CVE-2025-40360",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68179",
                                "url": "https://ubuntu.com/security/CVE-2025-68179",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68310",
                                "url": "https://ubuntu.com/security/CVE-2025-68310",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40317",
                                "url": "https://ubuntu.com/security/CVE-2025-40317",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40359",
                                "url": "https://ubuntu.com/security/CVE-2025-40359",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68181",
                                "url": "https://ubuntu.com/security/CVE-2025-68181",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68170",
                                "url": "https://ubuntu.com/security/CVE-2025-68170",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40213",
                                "url": "https://ubuntu.com/security/CVE-2025-40213",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40318",
                                "url": "https://ubuntu.com/security/CVE-2025-40318",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68312",
                                "url": "https://ubuntu.com/security/CVE-2025-68312",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40344",
                                "url": "https://ubuntu.com/security/CVE-2025-40344",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68172",
                                "url": "https://ubuntu.com/security/CVE-2025-68172",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40319",
                                "url": "https://ubuntu.com/security/CVE-2025-40319",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68182",
                                "url": "https://ubuntu.com/security/CVE-2025-68182",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68314",
                                "url": "https://ubuntu.com/security/CVE-2025-68314",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68189",
                                "url": "https://ubuntu.com/security/CVE-2025-68189",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68171",
                                "url": "https://ubuntu.com/security/CVE-2025-68171",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68313",
                                "url": "https://ubuntu.com/security/CVE-2025-68313",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40320",
                                "url": "https://ubuntu.com/security/CVE-2025-40320",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40321",
                                "url": "https://ubuntu.com/security/CVE-2025-40321",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40322",
                                "url": "https://ubuntu.com/security/CVE-2025-40322",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40211",
                                "url": "https://ubuntu.com/security/CVE-2025-40211",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40323",
                                "url": "https://ubuntu.com/security/CVE-2025-40323",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40210",
                                "url": "https://ubuntu.com/security/CVE-2025-40210",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40324",
                                "url": "https://ubuntu.com/security/CVE-2025-40324",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40326",
                                "url": "https://ubuntu.com/security/CVE-2025-40326",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40084",
                                "url": "https://ubuntu.com/security/CVE-2025-40084",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40222",
                                "url": "https://ubuntu.com/security/CVE-2025-40222",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40223",
                                "url": "https://ubuntu.com/security/CVE-2025-40223",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40106",
                                "url": "https://ubuntu.com/security/CVE-2025-40106",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40224",
                                "url": "https://ubuntu.com/security/CVE-2025-40224",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40225",
                                "url": "https://ubuntu.com/security/CVE-2025-40225",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40226",
                                "url": "https://ubuntu.com/security/CVE-2025-40226",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40227",
                                "url": "https://ubuntu.com/security/CVE-2025-40227",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40228",
                                "url": "https://ubuntu.com/security/CVE-2025-40228",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40229",
                                "url": "https://ubuntu.com/security/CVE-2025-40229",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40230",
                                "url": "https://ubuntu.com/security/CVE-2025-40230",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40231",
                                "url": "https://ubuntu.com/security/CVE-2025-40231",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40233",
                                "url": "https://ubuntu.com/security/CVE-2025-40233",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40235",
                                "url": "https://ubuntu.com/security/CVE-2025-40235",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40236",
                                "url": "https://ubuntu.com/security/CVE-2025-40236",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40237",
                                "url": "https://ubuntu.com/security/CVE-2025-40237",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40238",
                                "url": "https://ubuntu.com/security/CVE-2025-40238",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40239",
                                "url": "https://ubuntu.com/security/CVE-2025-40239",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40240",
                                "url": "https://ubuntu.com/security/CVE-2025-40240",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40241",
                                "url": "https://ubuntu.com/security/CVE-2025-40241",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40242",
                                "url": "https://ubuntu.com/security/CVE-2025-40242",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40243",
                                "url": "https://ubuntu.com/security/CVE-2025-40243",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40244",
                                "url": "https://ubuntu.com/security/CVE-2025-40244",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40245",
                                "url": "https://ubuntu.com/security/CVE-2025-40245",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40086",
                                "url": "https://ubuntu.com/security/CVE-2025-40086",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40087",
                                "url": "https://ubuntu.com/security/CVE-2025-40087",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40088",
                                "url": "https://ubuntu.com/security/CVE-2025-40088",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40162",
                                "url": "https://ubuntu.com/security/CVE-2025-40162",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40085",
                                "url": "https://ubuntu.com/security/CVE-2025-40085",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40172",
                                "url": "https://ubuntu.com/security/CVE-2025-40172",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40177",
                                "url": "https://ubuntu.com/security/CVE-2025-40177",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40163",
                                "url": "https://ubuntu.com/security/CVE-2025-40163",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40174",
                                "url": "https://ubuntu.com/security/CVE-2025-40174",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40089",
                                "url": "https://ubuntu.com/security/CVE-2025-40089",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40176",
                                "url": "https://ubuntu.com/security/CVE-2025-40176",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40164",
                                "url": "https://ubuntu.com/security/CVE-2025-40164",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40091",
                                "url": "https://ubuntu.com/security/CVE-2025-40091",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40175",
                                "url": "https://ubuntu.com/security/CVE-2025-40175",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40173",
                                "url": "https://ubuntu.com/security/CVE-2025-40173",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40092",
                                "url": "https://ubuntu.com/security/CVE-2025-40092",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40093",
                                "url": "https://ubuntu.com/security/CVE-2025-40093",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40094",
                                "url": "https://ubuntu.com/security/CVE-2025-40094",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40095",
                                "url": "https://ubuntu.com/security/CVE-2025-40095",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40165",
                                "url": "https://ubuntu.com/security/CVE-2025-40165",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40096",
                                "url": "https://ubuntu.com/security/CVE-2025-40096",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40097",
                                "url": "https://ubuntu.com/security/CVE-2025-40097",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40098",
                                "url": "https://ubuntu.com/security/CVE-2025-40098",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40099",
                                "url": "https://ubuntu.com/security/CVE-2025-40099",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40100",
                                "url": "https://ubuntu.com/security/CVE-2025-40100",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40101",
                                "url": "https://ubuntu.com/security/CVE-2025-40101",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40167",
                                "url": "https://ubuntu.com/security/CVE-2025-40167",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40102",
                                "url": "https://ubuntu.com/security/CVE-2025-40102",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40103",
                                "url": "https://ubuntu.com/security/CVE-2025-40103",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40104",
                                "url": "https://ubuntu.com/security/CVE-2025-40104",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40166",
                                "url": "https://ubuntu.com/security/CVE-2025-40166",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40105",
                                "url": "https://ubuntu.com/security/CVE-2025-40105",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40019",
                                "url": "https://ubuntu.com/security/CVE-2025-40019",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40214",
                                "url": "https://ubuntu.com/security/CVE-2025-40214",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * noble/linux-riscv-6.17: 6.17.0-14.14.1~24.04.1 -proposed tracker (LP: #2137844)",
                            "",
                            "  * Enable StarFive VisionFive 2 board (LP: #2013232)",
                            "    - SAUCE: PCI: starfive: Use regulator APIs instead of GPIO APIs to control",
                            "      the 3V3 power supply of PCIe slots",
                            "",
                            "  * Enable Microchip PIC64GX Curiosity Kit (LP: #2074082)",
                            "    - dt-bindings: cache: sifive,ccache0: add a pic64gx compatible",
                            "    - dt-bindings: interrupt-controller: sifive,plic: Add pic64gx",
                            "      compatibility",
                            "    - dt-bindings: gpio: mpfs-gpio: Add pic64gx GPIO compatibility",
                            "    - dt-bindings: net: cdns,macb: Add pic64gx compatibility",
                            "    - riscv: dts: microchip: Minor whitespace cleanup",
                            "    - riscv: dts: microchip: add common board dtsi for icicle kit variants",
                            "    - dt-bindings: riscv: microchip: document icicle kit with production",
                            "      device",
                            "    - riscv: dts: microchip: add icicle kit with production device",
                            "    - riscv: dts: microchip: rename icicle kit ccc clock and other minor fixes",
                            "    - dt-bindings: riscv: microchip: document Discovery Kit",
                            "    - riscv: dts: microchip: add a device tree for Discovery Kit",
                            "    - dt-bindings: soc: microchip: document the simple-mfd syscon on PolarFire",
                            "      SoC",
                            "    - soc: microchip: add mfd drivers for two syscon regions on PolarFire SoC",
                            "    - MAINTAINERS: add new soc drivers to Microchip RISC-V entry",
                            "    - MAINTAINERS: rename Microchip RISC-V entry",
                            "    - dt-bindings: pinctrl: document pic64gx \"gpio2\" pinmux",
                            "    - pinctrl: add pic64gx \"gpio2\" pinmux driver",
                            "    - dt-bindings: pinctrl: document polarfire soc iomux0 pinmux",
                            "    - pinctrl: add polarfire soc iomux0 pinmux driver",
                            "    - MAINTAINERS: add Microchip RISC-V pinctrl drivers/bindings to entry",
                            "    - dt-bindings: clk: microchip: mpfs: remove first reg region",
                            "    - clk: microchip: mpfs: use regmap for clocks",
                            "    - reset: mpfs: add non-auxiliary bus probing",
                            "    - pinctrl: pic64gx-gpio2: Add REGMAP_MMIO dependency",
                            "    - pinctrl: add CONFIG_OF dependencies for microchip drivers",
                            "    - SAUCE: pinctrl: move microchip riscv pinctrl drivers to a folder",
                            "    - SAUCE: pinctrl: add generic functions + pins mapper",
                            "    - SAUCE: dt-bindings: pinctrl: document polarfire soc mssio pin controller",
                            "    - SAUCE: pinctrl: add polarfire soc mssio pinctrl driver",
                            "    - SAUCE: MAINTAINERS: add Microchip mpfs mssio driver/bindings to entry",
                            "    - SAUCE: dt-bindings: soc: microchip: add compatible for the mss-top-",
                            "      sysreg on pic64gx",
                            "    - SAUCE: dt-bindings: soc: microchip: mpfs-sys-controller: Add pic64gx",
                            "      compatibility",
                            "    - SAUCE: soc: microchip: mpfs-sys-controller: add support for pic64gx",
                            "    - SAUCE: dt-bindings: timer: sifive,clint: add pic64gx compatibility",
                            "    - SAUCE: clk: microchip: drop POLARFIRE from ARCH_MICROCHIP_POLARFIRE",
                            "    - SAUCE: dt-bindings: clock: mpfs-ccc: Add pic64gx compatibility",
                            "    - SAUCE: dt-bindings: clock: mpfs-clkcfg: Add pic64gx compatibility",
                            "    - SAUCE: dt-bindings: mbox: add pic64gx mailbox compatibility to mpfs",
                            "      mailbox",
                            "    - SAUCE: mailbox: mpfs: drop POLARFIRE from ARCH_MICROCHIP_POLARFIRE",
                            "    - SAUCE: dt-bindings: riscv: microchip: document the PIC64GX curiosity kit",
                            "    - SAUCE: riscv: dts: microchip: add pic64gx and its curiosity kit",
                            "    - SAUCE: riscv: dts: microchip: remove POLARFIRE mention in Makefile",
                            "    - [Config] riscv: updateconfigs for PIC64GX support",
                            "",
                            "  [ Ubuntu-riscv: 6.17.0-14.14.1 ]",
                            "",
                            "  * questing/linux-riscv: 6.17.0-14.14.1 -proposed tracker (LP: #2137845)",
                            "  * Packaging resync (LP: #1786013)",
                            "    - [Packaging] debian.riscv/dkms-versions -- update from kernel-versions",
                            "      (main/2026.01.12)",
                            "  [ Ubuntu: 6.17.0-14.14 ]",
                            "  * questing/linux: 6.17.0-14.14 -proposed tracker (LP: #2137849)",
                            "  * Packaging resync (LP: #1786013)",
                            "    - [Packaging] debian.master/dkms-versions -- update from kernel-versions",
                            "      (main/2026.01.12)",
                            "  * ubuntu_kselftests:_net/net:gre_gso.sh failing (LP: #2136820)",
                            "    - SAUCE increase socat timeout in gre_gso.sh",
                            "  * ubuntu_blktrace_smoke_test fails on questing with rust coreutils",
                            "    (LP: #2137698)",
                            "    - SAUCE: Revert \"ext4: fail unaligned direct IO write with EINVAL\"",
                            "  * bareudp.sh in ubuntu_kselftests_net fails because of dash default shell",
                            "    (LP: #2129812)",
                            "    - selftests: net: use BASH for bareudp testing",
                            "  * CVE-2025-40256",
                            "    - xfrm: also call xfrm_state_delete_tunnel at destroy time for states that",
                            "      were never added",
                            "  * Enable PMF on AMD HPT/STX/KRK (LP: #2125022)",
                            "    - platform/x86/amd/pmf: Add support for adjusting PMF PPT and PPT APU",
                            "      thresholds",
                            "    - platform/x86/amd/pmf: Extend custom BIOS inputs for more policies",
                            "    - platform/x86/amd/pmf: Update ta_pmf_action structure member",
                            "    - platform/x86/amd/pmf: Add helper to verify BIOS input notifications are",
                            "      enable/disable",
                            "    - platform/x86/amd/pmf: Add custom BIOS input support for AMD_CPU_ID_PS",
                            "    - platform/x86/amd/pmf: Preserve custom BIOS inputs for evaluating the",
                            "      policies",
                            "    - platform/x86/amd/pmf: Call enact function sooner to process early",
                            "      pending requests",
                            "    - platform/x86/amd/pmf: Add debug logs for pending requests and custom",
                            "      BIOS inputs",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850)",
                            "    - iommufd/selftest: Fix ioctl return value in _test_cmd_trigger_vevents()",
                            "    - drm/mediatek: Add pm_runtime support for GCE power control",
                            "    - drm/i915: Fix conversion between clock ticks and nanoseconds",
                            "    - drm/amdgpu: set default gfx reset masks for gfx6-8",
                            "    - drm/amd/display: Don't stretch non-native images by default in eDP",
                            "    - smb: client: fix refcount leak in smb2_set_path_attr",
                            "    - iommufd: Make vfio_compat's unmap succeed if the range is already empty",
                            "    - futex: Optimize per-cpu reference counting",
                            "    - drm/amd: Fix suspend failure with secure display TA",
                            "    - drm/xe: Move declarations under conditional branch",
                            "    - drm/xe: Do clean shutdown also when using flr",
                            "    - drm/amd/display: Add pixel_clock to amd_pp_display_configuration",
                            "    - drm/amd/pm: Use pm_display_cfg in legacy DPM (v2)",
                            "    - drm/amd/display: Disable fastboot on DCE 6 too",
                            "    - drm/amd/pm: Disable MCLK switching on SI at high pixel clocks",
                            "    - drm/amd: Disable ASPM on SI",
                            "    - arm64: kprobes: check the return value of set_memory_rox()",
                            "    - compiler_types: Move unused static inline functions warning to W=2",
                            "    - riscv: Build loader.bin exclusively for Canaan K210",
                            "    - RISC-V: clear hot-unplugged cores from all task mm_cpumasks to avoid",
                            "      rfence errors",
                            "    - riscv: acpi: avoid errors caused by probing DT devices when ACPI is used",
                            "    - fs: return EOPNOTSUPP from file_setattr/file_getattr syscalls",
                            "    - ASoC: nau8821: Avoid unnecessary blocking in IRQ handler",
                            "    - NFS4: Fix state renewals missing after boot",
                            "    - drm/amdkfd: fix suspend/resume all calls in mes based eviction path",
                            "    - NFS4: Apply delay_retrans to async operations",
                            "    - HID: intel-thc-hid: intel-quickspi: Add ARL PCI Device Id's",
                            "    - HID: quirks: avoid Cooler Master MM712 dongle wakeup bug",
                            "    - ixgbe: handle IXGBE_VF_GET_PF_LINK_STATE mailbox operation",
                            "    - HID: nintendo: Wait longer for initial probe",
                            "    - NFS: check if suid/sgid was cleared after a write as needed",
                            "    - HID: quirks: Add ALWAYS_POLL quirk for VRS R295 steering wheel",
                            "    - io_uring: fix unexpected placement on same size resizing",
                            "    - HID: logitech-hidpp: Add HIDPP_QUIRK_RESET_HI_RES_SCROLL",
                            "    - ASoC: max98090/91: fixed max98091 ALSA widget powering up/down",
                            "    - ALSA: hda/realtek: Fix mute led for HP Omen 17-cb0xxx",
                            "    - ixgbe: handle IXGBE_VF_FEATURES_NEGOTIATE mbox cmd",
                            "    - wifi: ath11k: zero init info->status in wmi_process_mgmt_tx_comp()",
                            "    - selftests: net: local_termination: Wait for interfaces to come up",
                            "    - net: fec: correct rx_bytes statistic for the case SHIFT16 is set",
                            "    - net: phy: micrel: Introduce lanphy_modify_page_reg",
                            "    - net: phy: micrel: Replace hardcoded pages with defines",
                            "    - net: phy: micrel: lan8814 fix reset of the QSGMII interface",
                            "    - rust: Add -fno-isolate-erroneous-paths-dereference to",
                            "      bindgen_skip_c_flags",
                            "    - NFSD: Skip close replay processing if XDR encoding fails",
                            "    - Bluetooth: 6lowpan: fix BDADDR_LE vs ADDR_LE_DEV address type confusion",
                            "    - Bluetooth: 6lowpan: Don't hold spin lock over sleeping functions",
                            "    - Bluetooth: hci_conn: Fix not cleaning up PA_LINK connections",
                            "    - net: dsa: tag_brcm: do not mark link local traffic as offloaded",
                            "    - net/smc: fix mismatch between CLC header and proposal",
                            "    - net/handshake: Fix memory leak in tls_handshake_accept()",
                            "    - net: ethernet: ti: am65-cpsw-qos: fix IET verify/response timeout",
                            "    - net: ethernet: ti: am65-cpsw-qos: fix IET verify retry mechanism",
                            "    - net: mdio: fix resource leak in mdiobus_register_device()",
                            "    - wifi: mac80211: skip rate verification for not captured PSDUs",
                            "    - Bluetooth: hci_event: Fix not handling PA Sync Lost event",
                            "    - net/mlx5e: Fix missing error assignment in mlx5e_xfrm_add_state()",
                            "    - net/mlx5e: Fix maxrate wraparound in threshold between units",
                            "    - net/mlx5e: Fix wraparound in rate limiting for values above 255 Gbps",
                            "    - net/mlx5e: Fix potentially misleading debug message",
                            "    - net/mlx5: Fix typo of MLX5_EQ_DOORBEL_OFFSET",
                            "    - net/mlx5: Store the global doorbell in mlx5_priv",
                            "    - net/mlx5e: Prepare for using different CQ doorbells",
                            "    - net_sched: limit try_bulk_dequeue_skb() batches",
                            "    - wifi: iwlwifi: mvm: fix beacon template/fixed rate",
                            "    - wifi: iwlwifi: mld: always take beacon ies in link grading",
                            "    - virtio-net: fix incorrect flags recording in big mode",
                            "    - hsr: Fix supervision frame sending on HSRv0",
                            "    - hsr: Follow standard for HSRv0 supervision frames",
                            "    - ACPI: CPPC: Detect preferred core availability on online CPUs",
                            "    - ACPI: CPPC: Check _CPC validity for only the online CPUs",
                            "    - ACPI: CPPC: Perform fast check switch only for online CPUs",
                            "    - ACPI: CPPC: Limit perf ctrs in PCC check only to online CPUs",
                            "    - cpufreq: intel_pstate: Check IDA only before MSR_IA32_PERF_CTL writes",
                            "    - Bluetooth: L2CAP: export l2cap_chan_hold for modules",
                            "    - io_uring/rsrc: don't use blk_rq_nr_phys_segments() as number of bvecs",
                            "    - acpi,srat: Fix incorrect device handle check for Generic Initiator",
                            "    - regulator: fixed: fix GPIO descriptor leak on register failure",
                            "    - ASoC: cs4271: Fix regulator leak on probe failure",
                            "    - ASoC: codecs: va-macro: fix resource leak in probe error path",
                            "    - drm/vmwgfx: Restore Guest-Backed only cursor plane support",
                            "    - ASoC: tas2781: fix getting the wrong device number",
                            "    - pnfs: Fix TLS logic in _nfs4_pnfs_v3_ds_connect()",
                            "    - pnfs: Fix TLS logic in _nfs4_pnfs_v4_ds_connect()",
                            "    - pnfs: Set transport security policy to RPC_XPRTSEC_NONE unless using TLS",
                            "    - simplify nfs_atomic_open_v23()",
                            "    - NFSv2/v3: Fix error handling in nfs_atomic_open_v23()",
                            "    - NFS: sysfs: fix leak when nfs_client kobject add fails",
                            "    - NFSv4: Fix an incorrect parameter when calling nfs4_call_sync()",
                            "    - drm/amd/amdgpu: Ensure isp_kernel_buffer_alloc() creates a new BO",
                            "    - acpi/hmat: Fix lockdep warning for hmem_register_resource()",
                            "    - ASoC: rsnd: fix OF node reference leak in rsnd_ssiu_probe()",
                            "    - drm/client: fix MODULE_PARM_DESC string for \"active\"",
                            "    - irqchip/riscv-intc: Add missing free() callback in riscv_intc_domain_ops",
                            "    - lib/crypto: arm/curve25519: Disable on CPU_BIG_ENDIAN",
                            "    - hostfs: Fix only passing host root in boot stage with new mount",
                            "    - afs: Fix dynamic lookup to fail on cell lookup failure",
                            "    - mtd: onenand: Pass correct pointer to IRQ handler",
                            "    - virtio-fs: fix incorrect check for fsvq->kobj",
                            "    - fs/namespace: correctly handle errors returned by grab_requested_mnt_ns",
                            "    - perf header: Write bpf_prog (infos|btfs)_cnt to data file",
                            "    - perf build: Don't fail fast path feature detection when binutils-devel",
                            "      is not available",
                            "    - perf lock: Fix segfault due to missing kernel map",
                            "    - perf test shell lock_contention: Extra debug diagnostics",
                            "    - perf test: Fix lock contention test",
                            "    - arm64: dts: rockchip: Set correct pinctrl for I2S1 8ch TX on odroid-m1",
                            "    - arm64: dts: rockchip: Fix PCIe power enable pin for BigTreeTech CB2 and",
                            "      Pi2",
                            "    - arm64: dts: rockchip: Make RK3588 GPU OPP table naming less generic",
                            "    - ARM: dts: imx6ull-engicam-microgea-rmm: fix report-rate-hz value",
                            "    - ARM: dts: imx51-zii-rdu1: Fix audmux node names",
                            "    - arm64: dts: imx8-ss-img: Avoid gpio0_mipi_csi GPIOs being deferred",
                            "    - arm64: dts: imx8mp-kontron: Fix USB OTG role switching",
                            "    - HID: hid-ntrig: Prevent memory leak in ntrig_report_version()",
                            "    - ARM: dts: BCM53573: Fix address of Luxul XAP-1440's Ethernet PHY",
                            "    - arm64: dts: rockchip: Fix USB power enable pin for BTT CB2 and Pi2",
                            "    - arm64: dts: rockchip: drop reset from rk3576 i2c9 node",
                            "    - pwm: adp5585: Correct mismatched pwm chip info",
                            "    - HID: playstation: Fix memory leak in dualshock4_get_calibration_data()",
                            "    - HID: uclogic: Fix potential memory leak in error path",
                            "    - LoongArch: KVM: Restore guest PMU if it is enabled",
                            "    - LoongArch: KVM: Add delay until timer interrupt injected",
                            "    - LoongArch: KVM: Fix max supported vCPUs set with EIOINTC",
                            "    - KVM: arm64: Make all 32bit ID registers fully writable",
                            "    - KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated",
                            "    - KVM: nSVM: Always recalculate LBR MSR intercepts in svm_update_lbrv()",
                            "    - KVM: nSVM: Fix and simplify LBR virtualization handling with nested",
                            "    - KVM: VMX: Fix check for valid GVA on an EPT violation",
                            "    - nfsd: add missing FATTR4_WORD2_CLONE_BLKSIZE from supported attributes",
                            "    - gcov: add support for GCC 15",
                            "    - kho: warn and exit when unpreserved page wasn't preserved",
                            "    - strparser: Fix signed/unsigned mismatch bug",
                            "    - dma-mapping: benchmark: Restore padding to ensure uABI remained",
                            "      consistent",
                            "    - maple_tree: fix tracepoint string pointers",
                            "    - LoongArch: Consolidate early_ioremap()/ioremap_prot()",
                            "    - LoongArch: Use correct accessor to read FWPC/MWPC",
                            "    - LoongArch: Let {pte,pmd}_modify() record the status of _PAGE_DIRTY",
                            "    - mm/damon/sysfs: change next_update_jiffies to a global variable",
                            "    - selftests/tracing: Run sample events to clear page cache events",
                            "    - wifi: mac80211: reject address change while connecting",
                            "    - mm/huge_memory: preserve PG_has_hwpoisoned if a folio is split to >0",
                            "      order",
                            "    - mm/mm_init: fix hash table order logging in alloc_large_system_hash()",
                            "    - mm/damon/stat: change last_refresh_jiffies to a global variable",
                            "    - mm/kmsan: fix kmsan kmalloc hook when no stack depots are allocated yet",
                            "    - mm/shmem: fix THP allocation and fallback loop",
                            "    - mm/mremap: honour writable bit in mremap pte batching",
                            "    - mm/huge_memory: fix folio split check for anon folios in swapcache",
                            "    - mmc: sdhci-of-dwcmshc: Change DLL_STRBIN_TAPNUM_DEFAULT to 0x4",
                            "    - mmc: pxamci: Simplify pxamci_probe() error handling using devm APIs",
                            "    - mmc: dw_mmc-rockchip: Fix wrong internal phase calculate",
                            "    - ASoC: sdw_utils: fix device reference leak in is_sdca_endpoint_present()",
                            "    - crypto: hisilicon/qm - Fix device reference leak in qm_get_qos_value",
                            "    - smb: client: fix cifs_pick_channel when channel needs reconnect",
                            "    - spi: Try to get ACPI GPIO IRQ earlier",
                            "    - x86/microcode/AMD: Add Zen5 model 0x44, stepping 0x1 minrev",
                            "    - x86/CPU/AMD: Add additional fixed RDSEED microcode revisions",
                            "    - selftests/user_events: fix type cast for write_index packed member in",
                            "      perf_test",
                            "    - gendwarfksyms: Skip files with no exports",
                            "    - ftrace: Fix BPF fexit with livepatch",
                            "    - LoongArch: Consolidate max_pfn & max_low_pfn calculation",
                            "    - LoongArch: Use physical addresses for CSR_MERRENTRY/CSR_TLBRENTRY",
                            "    - EDAC/altera: Handle OCRAM ECC enable after warm reset",
                            "    - EDAC/altera: Use INTTEST register for Ethernet and USB SBE injection",
                            "    - PM: hibernate: Emit an error when image writing fails",
                            "    - PM: hibernate: Use atomic64_t for compressed_size variable",
                            "    - btrfs: zoned: fix conventional zone capacity calculation",
                            "    - btrfs: zoned: fix stripe width calculation",
                            "    - btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe()",
                            "    - btrfs: do not update last_log_commit when logging inode due to a new",
                            "      name",
                            "    - btrfs: release root after error in data_reloc_print_warning_inode()",
                            "    - drm/amdkfd: relax checks for over allocation of save area",
                            "    - drm/amdgpu: disable peer-to-peer access for DCC-enabled GC12 VRAM",
                            "      surfaces",
                            "    - drm/i915/psr: fix pipe to vblank conversion",
                            "    - drm/xe/xe3lpg: Extend Wa_15016589081 for xe3lpg",
                            "    - drm/xe/xe3: Extend wa_14023061436",
                            "    - drm/xe/xe3: Add WA_14024681466 for Xe3_LPG",
                            "    - pmdomain: imx: Fix reference count leak in imx_gpc_remove",
                            "    - pmdomain: samsung: plug potential memleak during probe",
                            "    - pmdomain: samsung: Rework legacy splash-screen handover workaround",
                            "    - selftests: mptcp: connect: fix fallback note due to OoO",
                            "    - selftests: mptcp: join: rm: set backup flag",
                            "    - selftests: mptcp: join: endpoints: longer transfer",
                            "    - selftests: mptcp: connect: trunc: read all recv data",
                            "    - selftests: mptcp: join: userspace: longer transfer",
                            "    - selftests: mptcp: join: properly kill background tasks",
                            "    - mm/huge_memory: do not change split_huge_page*() target order silently",
                            "    - mm/memory: do not populate page table entries beyond i_size",
                            "    - scripts/decode_stacktrace.sh: symbol: avoid trailing whitespaces",
                            "    - scripts/decode_stacktrace.sh: symbol: preserve alignment",
                            "    - scripts/decode_stacktrace.sh: fix build ID and PC source parsing",
                            "    - ASoC: da7213: Convert to DEFINE_RUNTIME_DEV_PM_OPS()",
                            "    - ASoC: da7213: Use component driver suspend/resume",
                            "    - KVM: x86: Rename local \"ecx\" variables to \"msr\" and \"pmc\" as appropriate",
                            "    - KVM: x86: Add support for RDMSR/WRMSRNS w/ immediate on Intel",
                            "    - KVM: VMX: Inject #UD if guest tries to execute SEAMCALL or TDCALL",
                            "    - isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe()",
                            "    - net: phy: micrel: Fix lan8814_config_init",
                            "    - Linux 6.17.9",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68204",
                            "    - pmdomain: arm: scmi: Fix genpd leak on provider registration failure",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68203",
                            "    - drm/amdgpu: fix lock warning in amdgpu_userq_fence_driver_process",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40267",
                            "    - io_uring/rw: ensure allocated iovec gets cleared for early failure",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68198",
                            "    - crash: fix crashkernel resource shrink",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68199",
                            "    - codetag: debug: handle existing CODETAG_EMPTY in mark_objexts_empty for",
                            "      slabobj_ext",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40268",
                            "    - cifs: client: fix memory leak in smb3_fs_context_parse_param",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40269",
                            "    - ALSA: usb-audio: Fix potential overflow of PCM transfer buffer",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68205",
                            "    - ALSA: hda/hdmi: Fix breakage at probing nvhdmi-mcp driver",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40270",
                            "    - mm, swap: fix potential UAF issue for VMA readahead",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40271",
                            "    - fs/proc: fix uaf in proc_readdir_de()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40272",
                            "    - mm/secretmem: fix use-after-free race in fault handler",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68245",
                            "    - net: netpoll: fix incorrect refcount handling causing incorrect cleanup",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68240",
                            "    - nilfs2: avoid having an active sc_timer before freeing sci",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68241",
                            "    - ipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68211",
                            "    - ksm: use range-walk function to jump over holes in",
                            "      scan_get_next_rmap_item",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68246",
                            "    - ksmbd: close accepted socket when per-IP limit rejects connection",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40273",
                            "    - NFSD: free copynotify stateid in nfs4_free_ol_stateid()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40212",
                            "    - nfsd: fix refcount leak in nfsd_set_fh_dentry()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40274",
                            "    - KVM: guest_memfd: Remove bindings on memslot deletion when gmem is dying",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68202",
                            "    - sched_ext: Fix unsafe locking in the scx_dump_state()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68239",
                            "    - binfmt_misc: restore write access before closing files opened by",
                            "      open_exec()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68247",
                            "    - posix-timers: Plug potential memory leak in do_timer_create()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68208",
                            "    - bpf: account for current allocated stack depth in",
                            "      widen_imprecise_scalars()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68200",
                            "    - bpf: Add bpf_prog_run_data_pointers()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40275",
                            "    - ALSA: usb-audio: Fix NULL pointer dereference in",
                            "      snd_usb_mixer_controls_badd",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68242",
                            "    - NFS: Fix LTP test failures when timestamps are delegated",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68243",
                            "    - NFS: Check the TLS certificate fields in nfs_match_client()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40276",
                            "    - drm/panthor: Flush shmem writes before mapping buffers CPU-uncached",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40277",
                            "    - drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68206",
                            "    - netfilter: nft_ct: add seqadj extension for natted connections",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68209",
                            "    - mlx5: Fix default values in create CQ",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40278",
                            "    - net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-",
                            "      infoleak",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40279",
                            "    - net: sched: act_connmark: initialize struct tc_ife to fix kernel leak",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40280",
                            "    - tipc: Fix use-after-free in tipc_mon_reinit_self().",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40281",
                            "    - sctp: prevent possible shift-out-of-bounds in sctp_transport_update_rto",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40282",
                            "    - Bluetooth: 6lowpan: reset link-local header on ipv6 recv path",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40283",
                            "    - Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40284",
                            "    - Bluetooth: MGMT: cancel mesh send timer when hdev removed",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68210",
                            "    - erofs: avoid infinite loop due to incomplete zstd-compressed data",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40285",
                            "    - smb/server: fix possible refcount leak in smb2_sess_setup()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40286",
                            "    - smb/server: fix possible memory leak in smb2_read()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40287",
                            "    - exfat: fix improper check of dentry.stream.valid_size",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40288",
                            "    - drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40289",
                            "    - drm/amdgpu: hide VRAM sysfs attributes on GPUs without VRAM",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68201",
                            "    - drm/amdgpu: remove two invalid BUG_ON()s",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68207",
                            "    - drm/xe/guc: Synchronize Dead CT worker with unbind",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68244",
                            "    - drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833)",
                            "    - Revert \"Bluetooth: L2CAP: convert timeouts to secs_to_jiffies()\"",
                            "    - sched_ext: Mark scx_bpf_dsq_move_set_[slice|vtime]() with KF_RCU",
                            "    - net: usb: asix_devices: Check return value of usbnet_get_endpoints",
                            "    - fbdev: atyfb: Check if pll_ops->init_pll failed",
                            "    - ACPI: button: Call input_free_device() on failing input device",
                            "      registration",
                            "    - ACPI: fan: Use platform device for devres-related actions",
                            "    - virtio-net: drop the multi-buffer XDP packet in zerocopy",
                            "    - batman-adv: Release references to inactive interfaces",
                            "    - Bluetooth: rfcomm: fix modem control handling",
                            "    - net: phy: dp83867: Disable EEE support as not implemented",
                            "    - fbdev: pvr2fb: Fix leftover reference to ONCHIP_NR_DMA_CHANNELS",
                            "    - fbdev: valkyriefb: Fix reference count leak in valkyriefb_init",
                            "    - mptcp: drop bogus optimization in __mptcp_check_push()",
                            "    - mptcp: restore window probe",
                            "    - ASoC: qdsp6: q6asm: do not sleep while atomic",
                            "    - ASoC: renesas: rz-ssi: Use proper dma_buffer_pos after resume",
                            "    - s390/pci: Restore IRQ unconditionally for the zPCI device",
                            "    - x86/build: Disable SSE4a",
                            "    - wifi: ath10k: Fix memory leak on unsupported WMI command",
                            "    - wifi: ath11k: Add missing platform IDs for quirk table",
                            "    - wifi: ath12k: free skb during idr cleanup callback",
                            "    - wifi: ath11k: avoid bit operation on key flags",
                            "    - drm/msm/a6xx: Fix GMU firmware parser",
                            "    - ALSA: usb-audio: fix control pipe direction",
                            "    - ASoC: cs-amp-lib-test: Fix missing include of kunit/test-bug.h",
                            "    - wifi: mac80211: reset FILS discovery and unsol probe resp intervals",
                            "    - wifi: mac80211: fix key tailroom accounting leak",
                            "    - wifi: nl80211: call kfree without a NULL check",
                            "    - kunit: test_dev_action: Correctly cast 'priv' pointer to long*",
                            "    - scsi: ufs: core: Initialize value of an attribute returned by uic cmd",
                            "    - scsi: core: Fix the unit attention counter implementation",
                            "    - bpf: Do not audit capability check in do_jit()",
                            "    - nvmet-auth: update sc_c in host response",
                            "    - crypto: s390/phmac - Do not modify the req->nbytes value",
                            "    - ASoC: Intel: avs: Unprepare a stream when XRUN occurs",
                            "    - ASoC: fsl_sai: fix bit order for DSD format",
                            "    - ASoC: fsl_micfil: correct the endian format for DSD",
                            "    - libbpf: Fix powerpc's stack register definition in bpf_tracing.h",
                            "    - ASoC: mediatek: Fix double pm_runtime_disable in remove functions",
                            "    - Bluetooth: ISO: Fix BIS connection dst_type handling",
                            "    - Bluetooth: btmtksdio: Add pmctrl handling for BT closed state during",
                            "      reset",
                            "    - Bluetooth: HCI: Fix tracking of advertisement set/instance 0x00",
                            "    - Bluetooth: ISO: Fix another instance of dst_type handling",
                            "    - Bluetooth: btintel_pcie: Fix event packet loss issue",
                            "    - Bluetooth: hci_conn: Fix connection cleanup with BIG with 2 or more BIS",
                            "    - Bluetooth: hci_core: Fix tracking of periodic advertisement",
                            "    - bpf: Conditionally include dynptr copy kfuncs",
                            "    - drm/msm: Ensure vm is created in VM_BIND ioctl",
                            "    - ALSA: usb-audio: add mono main switch to Presonus S1824c",
                            "    - ALSA: usb-audio: don't log messages meant for 1810c when initializing",
                            "      1824c",
                            "    - ACPI: MRRM: Check revision of MRRM table",
                            "    - drm/etnaviv: fix flush sequence logic",
                            "    - tools: ynl: fix string attribute length to include null terminator",
                            "    - net: hns3: return error code when function fails",
                            "    - sfc: fix potential memory leak in efx_mae_process_mport()",
                            "    - tools: ynl: avoid print_field when there is no reply",
                            "    - dpll: spec: add missing module-name and clock-id to pin-get reply",
                            "    - ASoC: fsl_sai: Fix sync error in consumer mode",
                            "    - ASoC: soc_sdw_utils: remove cs42l43 component_name",
                            "    - drm/amd/pm: fix smu table id bound check issue in smu_cmn_update_table()",
                            "    - drm/amd/pm/powerplay/smumgr: Fix PCIeBootLinkLevel value on Fiji",
                            "    - drm/amd/pm/powerplay/smumgr: Fix PCIeBootLinkLevel value on Iceland",
                            "    - drm/amdgpu: fix SPDX headers on amdgpu_cper.c/h",
                            "    - drm/amdgpu: fix SPDX header on amd_cper.h",
                            "    - drm/amdgpu: fix SPDX header on irqsrcs_vcn_5_0.h",
                            "    - ACPI: fan: Use ACPI handle when retrieving _FST",
                            "    - block: fix op_is_zone_mgmt() to handle REQ_OP_ZONE_RESET_ALL",
                            "    - block: make REQ_OP_ZONE_OPEN a write operation",
                            "    - dma-fence: Fix safe access wrapper to call timeline name method",
                            "    - kbuild: align modinfo section for Secureboot Authenticode EDK2 compat",
                            "    - regmap: irq: Correct documentation of wake_invert flag",
                            "    - [Config] Disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP for s390x",
                            "    - s390/mm: Fix memory leak in add_marker() when kvrealloc() fails",
                            "    - drm/xe: Do not wake device during a GT reset",
                            "    - drm/sched: avoid killing parent entity on child SIGKILL",
                            "    - drm/sched: Fix race in drm_sched_entity_select_rq()",
                            "    - drm/nouveau: Fix race in nouveau_sched_fini()",
                            "    - drm/i915/dmc: Clear HRR EVT_CTL/HTP to zero on ADL-S",
                            "    - drm/ast: Clear preserved bits from register output value",
                            "    - drm/amd: Check that VPE has reached DPM0 in idle handler",
                            "    - drm/amd/display: Fix incorrect return of vblank enable on unconfigured",
                            "      crtc",
                            "    - drm/amd/display: Don't program BLNDGAM_MEM_PWR_FORCE when CM low-power",
                            "      is disabled on DCN30",
                            "    - drm/amd/display: Add HDR workaround for a specific eDP",
                            "    - mptcp: leverage skb deferral free",
                            "    - mptcp: fix MSG_PEEK stream corruption",
                            "    - cpuidle: governors: menu: Rearrange main loop in menu_select()",
                            "    - cpuidle: governors: menu: Select polling state in some more cases",
                            "    - PM: hibernate: Combine return paths in power_down()",
                            "    - PM: sleep: Allow pm_restrict_gfp_mask() stacking",
                            "    - mfd: kempld: Switch back to earlier ->init() behavior",
                            "    - soc: aspeed: socinfo: Add AST27xx silicon IDs",
                            "    - firmware: qcom: scm: preserve assign_mem() error return value",
                            "    - soc: qcom: smem: Fix endian-unaware access of num_entries",
                            "    - spi: loopback-test: Don't use %pK through printk",
                            "    - spi: spi-qpic-snand: handle 'use_ecc' parameter of",
                            "      qcom_spi_config_cw_read()",
                            "    - soc: ti: pruss: don't use %pK through printk",
                            "    - bpf: Don't use %pK through printk",
                            "    - mmc: sdhci: Disable SD card clock before changing parameters",
                            "    - pinctrl: single: fix bias pull up/down handling in pin_config_set",
                            "    - mmc: host: renesas_sdhi: Fix the actual clock",
                            "    - memstick: Add timeout to prevent indefinite waiting",
                            "    - cpufreq: ti: Add support for AM62D2",
                            "    - bpf: Use tnums for JEQ/JNE is_branch_taken logic",
                            "    - firmware: ti_sci: Enable abort handling of entry to LPM",
                            "    - firewire: ohci: move self_id_complete tracepoint after validating",
                            "      register",
                            "    - irqchip/sifive-plic: Respect mask state when setting affinity",
                            "    - irqchip/loongson-eiointc: Route interrupt parsed from bios table",
                            "    - ACPI: sysfs: Use ACPI_FREE() for freeing an ACPI object",
                            "    - ACPI: video: force native for Lenovo 82K8",
                            "    - libbpf: Fix USDT SIB argument handling causing unrecognized register",
                            "      error",
                            "    - selftests/bpf: Fix bpf_prog_detach2 usage in test_lirc_mode2",
                            "    - arm64: versal-net: Update rtc calibration value",
                            "    - Revert \"UBUNTU: SAUCE: firmware: qcom: scm: Allow QSEECOM on Dell",
                            "      Inspiron 7441 / Latitude 7455\"",
                            "    - firmware: qcom: scm: Allow QSEECOM on Dell Inspiron 7441 / Latitude 7455",
                            "    - kselftest/arm64: tpidr2: Switch to waitpid() over wait4()",
                            "    - arc: Fix __fls() const-foldability via __builtin_clzl()",
                            "    - selftests/bpf: Upon failures, exit with code 1 in test_xsk.sh",
                            "    - irqchip/gic-v2m: Handle Multiple MSI base IRQ Alignment",
                            "    - ACPI: PRM: Skip handlers with NULL handler_address or NULL VA",
                            "    - ACPI: resource: Skip IRQ override on ASUS Vivobook Pro N6506CU",
                            "    - ACPI: scan: Add Intel CVS ACPI HIDs to acpi_ignore_dep_ids[]",
                            "    - thermal: gov_step_wise: Allow cooling level to be reduced earlier",
                            "    - thermal: intel: selftests: workload_hint: Mask unsupported types",
                            "    - power: supply: qcom_battmgr: add OOI chemistry",
                            "    - hwmon: (k10temp) Add thermal support for AMD Family 1Ah-based models",
                            "    - hwmon: (k10temp) Add device ID for Strix Halo",
                            "    - hwmon: (lenovo-ec-sensors) Update P8 supprt",
                            "    - hwmon: (sbtsi_temp) AMD CPU extended temperature range support",
                            "    - pinctrl: renesas: rzg2l: Add suspend/resume support for Schmitt control",
                            "      registers",
                            "    - pinctrl: keembay: release allocated memory in detach path",
                            "    - power: supply: sbs-charger: Support multiple devices",
                            "    - io_uring/rsrc: respect submitter_task in io_register_clone_buffers()",
                            "    - hwmon: sy7636a: add alias",
                            "    - selftests/bpf: Fix incorrect array size calculation",
                            "    - block: check for valid bio while splitting",
                            "    - irqchip/loongson-pch-lpc: Use legacy domain for PCH-LPC IRQ controller",
                            "    - cpufreq: ondemand: Update the efficient idle check for Intel extended",
                            "      Families",
                            "    - arm64: zynqmp: Disable coresight by default",
                            "    - arm64: zynqmp: Revert usb node drive strength and slew rate for zcu106",
                            "    - soc/tegra: fuse: Add Tegra114 nvmem cells and fuse lookups",
                            "    - ARM: tegra: p880: set correct touchscreen clipping",
                            "    - ARM: tegra: transformer-20: add missing magnetometer interrupt",
                            "    - ARM: tegra: transformer-20: fix audio-codec interrupt",
                            "    - firmware: qcom: tzmem: disable sc7180 platform",
                            "    - soc: ti: k3-socinfo: Add information for AM62L SR1.1",
                            "    - mmc: sdhci-msm: Enable tuning for SDR50 mode for SD card",
                            "    - pwm: pca9685: Use bulk write to atomicially update registers",
                            "    - ACPICA: dispatcher: Use acpi_ds_clear_operands() in",
                            "      acpi_ds_call_control_method()",
                            "    - tee: allow a driver to allocate a tee_device without a pool",
                            "    - kunit: Enable PCI on UML without triggering WARN()",
                            "    - selftests/bpf: Fix arena_spin_lock selftest failure",
                            "    - bpf: Do not limit bpf_cgroup_from_id to current's namespace",
                            "    - i3c: mipi-i3c-hci-pci: Add support for Intel Wildcat Lake-U I3C",
                            "    - rust: kunit: allow `cfg` on `test`s",
                            "    - video: backlight: lp855x_bl: Set correct EPROM start for LP8556",
                            "    - i3c: dw: Add shutdown support to dw_i3c_master driver",
                            "    - io_uring/zcrx: check all niovs filled with dma addresses",
                            "    - tools/cpupower: fix error return value in cpupower_write_sysfs()",
                            "    - io_uring/zcrx: account niov arrays to cgroup",
                            "    - pmdomain: apple: Add \"apple,t8103-pmgr-pwrstate\"",
                            "    - power: supply: qcom_battmgr: handle charging state change notifications",
                            "    - bpftool: Fix -Wuninitialized-const-pointer warnings with clang >= 21",
                            "    - cpuidle: Fail cpuidle device registration if there is one already",
                            "    - selftests/bpf: Fix selftest verifier_arena_large failure",
                            "    - selftests: ublk: fix behavior when fio is not installed",
                            "    - spi: rpc-if: Add resume support for RZ/G3E",
                            "    - ACPI: SPCR: Support Precise Baud Rate field",
                            "    - clocksource/drivers/vf-pit: Replace raw_readl/writel to readl/writel",
                            "    - clocksource/drivers/timer-rtl-otto: Work around dying timers",
                            "    - clocksource/drivers/timer-rtl-otto: Do not interfere with interrupts",
                            "    - riscv: bpf: Fix uninitialized symbol 'retval_off'",
                            "    - bpf: Clear pfmemalloc flag when freeing all fragments",
                            "    - selftests: drv-net: Pull data before parsing headers",
                            "    - nvme: Use non zero KATO for persistent discovery connections",
                            "    - uprobe: Do not emulate/sstep original instruction when ip is changed",
                            "    - hwmon: (asus-ec-sensors) increase timeout for locking ACPI mutex",
                            "    - hwmon: (dell-smm) Remove Dell Precision 490 custom config data",
                            "    - hwmon: (dell-smm) Add support for Dell OptiPlex 7040",
                            "    - tools/cpupower: Fix incorrect size in cpuidle_state_disable()",
                            "    - selftests/bpf: Fix flaky bpf_cookie selftest",
                            "    - tools/power turbostat: Fix incorrect sorting of PMT telemetry",
                            "    - tools/power x86_energy_perf_policy: Fix incorrect fopen mode usage",
                            "    - tools/power x86_energy_perf_policy: Enhance HWP enable",
                            "    - tools/power x86_energy_perf_policy: Prefer driver HWP limits",
                            "    - mfd: simple-mfd-i2c: Add compatible strings for Layerscape QIXIS FPGA",
                            "    - mfd: stmpe: Remove IRQ domain upon removal",
                            "    - mfd: stmpe-i2c: Add missing MODULE_LICENSE",
                            "    - mfd: qnap-mcu: Handle errors returned from qnap_mcu_write",
                            "    - mfd: qnap-mcu: Include linux/types.h in qnap-mcu.h shared header",
                            "    - mfd: madera: Work around false-positive -Wininitialized warning",
                            "    - mfd: da9063: Split chip variant reading in two bus transactions",
                            "    - mfd: macsmc: Add \"apple,t8103-smc\" compatible",
                            "    - mfd: core: Increment of_node's refcount before linking it to the",
                            "      platform device",
                            "    - mfd: cs42l43: Move IRQ enable/disable to encompass force suspend",
                            "    - mfd: intel-lpss: Add Intel Wildcat Lake LPSS PCI IDs",
                            "    - drm/xe/ptl: Apply Wa_16026007364",
                            "    - drm/xe/configfs: Enforce canonical device names",
                            "    - drm/amd/display: Update tiled to tiled copy command",
                            "    - drm/amd/display: fix condition for setting timing_adjust_pending",
                            "    - drm/amd/display: ensure committing streams is seamless",
                            "    - drm/amdgpu: add range check for RAS bad page address",
                            "    - drm/amdgpu: Check vcn sram load return value",
                            "    - drm/amd/display: Remove check DPIA HPD status for BW Allocation",
                            "    - drm/amd/display: Increase AUX Intra-Hop Done Max Wait Duration",
                            "    - drm/amd/display: Fix dmub_cmd header alignment",
                            "    - drm/xe/guc: Add more GuC load error status codes",
                            "    - drm/xe/pf: Don't resume device from restart worker",
                            "    - drm/amdgpu: Fix build error when CONFIG_SUSPEND is disabled",
                            "    - drm/amdgpu: Update IPID value for bad page threshold CPER",
                            "    - drm/amdgpu: Avoid rma causes GPU duplicate reset",
                            "    - drm/amdgpu: Effective health check before reset",
                            "    - drm/amd/amdgpu: Release xcp drm memory after unplug",
                            "    - drm/amdgpu: Fix vcn v5.0.1 poison irq call trace",
                            "    - drm/xe: Extend wa_13012615864 to additional Xe2 and Xe3 platforms",
                            "    - drm/amdgpu: Skip poison aca bank from UE channel",
                            "    - drm/amd/display: add more cyan skillfish devices",
                            "    - drm/amdgpu: Initialize jpeg v5_0_1 ras function",
                            "    - drm/amdgpu: skip mgpu fan boost for multi-vf",
                            "    - drm/amd/display: fix dmub access race condition",
                            "    - drm/amd/display: update dpp/disp clock from smu clock table",
                            "    - drm/amd/pm: Use cached metrics data on aldebaran",
                            "    - drm/amd/pm: Use cached metrics data on arcturus",
                            "    - accel/amdxdna: Unify pm and rpm suspend and resume callbacks",
                            "    - drm/amdgpu/jpeg: Hold pg_lock before jpeg poweroff",
                            "    - drm/xe/pf: Program LMTT directory pointer on all GTs within a tile",
                            "    - drm/nouveau: replace snprintf() with scnprintf() in nvkm_snprintbf()",
                            "    - ASoC: tas2781: Add keyword \"init\" in profile section",
                            "    - ASoC: mediatek: Use SND_JACK_AVOUT for HDMI/DP jacks",
                            "    - drm/amd/display: Reset apply_eamless_boot_optimization when dpms_off",
                            "    - drm/amdgpu: add to custom amdgpu_drm_release drm_dev_enter/exit",
                            "    - drm/amd/display: Wait until OTG enable state is cleared",
                            "    - drm/xe: rework PDE PAT index selection",
                            "    - docs: kernel-doc: avoid script crash on ancient Python",
                            "    - drm/sharp-memory: Do not access GEM-DMA vaddr directly",
                            "    - PCI: Disable MSI on RDC PCI to PCIe bridges",
                            "    - drm/nouveau: always set RMDevidCheckIgnore for GSP-RM",
                            "    - drm/panel-edp: Add SHP LQ134Z1 panel for Dell XPS 9345",
                            "    - selftests/net: Replace non-standard __WORDSIZE with sizeof(long) * 8",
                            "    - selftests/net: Ensure assert() triggers in psock_tpacket.c",
                            "    - wifi: rtw89: print just once for unknown C2H events",
                            "    - wifi: rtw88: sdio: use indirect IO for device registers before power-on",
                            "    - wifi: rtw89: add dummy C2H handlers for BCN resend and update done",
                            "    - drm/amdkfd: return -ENOTTY for unsupported IOCTLs",
                            "    - selftests: drv-net: devmem: add / correct the IPv6 support",
                            "    - selftests: drv-net: devmem: flip the direction of Tx tests",
                            "    - media: pci: ivtv: Don't create fake v4l2_fh",
                            "    - media: amphion: Delete v4l2_fh synchronously in .release()",
                            "    - drm/tidss: Use the crtc_* timings when programming the HW",
                            "    - drm/bridge: cdns-dsi: Fix REG_WAKEUP_TIME value",
                            "    - drm/bridge: cdns-dsi: Don't fail on MIPI_DSI_MODE_VIDEO_BURST",
                            "    - drm/tidss: Set crtc modesetting parameters with adjusted mode",
                            "    - drm/tidss: Remove early fb",
                            "    - RDMA/mana_ib: Drain send wrs of GSI QP",
                            "    - media: i2c: Kconfig: Ensure a dependency on HAVE_CLK for",
                            "      VIDEO_CAMERA_SENSOR",
                            "    - PCI/ERR: Update device error_state already after reset",
                            "    - x86/vsyscall: Do not require X86_PF_INSTR to emulate vsyscall",
                            "    - net: stmmac: Check stmmac_hw_setup() in stmmac_resume()",
                            "    - ice: Don't use %pK through printk or tracepoints",
                            "    - thunderbolt: Use is_pciehp instead of is_hotplug_bridge",
                            "    - ASoC: es8323: enable DAPM power widgets for playback DAC and output",
                            "    - powerpc/eeh: Use result of error_detected() in uevent",
                            "    - s390/pci: Use pci_uevent_ers() in PCI recovery",
                            "    - bridge: Redirect to backup port when port is administratively down",
                            "    - selftests: drv-net: wait for carrier",
                            "    - net: phy: mscc: report and configure in-band auto-negotiation for",
                            "      SGMII/QSGMII",
                            "    - scsi: ufs: host: mediatek: Fix auto-hibern8 timer configuration",
                            "    - scsi: ufs: host: mediatek: Fix PWM mode switch issue",
                            "    - scsi: ufs: host: mediatek: Assign power mode userdata before FASTAUTO",
                            "      mode change",
                            "    - scsi: ufs: host: mediatek: Change reset sequence for improved stability",
                            "    - scsi: ufs: host: mediatek: Fix invalid access in vccqx handling",
                            "    - gpu: nova-core: register: allow fields named `offset`",
                            "    - drm/panthor: Serialize GPU cache flush operations",
                            "    - HID: pidff: Use direction fix only for conditional effects",
                            "    - HID: pidff: PERMISSIVE_CONTROL quirk autodetection",
                            "    - drm/bridge: display-connector: don't set OP_DETECT for DisplayPorts",
                            "    - drm/amdkfd: Handle lack of READ permissions in SVM mapping",
                            "    - drm/amdgpu: refactor bad_page_work for corner case handling",
                            "    - hwrng: timeriomem - Use us_to_ktime() where appropriate",
                            "    - iio: adc: spear_adc: mask SPEAR_ADC_STATUS channel and avg sample before",
                            "      setting register",
                            "    - iio: adc: imx93_adc: load calibrated values even calibration failed",
                            "    - usb: gadget: f_ncm: Fix MAC assignment NCM ethernet",
                            "    - ASoC: es8323: remove DAC enablement write from es8323_probe",
                            "    - ASoC: es8323: add proper left/right mixer controls via DAPM",
                            "    - ASoC: codecs: wsa883x: Handle shared reset GPIO for WSA883x speakers",
                            "    - drm/xe: Make page size consistent in loop",
                            "    - wifi: rtw89: wow: remove notify during WoWLAN net-detect",
                            "    - wifi: rtw89: fix BSSID comparison for non-transmitted BSSID",
                            "    - wifi: rtw89: 8851b: rfk: update IQK TIA setting",
                            "    - dm error: mark as DM_TARGET_PASSES_INTEGRITY",
                            "    - char: misc: Make misc_register() reentry for miscdevice who wants",
                            "      dynamic minor",
                            "    - char: misc: Does not request module for miscdevice with dynamic minor",
                            "    - net: When removing nexthops, don't call synchronize_net if it is not",
                            "      necessary",
                            "    - net: Call trace_sock_exceed_buf_limit() for memcg failure with",
                            "      SK_MEM_RECV.",
                            "    - dmaengine: idxd: Add a new IAA device ID for Wildcat Lake family",
                            "      platforms",
                            "    - PCI/P2PDMA: Fix incorrect pointer usage in devm_kfree() call",
                            "    - bnxt_en: Add Hyper-V VF ID",
                            "    - tty: serial: Modify the use of dev_err_probe()",
                            "    - ALSA: usb-audio: Add validation of UAC2/UAC3 effect units",
                            "    - Octeontx2-af: Broadcast XON on all channels",
                            "    - idpf: do not linearize big TSO packets",
                            "    - drm/xe/pcode: Initialize data0 for pcode read routine",
                            "    - drm/panel: ilitek-ili9881c: turn off power-supply when init fails",
                            "    - drm/panel: ilitek-ili9881c: move display_on/_off dcs calls to",
                            "      (un-)prepare",
                            "    - rds: Fix endianness annotation for RDS_MPATH_HASH",
                            "    - net: wangxun: limit tx_max_coalesced_frames_irq",
                            "    - iio: imu: bmi270: Match PNP ID found on newer GPD firmware",
                            "    - media: ipu6: isys: Set embedded data type correctly for metadata formats",
                            "    - rpmsg: char: Export alias for RPMSG ID rpmsg-raw from table",
                            "    - net: ipv4: allow directed broadcast routes to use dst hint",
                            "    - scsi: mpi3mr: Fix device loss during enclosure reboot due to zero link",
                            "      speed",
                            "    - wifi: rtw89: coex: Limit Wi-Fi scan slot cost to avoid A2DP glitch",
                            "    - scsi: mpi3mr: Fix I/O failures during controller reset",
                            "    - scsi: mpi3mr: Fix controller init failure on fault during queue creation",
                            "    - scsi: pm80xx: Fix race condition caused by static variables",
                            "    - extcon: adc-jack: Fix wakeup source leaks on device unbind",
                            "    - extcon: fsa9480: Fix wakeup source leaks on device unbind",
                            "    - extcon: axp288: Fix wakeup source leaks on device unbind",
                            "    - drm/xe: Set GT as wedged before sending wedged uevent",
                            "    - remoteproc: wkup_m3: Use devm_pm_runtime_enable() helper",
                            "    - drm/xe/wcl: Extend L3bank mask workaround",
                            "    - net: phy: fixed_phy: let fixed_phy_unregister free the phy_device",
                            "    - selftests: drv-net: hds: restore hds settings",
                            "    - fuse: zero initialize inode private data",
                            "    - virtio_fs: fix the hash table using in virtio_fs_enqueue_req()",
                            "    - selftests: pci_endpoint: Skip IRQ test if IRQ is out of range.",
                            "    - drm/xe: Ensure GT is in C0 during resumes",
                            "    - misc: pci_endpoint_test: Skip IRQ tests if irq is out of range",
                            "    - drm/amdgpu: Correct the loss of aca bank reg info",
                            "    - drm/amdgpu: Correct the counts of nr_banks and nr_errors",
                            "    - drm/amdkfd: fix vram allocation failure for a special case",
                            "    - drm/amd/display: Support HW cursor 180 rot for any number of pipe splits",
                            "    - drm/amdkfd: Tie UNMAP_LATENCY to queue_preemption",
                            "    - drm/amd/display: wait for otg update pending latch before clock",
                            "      optimization",
                            "    - drm/amd/display: Consider sink max slice width limitation for dsc",
                            "    - drm/amdgpu/vpe: cancel delayed work in hw_fini",
                            "    - drm/xe: Cancel pending TLB inval workers on teardown",
                            "    - net: Prevent RPS table overwrite of active flows",
                            "    - eth: fbnic: Reset hw stats upon PCI error",
                            "    - wifi: iwlwifi: mld: trigger mlo scan only when not in EMLSR",
                            "    - platform/x86/intel-uncore-freq: Fix warning in partitioned system",
                            "    - drm/msm/dpu: Filter modes based on adjusted mode clock",
                            "    - drm/msm: Use of_reserved_mem_region_to_resource() for \"memory-region\"",
                            "    - selftests: drv-net: rss_ctx: fix the queue count check",
                            "    - media: fix uninitialized symbol warnings",
                            "    - media: pci: mgb4: Fix timings comparison in VIDIOC_S_DV_TIMINGS",
                            "    - ASoC: SOF: ipc4-pcm: Add fixup for channels",
                            "    - drm/amdgpu: Notify pmfw bad page threshold exceeded",
                            "    - drm/amd/display: Increase minimum clock for TMDS 420 with pipe splitting",
                            "    - drm/amdgpu: Avoid jpeg v5.0.1 poison irq call trace on sriov guest",
                            "    - drm/amd/display: incorrect conditions for failing dto calculations",
                            "    - drm/amdgpu: Avoid vcn v5.0.1 poison irq call trace on sriov guest",
                            "    - drm/amdgpu: Respect max pixel clock for HDMI and DVI-D (v2)",
                            "    - mips: lantiq: danube: add missing properties to cpu node",
                            "    - mips: lantiq: danube: add model to EASY50712 dts",
                            "    - mips: lantiq: danube: add missing device_type in pci node",
                            "    - mips: lantiq: xway: sysctrl: rename stp clock",
                            "    - mips: lantiq: danube: rename stp node on EASY50712 reference board",
                            "    - inet_diag: annotate data-races in inet_diag_bc_sk()",
                            "    - microchip: lan865x: add ndo_eth_ioctl handler to enable PHY ioctl",
                            "      support",
                            "    - crypto: qat - use kcalloc() in qat_uclo_map_objs_from_mof()",
                            "    - scsi: pm8001: Use int instead of u32 to store error codes",
                            "    - iio: adc: ad7124: do not require mclk",
                            "    - scsi: ufs: exynos: fsd: Gate ref_clk and put UFS device in reset on",
                            "      suspend",
                            "    - media: imx-mipi-csis: Only set clock rate when specified in DT",
                            "    - wifi: iwlwifi: pcie: remember when interrupts are disabled",
                            "    - drm/st7571-i2c: add support for inverted pixel format",
                            "    - ptp: Limit time setting of PTP clocks",
                            "    - dmaengine: sh: setup_xref error handling",
                            "    - dmaengine: mv_xor: match alloc_wc and free_wc",
                            "    - dmaengine: dw-edma: Set status for callback_result",
                            "    - netfilter: nf_tables: all transaction allocations can now sleep",
                            "    - drm/msm/dsi/phy: Toggle back buffer resync after preparing PLL",
                            "    - drm/msm/dsi/phy_7nm: Fix missing initial VCO rate",
                            "    - drm/amdgpu: Allow kfd CRIU with no buffer objects",
                            "    - drm/xe/guc: Increase GuC crash dump buffer size",
                            "    - drm/amd/pm: Increase SMC timeout on SI and warn (v3)",
                            "    - move_mount(2): take sanity checks in 'beneath' case into do_lock_mount()",
                            "    - selftests: drv-net: rss_ctx: make the test pass with few queues",
                            "    - ipv6: Add sanity checks on ipv6_devconf.rpl_seg_enabled",
                            "    - drm/xe: Extend Wa_22021007897 to Xe3 platforms",
                            "    - wifi: mac80211: count reg connection element in the size",
                            "    - drm/panthor: check bo offset alignment in vm bind",
                            "    - drm: panel-backlight-quirks: Make EDID match optional",
                            "    - ixgbe: reduce number of reads when getting OROM data",
                            "    - netlink: specs: fou: change local-v6/peer-v6 check",
                            "    - net: nfc: nci: Increase NCI_DATA_TIMEOUT to 3000 ms",
                            "    - media: adv7180: Add missing lock in suspend callback",
                            "    - media: adv7180: Do not write format to device in set_fmt",
                            "    - media: adv7180: Only validate format in querystd",
                            "    - media: verisilicon: Explicitly disable selection api ioctls for decoders",
                            "    - wifi: mac80211: Fix 6 GHz Band capabilities element advertisement in",
                            "      lower bands",
                            "    - platform/x86: think-lmi: Add extra TC BIOS error messages",
                            "    - platform/x86/intel-uncore-freq: Present unique domain ID per package",
                            "    - ALSA: usb-audio: apply quirk for MOONDROP Quark2",
                            "    - PCI: imx6: Enable the Vaux supply if available",
                            "    - drm/xe/guc: Set upper limit of H2G retries over CTB",
                            "    - net: call cond_resched() less often in __release_sock()",
                            "    - smsc911x: add second read of EEPROM mac when possible corruption seen",
                            "    - drm/xe: improve dma-resv handling for backup object",
                            "    - iommu/amd: Add support to remap/unmap IOMMU buffers for kdump",
                            "    - iommu/amd: Skip enabling command/event buffers for kdump",
                            "    - iommu/amd: Reuse device table for kdump",
                            "    - crypto: ccp: Skip SEV and SNP INIT for kdump boot",
                            "    - iommu/apple-dart: Clear stream error indicator bits for T8110 DARTs",
                            "    - bus: mhi: host: pci_generic: Add support for all Foxconn T99W696 SKU",
                            "      variants",
                            "    - drm/amdgpu: Correct info field of bad page threshold exceed CPER",
                            "    - drm/amd: add more cyan skillfish PCI ids",
                            "    - drm/amdgpu: don't enable SMU on cyan skillfish",
                            "    - drm/amdgpu: add support for cyan skillfish gpu_info",
                            "    - drm/amd/display: Fix pbn_div Calculation Error",
                            "    - drm/amd/display: dont wait for pipe update during medupdate/highirq",
                            "    - drm/amd/pm: refine amdgpu pm sysfs node error code",
                            "    - drm/amd/display: Indicate when custom brightness curves are in use",
                            "    - selftests: ncdevmem: don't retry EFAULT",
                            "    - net: dsa: felix: support phy-mode = \"10g-qxgmii\"",
                            "    - usb: gadget: f_hid: Fix zero length packet transfer",
                            "    - serial: qcom-geni: Add DFS clock mode support to GENI UART driver",
                            "    - serdev: Drop dev_pm_domain_detach() call",
                            "    - tty/vt: Add missing return value for VT_RESIZE in vt_ioctl()",
                            "    - eeprom: at25: support Cypress FRAMs without device ID",
                            "    - drm/msm/adreno: Add speedbins for A663 GPU",
                            "    - drm/msm: Fix 32b size truncation",
                            "    - dt-bindings: display/msm/gmu: Update Adreno 623 bindings",
                            "    - drm/msm: make sure to not queue up recovery more than once",
                            "    - char: Use list_del_init() in misc_deregister() to reinitialize list",
                            "      pointer",
                            "    - drm/msm/adreno: Add speedbin data for A623 GPU",
                            "    - drm/msm/adreno: Add fenced regwrite support",
                            "    - drm/msm/a6xx: Switch to GMU AO counter",
                            "    - idpf: link NAPIs to queues",
                            "    - selftests: net: make the dump test less sensitive to mem accounting",
                            "    - PCI: endpoint: pci-epf-test: Limit PCIe BAR size for fixed BARs",
                            "    - wifi: rtw89: Add USB ID 2001:332a for D-Link AX9U rev. A1",
                            "    - wifi: rtw89: Add USB ID 2001:3327 for D-Link AX18U rev. A1",
                            "    - wifi: iwlwifi: fw: Add ASUS to PPAG and TAS list",
                            "    - drm/xe/i2c: Enable bus mastering",
                            "    - media: ov08x40: Fix the horizontal flip control",
                            "    - media: i2c: og01a1b: Specify monochrome media bus format instead of",
                            "      Bayer",
                            "    - media: qcom: camss: csiphy-3ph: Add CSIPHY 2ph DPHY v2.0.1 init sequence",
                            "    - drm/bridge: write full Audio InfoFrame",
                            "    - drm/xe/guc: Always add CT disable action during second init step",
                            "    - f2fs: fix wrong layout information on 16KB page",
                            "    - selftests: mptcp: join: allow more time to send ADD_ADDR",
                            "    - scsi: ufs: host: mediatek: Enhance recovery on resume failure",
                            "    - scsi: ufs: ufs-qcom: Align programming sequence of Shared ICE for UFS",
                            "      controller v5",
                            "    - scsi: ufs: host: mediatek: Fix unbalanced IRQ enable issue",
                            "    - scsi: ufs: host: mediatek: Enhance recovery on hibernation exit failure",
                            "    - net: phy: marvell: Fix 88e1510 downshift counter errata",
                            "    - scsi: ufs: host: mediatek: Correct system PM flow",
                            "    - scsi: ufs: host: mediatek: Disable auto-hibern8 during power mode",
                            "      changes",
                            "    - scsi: ufs: host: mediatek: Fix adapt issue after PA_Init",
                            "    - wifi: cfg80211: update the time stamps in hidden ssid",
                            "    - wifi: mac80211: Fix HE capabilities element check",
                            "    - fbcon: Use screen info to find primary device",
                            "    - phy: cadence: cdns-dphy: Enable lower resolutions in dphy",
                            "    - Fix access to video_is_primary_device() when compiled without",
                            "      CONFIG_VIDEO",
                            "    - phy: renesas: r8a779f0-ether-serdes: add new step added to latest",
                            "      datasheet",
                            "    - phy: rockchip: phy-rockchip-inno-csidphy: allow writes to grf register 0",
                            "    - drm/msm/registers: Generate _HI/LO builders for reg64",
                            "    - net: sh_eth: Disable WoL if system can not suspend",
                            "    - selftests: net: replace sleeps in fcnal-test with waits",
                            "    - media: redrat3: use int type to store negative error codes",
                            "    - platform/x86/amd/pmf: Fix the custom bios input handling mechanism",
                            "    - selftests: traceroute: Use require_command()",
                            "    - selftests: traceroute: Return correct value on failure",
                            "    - openrisc: Add R_OR1K_32_PCREL relocation type module support",
                            "    - netfilter: nf_reject: don't reply to icmp error messages",
                            "    - x86/kvm: Prefer native qspinlock for dedicated vCPUs irrespective of",
                            "      PV_UNHALT",
                            "    - x86/virt/tdx: Use precalculated TDVPR page physical address",
                            "    - selftests: Disable dad for ipv6 in fcnal-test.sh",
                            "    - eth: 8139too: Make 8139TOO_PIO depend on !NO_IOPORT_MAP",
                            "    - [Config] No longer enable `CONFIG_8139TOO_PIO` for armhf",
                            "    - selftests: Replace sleep with slowwait",
                            "    - net: devmem: expose tcp_recvmsg_locked errors",
                            "    - selftests: net: lib.sh: Don't defer failed commands",
                            "    - HID: asus: add Z13 folio to generic group for multitouch to work",
                            "    - watchdog: s3c2410_wdt: Fix max_timeout being calculated larger",
                            "    - crypto: sun8i-ce - remove channel timeout field",
                            "    - PCI: dwc: Verify the single eDMA IRQ in dw_pcie_edma_irq_verify()",
                            "    - crypto: ccp - Fix incorrect payload size calculation in",
                            "      psp_poulate_hsti()",
                            "    - crypto: caam - double the entropy delay interval for retry",
                            "    - can: rcar_canfd: Update bit rate constants for RZ/G3E and R-Car Gen4",
                            "    - net: mana: Reduce waiting time if HWC not responding",
                            "    - ionic: use int type for err in ionic_get_module_eeprom_by_page",
                            "    - net/cls_cgroup: Fix task_get_classid() during qdisc run",
                            "    - wifi: mt76: mt7921: Add 160MHz beamformee capability for mt7922 device",
                            "    - wifi: mt76: mt7925: add pci restore for hibernate",
                            "    - wifi: mt76: mt7996: Fix mt7996_reverse_frag0_hdr_trans for MLO",
                            "    - wifi: mt76: mt7996: Set def_wcid pointer in mt7996_mac_sta_init_link()",
                            "    - wifi: mt76: mt7996: Temporarily disable EPCS",
                            "    - wifi: mt76: mt7996: support writing MAC TXD for AddBA Request",
                            "    - wifi: mt76: mt76_eeprom_override to int",
                            "    - ALSA: serial-generic: remove shared static buffer",
                            "    - wifi: mt76: mt7996: fix memory leak on mt7996_mcu_sta_key_tlv error",
                            "    - wifi: mt76: mt7996: disable promiscuous mode by default",
                            "    - wifi: mt76: use altx queue for offchannel tx on connac+",
                            "    - wifi: mt76: improve phy reset on hw restart",
                            "    - drm/amdgpu: Use memdup_array_user in amdgpu_cs_wait_fences_ioctl",
                            "    - drm/amdgpu: Release hive reference properly",
                            "    - drm/amd/display: Fix DMCUB loading sequence for DCN3.2",
                            "    - drm/amd/display: Set up pixel encoding for YCBCR422",
                            "    - drm/amd/display: fix dml ms order of operations",
                            "    - drm/amd/display: Don't use non-registered VUPDATE on DCE 6",
                            "    - drm/amd/display: Keep PLL0 running on DCE 6.0 and 6.4",
                            "    - drm/amd/display: Fix DVI-D/HDMI adapters",
                            "    - drm/amd/display: Disable VRR on DCE 6",
                            "    - drm/amd/display/dml2: Guard dml21_map_dc_state_into_dml_display_cfg with",
                            "      DC_FP_START",
                            "    - net: phy: clear EEE runtime state in PHY_HALTED/PHY_ERROR",
                            "    - ethernet: Extend device_get_mac_address() to use NVMEM",
                            "    - scsi: ufs: ufs-qcom: Disable lane clocks during phy hibern8",
                            "    - HID: i2c-hid: Resolve touchpad issues on Dell systems during S4",
                            "    - hinic3: Queue pair endianness improvements",
                            "    - hinic3: Fix missing napi->dev in netif_queue_set_napi",
                            "    - tools: ynl-gen: validate nested arrays",
                            "    - drm/xe/guc: Return an error code if the GuC load fails",
                            "    - drm/amdgpu: reject gang submissions under SRIOV",
                            "    - selftests/Makefile: include $(INSTALL_DEP_TARGETS) in clean target to",
                            "      clean net/lib dependency",
                            "    - scsi: ufs: core: Disable timestamp functionality if not supported",
                            "    - scsi: lpfc: Clean up allocated queues when queue setup mbox commands",
                            "      fail",
                            "    - scsi: lpfc: Decrement ndlp kref after FDISC retries exhausted",
                            "    - scsi: lpfc: Check return status of lpfc_reset_flush_io_context during",
                            "      TGT_RESET",
                            "    - scsi: lpfc: Remove ndlp kref decrement clause for F_Port_Ctrl in",
                            "      lpfc_cleanup",
                            "    - scsi: lpfc: Define size of debugfs entry for xri rebalancing",
                            "    - scsi: lpfc: Ensure PLOGI_ACC is sent prior to PRLI in Point to Point",
                            "      topology",
                            "    - allow finish_no_open(file, ERR_PTR(-E...))",
                            "    - usb: mon: Increase BUFF_MAX to 64 MiB to support multi-MB URBs",
                            "    - usb: xhci: plat: Facilitate using autosuspend for xhci plat devices",
                            "    - wifi: rtw89: disable RTW89_PHYSTS_IE09_FTR_0 for ppdu status",
                            "    - wifi: rtw89: obtain RX path from ppdu status IE00",
                            "    - wifi: rtw89: renew a completion for each H2C command waiting C2H event",
                            "    - usb: xhci-pci: add support for hosts with zero USB3 ports",
                            "    - ipv6: np->rxpmtu race annotation",
                            "    - RDMA/irdma: Update Kconfig",
                            "    - IB/ipoib: Ignore L3 master device",
                            "    - bnxt_en: Add fw log trace support for 5731X/5741X chips",
                            "    - mei: make a local copy of client uuid in connect",
                            "    - ASoC: qcom: sc8280xp: explicitly set S16LE format in",
                            "      sc8280xp_be_hw_params_fixup()",
                            "    - net: phy: clear link parameters on admin link down",
                            "    - net: ethernet: microchip: sparx5: make it selectable for ARCH_LAN969X",
                            "    - bus: mhi: core: Improve mhi_sync_power_up handling for SYS_ERR state",
                            "    - iommu/vt-d: Replace snprintf with scnprintf in dmar_latency_snapshot()",
                            "    - wifi: ath10k: Fix connection after GTK rekeying",
                            "    - iommu/vt-d: Remove LPIG from page group response descriptor",
                            "    - wifi: mac80211: Get the correct interface for non-netdev skb status",
                            "    - wifi: mac80211: Track NAN interface start/stop",
                            "    - net: intel: fm10k: Fix parameter idx set but not used",
                            "    - sparc/module: Add R_SPARC_UA64 relocation handling",
                            "    - sparc64: fix prototypes of reads[bwl]()",
                            "    - vfio: return -ENOTTY for unsupported device feature",
                            "    - ptp_ocp: make ptp_ocp driver compatible with PTP_EXTTS_REQUEST2",
                            "    - crypto: hisilicon/qm - invalidate queues in use",
                            "    - crypto: hisilicon/qm - clear all VF configurations in the hardware",
                            "    - ASoC: ops: improve snd_soc_get_volsw",
                            "    - PCI/PM: Skip resuming to D0 if device is disconnected",
                            "    - selftests: forwarding: Reorder (ar)ping arguments to obey POSIX getopt",
                            "    - remoteproc: qcom: q6v5: Avoid handling handover twice",
                            "    - wifi: ath12k: Increase DP_REO_CMD_RING_SIZE to 256",
                            "    - net: dsa: microchip: Set SPI as bus interface during reset for KSZ8463",
                            "    - bng_en: make bnge_alloc_ring() self-unwind on failure",
                            "    - ALSA: usb-audio: don't apply interface quirk to Presonus S1824c",
                            "    - tcp: Update bind bucket state on port release",
                            "    - ovl: make sure that ovl_create_real() returns a hashed dentry",
                            "    - drm/amd/display: Add missing post flip calls",
                            "    - drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream",
                            "    - drm/amd/display: Add fast sync field in ultra sleep more for DMUB",
                            "    - drm/amd/display: Init dispclk from bootup clock for DCN314",
                            "    - drm/amd/display: Fix for test crash due to power gating",
                            "    - drm/amd/display: change dc stream color settings only in atomic commit",
                            "    - NFSv4: handle ERR_GRACE on delegation recalls",
                            "    - NFSv4.1: fix mount hang after CREATE_SESSION failure",
                            "    - net: bridge: Install FDB for bridge MAC on VLAN 0",
                            "    - net: phy: dp83640: improve phydev and driver removal handling",
                            "    - scsi: ufs: core: Change MCQ interrupt enable flow",
                            "    - scsi: libfc: Fix potential buffer overflow in fc_ct_ms_fill()",
                            "    - accel/habanalabs/gaudi2: fix BMON disable configuration",
                            "    - scsi: mpt3sas: Add support for 22.5 Gbps SAS link rate",
                            "    - accel/habanalabs: return ENOMEM if less than requested pages were pinned",
                            "    - accel/habanalabs/gaudi2: read preboot status after recovering from dirty",
                            "      state",
                            "    - ASoC: renesas: msiof: add .symmetric_xxx on snd_soc_dai_driver",
                            "    - ASoC: renesas: msiof: use reset controller",
                            "    - ASoC: renesas: msiof: tidyup DMAC stop timing",
                            "    - ASoC: renesas: msiof: set SIFCTR register",
                            "    - ext4: increase IO priority of fastcommit",
                            "    - drm/amdgpu: Add fallback to pipe reset if KCQ ring reset fails",
                            "    - drm/amdgpu: Fix fence signaling race condition in userqueue",
                            "    - ASoC: stm32: sai: manage context in set_sysclk callback",
                            "    - ASoC: tlv320aic3x: Fix class-D initialization for tlv320aic3007",
                            "    - ACPI: scan: Update honor list for RPMI System MSI",
                            "    - platform/x86: x86-android-tablets: Stop using EPROBE_DEFER",
                            "    - vfio/pci: Fix INTx handling on legacy non-PCI 2.3 devices",
                            "    - vfio/nvgrace-gpu: Add GB300 SKU to the devid table",
                            "    - selftest: net: Fix error message if empty variable",
                            "    - net/mlx5e: Don't query FEC statistics when FEC is disabled",
                            "    - Bluetooth: btintel: Add support for BlazarIW core",
                            "    - net: macb: avoid dealing with endianness in macb_set_hwaddr()",
                            "    - Bluetooth: btusb: Add new VID/PID 13d3/3627 for MT7925",
                            "    - Bluetooth: btintel_pcie: Define hdev->wakeup() callback",
                            "    - Bluetooth: ISO: Don't initiate CIS connections if there are no buffers",
                            "    - Bluetooth: btusb: Check for unexpected bytes when defragmenting HCI",
                            "      frames",
                            "    - Bluetooth: ISO: Use sk_sndtimeo as conn_timeout",
                            "    - Bluetooth: btusb: Add new VID/PID 13d3/3633 for MT7922",
                            "    - net: stmmac: est: Drop frames causing HLBS error",
                            "    - exfat: limit log print for IO error",
                            "    - 6pack: drop redundant locking and refcounting",
                            "    - page_pool: Clamp pool size to max 16K pages",
                            "    - net/mlx5e: Prevent entering switchdev mode with inconsistent netns",
                            "    - ksmbd: use sock_create_kern interface to create kernel socket",
                            "    - smb: client: update cfid->last_access_time in",
                            "      open_cached_dir_by_dentry()",
                            "    - smb: client: transport: avoid reconnects triggered by pending task work",
                            "    - usb: xhci-pci: Fix USB2-only root hub registration",
                            "    - drm/amd/display: Add fallback path for YCBCR422",
                            "    - ACPICA: Update dsmethod.c to get rid of unused variable warning",
                            "    - RDMA/bnxt_re: Fix a potential memory leak in destroy_gsi_sqp",
                            "    - RDMA/irdma: Fix SD index calculation",
                            "    - RDMA/irdma: Remove unused struct irdma_cq fields",
                            "    - RDMA/irdma: Set irdma_cq cq_num field during CQ create",
                            "    - RDMA/uverbs: Fix umem release in UVERBS_METHOD_CQ_CREATE",
                            "    - RDMA/hns: Fix recv CQ and QP cache affinity",
                            "    - RDMA/hns: Fix the modification of max_send_sge",
                            "    - RDMA/hns: Fix wrong WQE data when QP wraps around",
                            "    - btrfs: mark dirty extent range for out of bound prealloc extents",
                            "    - clk: qcom: gcc-ipq6018: rework nss_port5 clock to multiple conf",
                            "    - clk: renesas: rzv2h: Re-assert reset on deassert timeout",
                            "    - clk: samsung: exynos990: Add missing USB clock registers to HSI0",
                            "    - fs/hpfs: Fix error code for new_inode() failure in",
                            "      mkdir/create/mknod/symlink",
                            "    - clocksource: hyper-v: Skip unnecessary checks for the root partition",
                            "    - hyperv: Add missing field to hv_output_map_device_interrupt",
                            "    - um: Fix help message for ssl-non-raw",
                            "    - clk: sunxi-ng: sun6i-rtc: Add A523 specifics",
                            "    - rtc: pcf2127: clear minute/second interrupt",
                            "    - ARM: at91: pm: save and restore ACR during PLL disable/enable",
                            "    - clk: at91: add ACR in all PLL settings",
                            "    - clk: at91: sam9x7: Add peripheral clock id for pmecc",
                            "    - clk: at91: clk-master: Add check for divide by 3",
                            "    - clk: at91: clk-sam9x60-pll: force write to PLL_UPDT register",
                            "    - clk: ti: am33xx: keep WKUP_DEBUGSS_CLKCTRL enabled",
                            "    - clk: scmi: Add duty cycle ops only when duty cycle is supported",
                            "    - clk: clocking-wizard: Fix output clock register offset for Versal",
                            "      platforms",
                            "    - NTB: epf: Allow arbitrary BAR mapping",
                            "    - 9p: fix /sys/fs/9p/caches overwriting itself",
                            "    - cpufreq: tegra186: Initialize all cores to max frequencies",
                            "    - 9p: sysfs_init: don't hardcode error to ENOMEM",
                            "    - scsi: ufs: core: Include UTP error in INT_FATAL_ERRORS",
                            "    - fbdev: core: Fix ubsan warning in pixel_to_pat",
                            "    - ACPI: property: Return present device nodes only on fwnode interface",
                            "    - LoongArch: Handle new atomic instructions for probes",
                            "    - tools bitmap: Add missing asm-generic/bitsperlong.h include",
                            "    - tools: lib: thermal: don't preserve owner in install",
                            "    - tools: lib: thermal: use pkg-config to locate libnl3",
                            "    - ALSA: hda/realtek: Add quirk for ASUS ROG Zephyrus Duo",
                            "    - rtc: zynqmp: Restore alarm functionality after kexec transition",
                            "    - rtc: pcf2127: fix watchdog interrupt mask on pcf2131",
                            "    - net: wwan: t7xx: add support for HP DRMR-H01",
                            "    - kbuild: uapi: Strip comments before size type check",
                            "    - ASoC: meson: aiu-encoder-i2s: fix bit clock polarity",
                            "    - ASoC: rt722: add settings for rt722VB",
                            "    - drm/amdgpu: Report individual reset error",
                            "    - ceph: add checking of wait_for_completion_killable() return value",
                            "    - ceph: fix potential race condition in ceph_ioctl_lazyio()",
                            "    - ceph: refactor wake_up_bit() pattern of calling",
                            "    - x86: uaccess: don't use runtime-const rewriting in modules",
                            "    - rust: condvar: fix broken intra-doc link",
                            "    - rust: devres: fix private intra-doc link",
                            "    - rust: kbuild: workaround `rustdoc` doctests modifier bug",
                            "    - rust: kbuild: treat `build_error` and `rustdoc` as kernel objects",
                            "    - media: uvcvideo: Use heuristic to find stream entity",
                            "    - Revert \"wifi: ath10k: avoid unnecessary wait for service ready message\"",
                            "    - tracing: tprobe-events: Fix to register tracepoint correctly",
                            "    - tracing: tprobe-events: Fix to put tracepoint_user when disable the",
                            "      tprobe",
                            "    - net: libwx: fix device bus LAN ID",
                            "    - scsi: ufs: core: Fix a race condition related to the \"hid\" attribute",
                            "      group",
                            "    - riscv: ptdump: use seq_puts() in pt_dump_seq_puts() macro",
                            "    - Revert \"wifi: ath12k: Fix missing station power save configuration\"",
                            "    - scsi: ufs: core: Revert \"Make HID attributes visible\"",
                            "    - Bluetooth: btrtl: Fix memory leak in rtlbt_parse_firmware_v2()",
                            "    - net: dsa: tag_brcm: legacy: fix untagged rx on unbridged ports for",
                            "      bcm63xx",
                            "    - selftests/net: fix out-of-order delivery of FIN in gro:tcp test",
                            "    - selftests/net: use destination options instead of hop-by-hop",
                            "    - selftests: netdevsim: Fix ethtool-coalesce.sh fail by installing",
                            "      ethtool-common.sh",
                            "    - net: vlan: sync VLAN features with lower device",
                            "    - net: dsa: b53: fix resetting speed and pause on forced link",
                            "    - net: dsa: b53: fix bcm63xx RGMII port link adjustment",
                            "    - net: dsa: b53: fix enabling ip multicast",
                            "    - net: dsa: b53: stop reading ARL entries if search is done",
                            "    - net: dsa: b53: properly bound ARL searches for < 4 ARL bin chips",
                            "    - sctp: Hold RCU read lock while iterating over address list",
                            "    - sctp: Hold sock lock while iterating over address list",
                            "    - net: ionic: add dma_wmb() before ringing TX doorbell",
                            "    - net: ionic: map SKB after pseudo-header checksum prep",
                            "    - octeontx2-pf: Fix devm_kcalloc() error checking",
                            "    - bnxt_en: Fix a possible memory leak in bnxt_ptp_init",
                            "    - bnxt_en: Always provide max entry and entry size in coredump segments",
                            "    - bnxt_en: Fix warning in bnxt_dl_reload_down()",
                            "    - wifi: mac80211_hwsim: Limit destroy_on_close radio removal to netgroup",
                            "    - io_uring: fix types for region size calulation",
                            "    - net/mlx5e: Fix return value in case of module EEPROM read error",
                            "    - net: ti: icssg-prueth: Fix fdb hash size configuration",
                            "    - net/mlx5e: SHAMPO, Fix header mapping for 64K pages",
                            "    - net/mlx5e: SHAMPO, Fix skb size check for 64K pages",
                            "    - net/mlx5e: SHAMPO, Fix header formulas for higher MTUs and 64K pages",
                            "    - net: wan: framer: pef2256: Switch to devm_mfd_add_devices()",
                            "    - net: dsa: microchip: Fix reserved multicast address table programming",
                            "    - net: bridge: fix MST static key usage",
                            "    - selftests/vsock: avoid false-positives when checking dmesg",
                            "    - tracing: Fix memory leaks in create_field_var()",
                            "    - drm/amd/display: Enable mst when it's detected but yet to be initialized",
                            "    - wifi: cfg80211: add an hrtimer based delayed work item",
                            "    - wifi: mac80211: use wiphy_hrtimer_work for ml_reconf_work",
                            "    - wifi: mac80211: use wiphy_hrtimer_work for ttlm_work",
                            "    - wifi: mac80211: use wiphy_hrtimer_work for csa.switch_work",
                            "    - riscv: Fix memory leak in module_frob_arch_sections()",
                            "    - rtc: rx8025: fix incorrect register reference",
                            "    - x86/microcode/AMD: Add more known models to entry sign checking",
                            "    - smb: client: validate change notify buffer before copy",
                            "    - x86/amd_node: Fix AMD root device caching",
                            "    - xfs: fix delalloc write failures in software-provided atomic writes",
                            "    - xfs: fix various problems in xfs_atomic_write_cow_iomap_begin",
                            "    - x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode",
                            "    - drm: define NVIDIA DRM format modifiers for GB20x",
                            "    - drm/nouveau: Advertise correct modifiers on GB20x",
                            "    - drm/amdgpu/smu: Handle S0ix for vangogh",
                            "    - drm/amdkfd: Don't clear PT after process killed",
                            "    - virtio_net: fix alignment for virtio_net_hdr_v1_hash",
                            "    - lib/crypto: curve25519-hacl64: Fix older clang KASAN workaround for GCC",
                            "    - scsi: ufs: ufs-pci: Fix S0ix/S3 for Intel controllers",
                            "    - scsi: ufs: ufs-pci: Set UFSHCD_QUIRK_PERFORM_LINK_STARTUP_ONCE for Intel",
                            "      ADL",
                            "    - scsi: ufs: core: Add a quirk to suppress link_startup_again",
                            "    - drm/amd/display: update color on atomic commit time",
                            "    - extcon: adc-jack: Cleanup wakeup source only if it was enabled",
                            "    - kunit: Extend kconfig help text for KUNIT_UML_PCI",
                            "    - ALSA: hda/tas2781: Enable init_profile_id for device initialization",
                            "    - ACPI: SPCR: Check for table version when using precise baudrate",
                            "    - kbuild: Strip trailing padding bytes from modules.builtin.modinfo",
                            "    - drm/amdgpu: Fix unintended error log in VCN5_0_0",
                            "    - drm/amd/display: Fix vupdate_offload_work doc",
                            "    - drm/amdgpu: Fix function header names in amdgpu_connectors.c",
                            "    - drm/amdgpu/userq: assign an error code for invalid userq va",
                            "    - drm/msm/dpu: Fix adjusted mode clock check for 3d merge",
                            "    - drm/amd/display: Reject modes with too high pixel clock on DCE6-10",
                            "    - drm/amd/display: use GFP_NOWAIT for allocation in interrupt handler",
                            "    - drm/amd/display: Fix black screen with HDMI outputs",
                            "    - selftests: drv-net: Reload pkt pointer after calling filter_udphdr",
                            "    - dt-bindings: eeprom: at25: use \"size\" for FRAMs without device ID",
                            "    - Linux 6.17.8",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68316",
                            "    - scsi: ufs: core: Fix invalid probe error return value",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40292",
                            "    - virtio-net: fix received length check in big packets",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68180",
                            "    - drm/amd/display: Fix NULL deref in debugfs odm_combine_segments",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40327",
                            "    - perf/core: Fix system hang caused by cpu-clock usage",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40328",
                            "    - smb: client: fix potential UAF in smb2_close_cached_fid()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40291",
                            "    - io_uring: fix regbuf vector size truncation",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68322",
                            "    - parisc: Avoid crash due to unaligned access in unwinder",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40293",
                            "    - iommufd: Don't overflow during division for dirty tracking",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40294",
                            "    - Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40329",
                            "    - drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40295",
                            "    - fscrypt: fix left shift underflow when inode->i_blkbits > PAGE_SHIFT",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40296",
                            "    - platform/x86: int3472: Fix double free of GPIO device during unregister",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40297",
                            "    - net: bridge: fix use-after-free due to MST port state bypass",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68320",
                            "    - lan966x: Fix sleeping in atomic context",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68169",
                            "    - netpoll: Fix deadlock in memory allocation under spinlock",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68197",
                            "    - bnxt_en: Fix null pointer dereference in bnxt_bs_trace_check_wrap()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40330",
                            "    - bnxt_en: Shutdown FW DMA in bnxt_shutdown()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68192",
                            "    - net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40331",
                            "    - sctp: Prevent TOCTOU out-of-bounds write",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68187",
                            "    - net: mdio: Check regmap pointer returned by device_node_to_regmap()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68167",
                            "    - gpiolib: fix invalid pointer access in debugfs",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68319",
                            "    - netconsole: Acquire su_mutex before navigating configs hierarchy",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40298",
                            "    - gve: Implement settime64 with -EOPNOTSUPP",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40299",
                            "    - gve: Implement gettimex64 with -EOPNOTSUPP",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40301",
                            "    - Bluetooth: hci_event: validate skb length for unknown CC opcode",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40358",
                            "    - riscv: stacktrace: Disable KASAN checks for non-current tasks",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68186",
                            "    - ring-buffer: Do not warn in ring_buffer_map_get_reader() when reader",
                            "      catches up",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68184",
                            "    - drm/mediatek: Disable AFBC support on Mediatek DRM driver",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40302",
                            "    - media: videobuf2: forbid remove_bufs when legacy fileio is active",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40303",
                            "    - btrfs: ensure no dirty metadata is written back for an fs with errors",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40362",
                            "    - ceph: fix multifs mds auth caps issue",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40332",
                            "    - drm/amdkfd: Fix mmap write lock not release",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40304",
                            "    - fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40305",
                            "    - 9p/trans_fd: p9_fd_request: kick rx thread if EPOLLIN",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68318",
                            "    - clk: thead: th1520-ap: set all AXI clocks to CLK_IS_CRITICAL",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40209",
                            "    - btrfs: fix memory leak of qgroup_list in btrfs_add_qgroup_relation",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68183",
                            "    - ima: don't clear IMA_DIGSIG flag when setting or removing non-IMA xattr",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68173",
                            "    - ftrace: Fix softlockup in ftrace_module_enable",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40306",
                            "    - orangefs: fix xattr related buffer overflow...",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40307",
                            "    - exfat: validate cluster allocation bits of the allocation bitmap",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40308",
                            "    - Bluetooth: bcsp: receive data only if registered",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40309",
                            "    - Bluetooth: SCO: Fix UAF on sco_conn_free",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68174",
                            "    - amd/amdkfd: enhance kfd process check in switch partition",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40310",
                            "    - amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40361",
                            "    - fs: ext4: change GFP_KERNEL to GFP_NOFS to avoid deadlock",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40311",
                            "    - accel/habanalabs: support mapping cb with vmalloc-backed coherent memory",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68185",
                            "    - nfs4_setup_readdir(): insufficient locking for ->d_parent->d_inode",
                            "      dereferencing",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68176",
                            "    - PCI: cadence: Check for the existence of cdns_pcie::ops before using it",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68190",
                            "    - drm/amdgpu/atom: Check kcalloc() for WS buffer in",
                            "      amdgpu_atom_execute_table_locked()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68168",
                            "    - jfs: fix uninitialized waitqueue in transaction manager",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40312",
                            "    - jfs: Verify inode mode when loading from disk",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40333",
                            "    - f2fs: fix infinite loop in __insert_extent_tree()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68321",
                            "    - page_pool: always add GFP_NOWARN for ATOMIC allocations",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40334",
                            "    - drm/amdgpu: validate userq buffer virtual address and size",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68191",
                            "    - udp_tunnel: use netdev_warn() instead of netdev_WARN()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68309",
                            "    - PCI/AER: Fix NULL pointer access by aer_info",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40313",
                            "    - ntfs3: pretend $Extend records as regular files",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40335",
                            "    - drm/amdgpu: validate userq input args",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40314",
                            "    - usb: cdns3: gadget: Use-after-free during failed initialization and exit",
                            "      of cdnsp gadget",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40336",
                            "    - drm/gpusvm: fix hmm_pfn_to_map_order() usage",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68193",
                            "    - drm/xe/guc: Add devm release action to safely tear down CT",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68175",
                            "    - media: nxp: imx8-isi: Fix streaming cleanup on release",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68188",
                            "    - tcp: use dst_dev_rcu() in tcp_fastopen_active_disable_ofo_check()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68315",
                            "    - f2fs: fix to detect potential corrupted nid in free_nid_list",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40337",
                            "    - net: stmmac: Correctly handle Rx checksum offload errors",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40338",
                            "    - ASoC: Intel: avs: Do not share the name pointer between components",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40339",
                            "    - drm/amdgpu: fix nullptr err of vm_handle_moved",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68194",
                            "    - media: imon: make send_packet() more robust",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40363",
                            "    - net: ipv6: fix field-spanning memcpy warning in AH output",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68311",
                            "    - tty: serial: ip22zilog: Use platform device for probing",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40340",
                            "    - drm/xe: Fix oops in xe_gem_fault when running core_hotunplug test.",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68196",
                            "    - drm/amd/display: Cache streams targeting link when performing LT",
                            "      automation",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68178",
                            "    - blk-cgroup: fix possible deadlock while configuring policy",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40341",
                            "    - futex: Don't leak robust_list pointer on exec race",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40342",
                            "    - nvme-fc: use lock accessing port_state and rport state",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40343",
                            "    - nvmet-fc: avoid scheduling association deletion twice",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68177",
                            "    - cpufreq/longhaul: handle NULL policy in longhaul_exit",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68317",
                            "    - io_uring/zctx: check chained notif contexts",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40315",
                            "    - usb: gadget: f_fs: Fix epfile null pointer access after ep enable.",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40316",
                            "    - drm/mediatek: Fix device use-after-free on unbind",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40360",
                            "    - drm/sysfb: Do not dereference NULL pointer in plane reset",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68179",
                            "    - s390: Disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68310",
                            "    - s390/pci: Avoid deadlock between PCI error recovery and mlx5 crdump",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40317",
                            "    - regmap: slimbus: fix bus_context pointer in regmap init calls",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40359",
                            "    - perf/x86/intel: Fix KASAN global-out-of-bounds warning",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68181",
                            "    - drm/radeon: Remove calls to drm_put_dev()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68170",
                            "    - drm/radeon: Do not kfree() devres managed rdev",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40213",
                            "    - Bluetooth: MGMT: fix crash in set_mesh_sync and set_mesh_complete",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40318",
                            "    - Bluetooth: hci_sync: fix race in hci_cmd_sync_dequeue_once",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68312",
                            "    - usbnet: Prevents free active kevent",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40344",
                            "    - ASoC: Intel: avs: Disable periods-elapsed work when closing PCM",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68172",
                            "    - crypto: aspeed - fix double free caused by devm",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40319",
                            "    - bpf: Sync pending IRQ work before freeing ring buffer",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68182",
                            "    - wifi: iwlwifi: fix potential use after free in iwl_mld_remove_link()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68314",
                            "    - drm/msm: make sure last_fence is always updated",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68189",
                            "    - drm/msm: Fix GEM free for imported dma-bufs",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68171",
                            "    - x86/fpu: Ensure XFD state on signal delivery",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68313",
                            "    - x86/CPU/AMD: Add RDSEED fix for Zen5",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40320",
                            "    - smb: client: fix potential cfid UAF in smb2_query_info_compound",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40321",
                            "    - wifi: brcmfmac: fix crash while sending Action Frames in standalone AP",
                            "      Mode",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40322",
                            "    - fbdev: bitblit: bound-check glyph index in bit_putcs*",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40211",
                            "    - ACPI: video: Fix use-after-free in acpi_video_switch_brightness()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40323",
                            "    - fbcon: Set fb_display[i]->mode to NULL when the mode is released",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40210",
                            "    - Revert \"NFSD: Remove the cap on number of operations per NFSv4 COMPOUND\"",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40324",
                            "    - NFSD: Fix crash in nfsd4_read_release()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40326",
                            "    - NFSD: Define actions for the new time_deleg FATTR4 attributes",
                            "  * Questing update: v6.17.7 upstream stable release (LP: #2136813)",
                            "    - sched_ext: Move internal type and accessor definitions to ext_internal.h",
                            "    - sched_ext: Put event_stats_cpu in struct scx_sched_pcpu",
                            "    - sched_ext: Sync error_irq_work before freeing scx_sched",
                            "    - timekeeping: Fix aux clocks sysfs initialization loop bound",
                            "    - x86/bugs: Report correct retbleed mitigation status",
                            "    - x86/bugs: Qualify RETBLEED_INTEL_MSG",
                            "    - genirq/chip: Add buslock back in to irq_set_handler()",
                            "    - genirq/manage: Add buslock back in to __disable_irq_nosync()",
                            "    - genirq/manage: Add buslock back in to enable_irq()",
                            "    - audit: record fanotify event regardless of presence of rules",
                            "    - EDAC/ie31200: Add two more Intel Alder Lake-S SoCs for EDAC support",
                            "    - perf/x86/intel: Add ICL_FIXED_0_ADAPTIVE bit into INTEL_FIXED_BITS_MASK",
                            "    - perf: Use current->flags & PF_KTHREAD|PF_USER_WORKER instead of",
                            "      current->mm == NULL",
                            "    - perf: Have get_perf_callchain() return NULL if crosstask and user are",
                            "      set",
                            "    - perf: Skip user unwind if the task is a kernel thread",
                            "    - EDAC: Fix wrong executable file modes for C source files",
                            "    - seccomp: passthrough uprobe systemcall without filtering",
                            "    - sched_ext: Keep bypass on between enable failure and",
                            "      scx_disable_workfn()",
                            "    - x86/bugs: Add attack vector controls for VMSCAPE",
                            "    - x86/bugs: Fix reporting of LFENCE retpoline",
                            "    - EDAC/mc_sysfs: Increase legacy channel support to 16",
                            "    - cpuset: Use new excpus for nocpu error check when enabling root",
                            "      partition",
                            "    - btrfs: abort transaction on specific error places when walking log tree",
                            "    - btrfs: abort transaction in the process_one_buffer() log tree walk",
                            "      callback",
                            "    - btrfs: zoned: return error from btrfs_zone_finish_endio()",
                            "    - btrfs: zoned: refine extent allocator hint selection",
                            "    - btrfs: scrub: replace max_t()/min_t() with clamp() in",
                            "      scrub_throttle_dev_io()",
                            "    - btrfs: always drop log root tree reference in btrfs_replay_log()",
                            "    - btrfs: use level argument in log tree walk callback replay_one_buffer()",
                            "    - btrfs: abort transaction if we fail to update inode in log replay dir",
                            "      fixup",
                            "    - btrfs: tree-checker: add inode extref checks",
                            "    - btrfs: use smp_mb__after_atomic() when forcing COW in",
                            "      create_pending_snapshot()",
                            "    - sched_ext: Make qmap dump operation non-destructive",
                            "    - arch: Add the macro COMPILE_OFFSETS to all the asm-offsets.c",
                            "    - btrfs: tree-checker: fix bounds check in check_inode_extref()",
                            "    - Linux 6.17.7",
                            "  * [UBUNTU 24.04] KVM: s390: improve interrupt cpu for wakeup (LP: #2132317)",
                            "    - KVM: s390: improve interrupt cpu for wakeup",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982)",
                            "    - sched/fair: Block delayed tasks on throttled hierarchy during dequeue",
                            "    - vfio/cdx: update driver to build without CONFIG_GENERIC_MSI_IRQ",
                            "    - expfs: Fix exportfs_can_encode_fh() for EXPORT_FH_FID",
                            "    - cgroup/misc: fix misc_res_type kernel-doc warning",
                            "    - dlm: move to rinfo for all middle conversion cases",
                            "    - exec: Fix incorrect type for ret",
                            "    - s390/pkey: Forward keygenflags to ep11_unwrapkey",
                            "    - hfs: clear offset and space out of valid records in b-tree node",
                            "    - hfs: make proper initalization of struct hfs_find_data",
                            "    - hfs: validate record offset in hfsplus_bmap_alloc",
                            "    - hfsplus: fix KMSAN uninit-value issue in hfsplus_delete_cat()",
                            "    - dlm: check for defined force value in dlm_lockspace_release",
                            "    - hfsplus: return EIO when type of hidden directory mismatch in",
                            "      hfsplus_fill_super()",
                            "    - PCI: Test for bit underflow in pcie_set_readrq()",
                            "    - lkdtm: fortify: Fix potential NULL dereference on kmalloc failure",
                            "    - arm64: sysreg: Correct sign definitions for EIESB and DoubleLock",
                            "    - m68k: bitops: Fix find_*_bit() signatures",
                            "    - powerpc/32: Remove PAGE_KERNEL_TEXT to fix startup failure",
                            "    - riscv: mm: Return intended SATP mode for noXlvl options",
                            "    - riscv: mm: Use mmu-type from FDT to limit SATP mode",
                            "    - riscv: cpufeature: add validation for zfa, zfh and zfhmin",
                            "    - drivers/perf: hisi: Relax the event ID check in the framework",
                            "    - s390/mm: Use __GFP_ACCOUNT for user page table allocations",
                            "    - smb: client: queue post_recv_credits_work also if the peer raises the",
                            "      credit target",
                            "    - smb: client: limit the range of info->receive_credit_target",
                            "    - smb: client: make use of ib_wc_status_msg() and skip IB_WC_WR_FLUSH_ERR",
                            "      logging",
                            "    - smb: server: let smb_direct_flush_send_list() invalidate a remote key",
                            "      first",
                            "    - Unbreak 'make tools/*' for user-space targets",
                            "    - platform/mellanox: mlxbf-pmc: add sysfs_attr_init() to count_clock init",
                            "    - cpufreq/amd-pstate: Fix a regression leading to EPP 0 after hibernate",
                            "    - net/mlx5e: Return 1 instead of 0 in invalid case in",
                            "      mlx5e_mpwrq_umr_entry_size()",
                            "    - rtnetlink: Allow deleting FDB entries in user namespace",
                            "    - net: enetc: fix the deadlock of enetc_mdio_lock",
                            "    - net: enetc: correct the value of ENETC_RXB_TRUESIZE",
                            "    - dpaa2-eth: fix the pointer passed to PTR_ALIGN on Tx path",
                            "    - net: phy: realtek: fix rtl8221b-vm-cg name",
                            "    - can: bxcan: bxcan_start_xmit(): use can_dev_dropped_skb() instead of",
                            "      can_dropped_invalid_skb()",
                            "    - can: esd: acc_start_xmit(): use can_dev_dropped_skb() instead of",
                            "      can_dropped_invalid_skb()",
                            "    - can: rockchip-canfd: rkcanfd_start_xmit(): use can_dev_dropped_skb()",
                            "      instead of can_dropped_invalid_skb()",
                            "    - selftests: net: fix server bind failure in sctp_vrf.sh",
                            "    - net/mlx5e: RX, Fix generating skb from non-linear xdp_buff for legacy RQ",
                            "    - net/mlx5e: RX, Fix generating skb from non-linear xdp_buff for striding",
                            "      RQ",
                            "    - net/smc: fix general protection fault in __smc_diag_dump",
                            "    - net: ethernet: ti: am65-cpts: fix timestamp loss due to race conditions",
                            "    - arm64, mm: avoid always making PTE dirty in pte_mkwrite()",
                            "    - erofs: avoid infinite loops due to corrupted subpage compact indexes",
                            "    - net: hibmcge: select FIXED_PHY",
                            "    - ptp: ocp: Fix typo using index 1 instead of i in SMA initialization loop",
                            "    - net: hsr: prevent creation of HSR device with slaves from another netns",
                            "    - espintcp: use datagram_poll_queue for socket readiness",
                            "    - net: datagram: introduce datagram_poll_queue for custom receive queues",
                            "    - ovpn: use datagram_poll_queue for socket readiness in TCP",
                            "    - net: bonding: fix possible peer notify event loss or dup issue",
                            "    - hung_task: fix warnings caused by unaligned lock pointers",
                            "    - mm: don't spin in add_stack_record when gfp flags don't allow",
                            "    - dma-debug: don't report false positives with",
                            "      DMA_BOUNCE_UNALIGNED_KMALLOC",
                            "    - arch_topology: Fix incorrect error check in",
                            "      topology_parse_cpu_capacity()",
                            "    - riscv: hwprobe: Fix stale vDSO data for late-initialized keys at boot",
                            "    - io_uring/sqpoll: switch away from getrusage() for CPU accounting",
                            "    - io_uring/sqpoll: be smarter on when to update the stime usage",
                            "    - btrfs: send: fix duplicated rmdir operations when using extrefs",
                            "    - btrfs: ref-verify: fix IS_ERR() vs NULL check in btrfs_build_ref_tree()",
                            "    - gpio: pci-idio-16: Define maximum valid register address offset",
                            "    - gpio: 104-idio-16: Define maximum valid register address offset",
                            "    - xfs: fix locking in xchk_nlinks_collect_dir",
                            "    - platform/x86: alienware-wmi-wmax: Add AWCC support to Dell G15 5530",
                            "    - Revert \"cpuidle: menu: Avoid discarding useful information\"",
                            "    - riscv: cpufeature: avoid uninitialized variable in",
                            "      has_thead_homogeneous_vlenb()",
                            "    - rust: device: fix device context of Device::parent()",
                            "    - slab: Avoid race on slab->obj_exts in alloc_slab_obj_exts",
                            "    - slab: Fix obj_ext mistakenly considered NULL due to race condition",
                            "    - smb: client: get rid of d_drop() in cifs_do_rename()",
                            "    - ACPICA: Work around bogus -Wstringop-overread warning since GCC 11",
                            "    - arm64: mte: Do not warn if the page is already tagged in copy_highpage()",
                            "    - can: netlink: can_changelink(): allow disabling of automatic restart",
                            "    - cifs: Fix TCP_Server_Info::credits to be signed",
                            "    - devcoredump: Fix circular locking dependency with devcd->mutex.",
                            "    - hwmon: (pmbus/max34440) Update adpm12160 coeff due to latest FW",
                            "    - MIPS: Malta: Fix keyboard resource preventing i8042 driver from",
                            "      registering",
                            "    - rv: Make rtapp/pagefault monitor depends on CONFIG_MMU",
                            "    - net: bonding: update the slave array for broadcast mode",
                            "    - net: stmmac: dwmac-rk: Fix disabling set_clock_selection",
                            "    - net: usb: rtl8150: Fix frame padding",
                            "    - net: ravb: Enforce descriptor type ordering",
                            "    - net: ravb: Ensure memory write completes before ringing TX doorbell",
                            "    - mptcp: pm: in-kernel: C-flag: handle late ADD_ADDR",
                            "    - selftests: mptcp: join: mark 'flush re-add' as skipped if not supported",
                            "    - selftests: mptcp: join: mark implicit tests as skipped if not supported",
                            "    - selftests: mptcp: join: mark 'delete re-add signal' as skipped if not",
                            "      supported",
                            "    - mm/mremap: correctly account old mapping after MREMAP_DONTUNMAP remap",
                            "    - drm/xe: Check return value of GGTT workqueue allocation",
                            "    - drm/amd/display: increase max link count and fix link->enc NULL pointer",
                            "      access",
                            "    - mm/damon/core: use damos_commit_quota_goal() for new goal commit",
                            "    - mm/damon/core: fix list_add_tail() call on damon_call()",
                            "    - spi: rockchip-sfc: Fix DMA-API usage",
                            "    - firmware: arm_ffa: Add support for IMPDEF value in the memory access",
                            "      descriptor",
                            "    - spi: spi-nxp-fspi: add the support for sample data from DQS pad",
                            "    - spi: spi-nxp-fspi: re-config the clock rate when operation require new",
                            "      clock rate",
                            "    - spi: spi-nxp-fspi: add extra delay after dll locked",
                            "    - spi: spi-nxp-fspi: limit the clock rate for different sample clock",
                            "      source selection",
                            "    - spi: cadence-quadspi: Fix pm_runtime unbalance on dma EPROBE_DEFER",
                            "    - arm64: dts: broadcom: bcm2712: Add default GIC address cells",
                            "    - arm64: dts: broadcom: bcm2712: Define VGIC interrupt",
                            "    - include: trace: Fix inflight count helper on failed initialization",
                            "    - firmware: arm_scmi: Fix premature SCMI_XFER_FLAG_IS_RAW clearing in raw",
                            "      mode",
                            "    - spi: airoha: return an error for continuous mode dirmap creation cases",
                            "    - spi: airoha: add support of dual/quad wires spi modes to exec_op()",
                            "      handler",
                            "    - spi: airoha: switch back to non-dma mode in the case of error",
                            "    - spi: airoha: fix reading/writing of flashes with more than one plane per",
                            "      lun",
                            "    - sysfs: check visibility before changing group attribute ownership",
                            "    - RISC-V: Define pgprot_dmacoherent() for non-coherent devices",
                            "    - RISC-V: Don't print details of CPUs disabled in DT",
                            "    - riscv: hwprobe: avoid uninitialized variable use in hwprobe_arch_id()",
                            "    - hwmon: (pmbus/isl68137) Fix child node reference leak on early return",
                            "    - hwmon: (sht3x) Fix error handling",
                            "    - io_uring: fix incorrect unlikely() usage in io_waitid_prep()",
                            "    - nbd: override creds to kernel when calling sock_{send,recv}msg()",
                            "    - drm/panic: Fix drawing the logo on a small narrow screen",
                            "    - drm/panic: Fix qr_code, ensure vmargin is positive",
                            "    - drm/panic: Fix 24bit pixel crossing page boundaries",
                            "    - of/irq: Convert of_msi_map_id() callers to of_msi_xlate()",
                            "    - of/irq: Add msi-parent check to of_msi_xlate()",
                            "    - block: require LBA dma_alignment when using PI",
                            "    - gpio: ljca: Fix duplicated IRQ mapping",
                            "    - io_uring: correct __must_hold annotation in io_install_fixed_file",
                            "    - sched: Remove never used code in mm_cid_get()",
                            "    - USB: serial: option: add UNISOC UIS7720",
                            "    - USB: serial: option: add Quectel RG255C",
                            "    - USB: serial: option: add Telit FN920C04 ECM compositions",
                            "    - usb/core/quirks: Add Huawei ME906S to wakeup quirk",
                            "    - usb: raw-gadget: do not limit transfer length",
                            "    - xhci: dbc: enable back DbC in resume if it was enabled before suspend",
                            "    - xhci: dbc: fix bogus 1024 byte prefix if ttyDBC read races with stall",
                            "      event",
                            "    - x86/microcode: Fix Entrysign revision check for Zen1/Naples",
                            "    - binder: remove \"invalid inc weak\" check",
                            "    - mei: me: add wildcat lake P DID",
                            "    - objtool/rust: add one more `noreturn` Rust function",
                            "    - nvmem: rcar-efuse: add missing MODULE_DEVICE_TABLE",
                            "    - misc: fastrpc: Fix dma_buf object leak in fastrpc_map_lookup",
                            "    - most: usb: hdm_probe: Fix calling put_device() before device",
                            "      initialization",
                            "    - tcpm: switch check for role_sw device with fw_node",
                            "    - dt-bindings: serial: sh-sci: Fix r8a78000 interrupts",
                            "    - dt-bindings: usb: dwc3-imx8mp: dma-range is required only for imx8mp",
                            "    - dt-bindings: usb: qcom,snps-dwc3: Fix bindings for X1E80100",
                            "    - serial: 8250_dw: handle reset control deassert error",
                            "    - serial: 8250_exar: add support for Advantech 2 port card with Device ID",
                            "      0x0018",
                            "    - serial: 8250_mtk: Enable baud clock and manage in runtime PM",
                            "    - serial: sc16is7xx: remove useless enable of enhanced features",
                            "    - staging: gpib: Fix device reference leak in fmh_gpib driver",
                            "    - staging: gpib: Fix no EOI on 1 and 2 byte writes",
                            "    - staging: gpib: Return -EINTR on device clear",
                            "    - staging: gpib: Fix sending clear and trigger events",
                            "    - mm/migrate: remove MIGRATEPAGE_UNMAP",
                            "    - treewide: remove MIGRATEPAGE_SUCCESS",
                            "    - vmw_balloon: indicate success when effectively deflating during",
                            "      migration",
                            "    - xfs: always warn about deprecated mount options",
                            "    - gpio: regmap: Allow to allocate regmap-irq device",
                            "    - gpio: regmap: add the .fixed_direction_output configuration parameter",
                            "    - gpio: idio-16: Define fixed direction of the GPIO lines",
                            "    - Linux 6.17.6",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40084",
                            "    - ksmbd: transport_ipc: validate payload size before reading handle",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40222",
                            "    - tty: serial: sh-sci: fix RSCI FIFO overrun handling",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40223",
                            "    - most: usb: Fix use-after-free in hdm_disconnect",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40106",
                            "    - comedi: fix divide-by-zero in comedi_buf_munge()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40224",
                            "    - hwmon: (cgbc-hwmon) Add missing NULL check after devm_kzalloc()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40225",
                            "    - drm/panthor: Fix kernel panic on partial unmap of a GPU VA region",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40226",
                            "    - firmware: arm_scmi: Account for failed debug initialization",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40227",
                            "    - mm/damon/sysfs: dealloc commit test ctx always",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40228",
                            "    - mm/damon/sysfs: catch commit test ctx alloc failure",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40229",
                            "    - mm/damon/core: fix potential memory leak by cleaning ops_filter in",
                            "      damon_destroy_scheme",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40230",
                            "    - mm: prevent poison consumption when splitting THP",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40231",
                            "    - vsock: fix lock inversion in vsock_assign_transport()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40233",
                            "    - ocfs2: clear extent cache after moving/defragmenting extents",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40235",
                            "    - btrfs: directly free partially initialized fs_info in",
                            "      btrfs_check_leaked_roots()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40236",
                            "    - virtio-net: zero unused hash fields",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40237",
                            "    - fs/notify: call exportfs_encode_fid with s_umount",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40238",
                            "    - net/mlx5: Fix IPsec cleanup over MPV device",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40239",
                            "    - net: phy: micrel: always set shared->phydev for LAN8814",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40240",
                            "    - sctp: avoid NULL dereference when chunk data buffer is missing",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40241",
                            "    - erofs: fix crafted invalid cases for encoded extents",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40242",
                            "    - gfs2: Fix unlikely race in gdlm_put_lock",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40243",
                            "    - hfs: fix KMSAN uninit-value issue in hfs_find_set_zero_bits()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40244",
                            "    - hfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40245",
                            "    - nios2: ensure that memblock.current_limit is set when setting pfn limits",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557)",
                            "    - docs: kdoc: handle the obsolescensce of docutils.ErrorString()",
                            "    - Revert \"fs: make vfs_fileattr_[get|set] return -EOPNOTSUPP\"",
                            "    - PCI: vmd: Override irq_startup()/irq_shutdown() in",
                            "      vmd_init_dev_msi_info()",
                            "    - ata: libata-core: relax checks in ata_read_log_directory()",
                            "    - arm64/sysreg: Fix GIC CDEOI instruction encoding",
                            "    - ixgbevf: fix getting link speed data for E610 devices",
                            "    - rust: cfi: only 64-bit arm and x86 support CFI_CLANG",
                            "    - x86/CPU/AMD: Prevent reset reasons from being retained across reboot",
                            "    - slab: reset slab->obj_ext when freeing and it is OBJEXTS_ALLOC_FAIL",
                            "    - Revert \"io_uring/rw: drop -EOPNOTSUPP check in",
                            "      __io_complete_rw_common()\"",
                            "    - io_uring: protect mem region deregistration",
                            "    - Revert \"drm/amd/display: Only restore backlight after amdgpu_dm_init or",
                            "      dm_resume\"",
                            "    - r8152: add error handling in rtl8152_driver_init",
                            "    - net: usb: lan78xx: Fix lost EEPROM write timeout error(-ETIMEDOUT) in",
                            "      lan78xx_write_raw_eeprom",
                            "    - f2fs: fix wrong block mapping for multi-devices",
                            "    - gve: Check valid ts bit on RX descriptor before hw timestamping",
                            "    - jbd2: ensure that all ongoing I/O complete before freeing blocks",
                            "    - ext4: wait for ongoing I/O to complete before freeing blocks",
                            "    - btrfs: fix clearing of BTRFS_FS_RELOC_RUNNING if relocation already",
                            "      running",
                            "    - btrfs: fix memory leak on duplicated memory in the qgroup assign ioctl",
                            "    - btrfs: only set the device specific options after devices are opened",
                            "    - btrfs: fix incorrect readahead expansion length",
                            "    - can: gs_usb: gs_make_candev(): populate net_device->dev_port",
                            "    - can: gs_usb: increase max interface to U8_MAX",
                            "    - cxl/acpi: Fix setup of memory resource in cxl_acpi_set_cache_size()",
                            "    - ALSA: hda/intel: Add MSI X870E Tomahawk to denylist",
                            "    - ALSA: hda/realtek: Add quirk entry for HP ZBook 17 G6",
                            "    - drm/amdgpu: use atomic functions with memory barriers for vm fault info",
                            "    - drm/amdgpu: fix gfx12 mes packet status return check",
                            "    - drm/xe: Increase global invalidation timeout to 1000us",
                            "    - perf/core: Fix address filter match with backing files",
                            "    - perf/core: Fix MMAP event path names with backing files",
                            "    - perf/core: Fix MMAP2 event device with backing files",
                            "    - drm/amd: Check whether secure display TA loaded successfully",
                            "    - PM: hibernate: Add pm_hibernation_mode_is_suspend()",
                            "    - drm/amd: Fix hybrid sleep",
                            "    - usb: gadget: Store endpoint pointer in usb_request",
                            "    - usb: gadget: Introduce free_usb_request helper",
                            "    - HID: multitouch: fix sticky fingers",
                            "    - dax: skip read lock assertion for read-only filesystems",
                            "    - coredump: fix core_pattern input validation",
                            "    - can: m_can: m_can_plat_remove(): add missing pm_runtime_disable()",
                            "    - can: m_can: m_can_handle_state_errors(): fix CAN state transition to",
                            "      Error Active",
                            "    - can: m_can: m_can_chip_config(): bring up interface in correct state",
                            "    - can: m_can: fix CAN state in system PM",
                            "    - net: mtk: wed: add dma mask limitation and GFP_DMA32 for device with",
                            "      more than 4GB DRAM",
                            "    - net: dlink: handle dma_map_single() failure properly",
                            "    - doc: fix seg6_flowlabel path",
                            "    - can: j1939: add missing calls in NETDEV_UNREGISTER notification handler",
                            "    - dpll: zl3073x: Refactor DPLL initialization",
                            "    - dpll: zl3073x: Handle missing or corrupted flash configuration",
                            "    - r8169: fix packet truncation after S4 resume on RTL8168H/RTL8111H",
                            "    - net: phy: bcm54811: Fix GMII/MII/MII-Lite selection",
                            "    - net: phy: realtek: Avoid PHYCR2 access if PHYCR2 not present",
                            "    - amd-xgbe: Avoid spurious link down messages during interface toggle",
                            "    - Octeontx2-af: Fix missing error code in cgx_probe()",
                            "    - tcp: fix tcp_tso_should_defer() vs large RTT",
                            "    - net: airoha: Take into account out-of-order tx completions in",
                            "      airoha_dev_xmit()",
                            "    - selftests: net: check jq command is supported",
                            "    - net: core: fix lockdep splat on device unregister",
                            "    - ksmbd: fix recursive locking in RPC handle list access",
                            "    - tg3: prevent use of uninitialized remote_adv and local_adv variables",
                            "    - tls: trim encrypted message to match the plaintext on short splice",
                            "    - tls: wait for async encrypt in case of error during latter iterations of",
                            "      sendmsg",
                            "    - tls: always set record_type in tls_process_cmsg",
                            "    - tls: don't rely on tx_work during send()",
                            "    - netdevsim: set the carrier when the device goes up",
                            "    - net: usb: lan78xx: fix use of improperly initialized dev->chipid in",
                            "      lan78xx_reset",
                            "    - drm/panthor: Ensure MCU is disabled on suspend",
                            "    - nvme-multipath: Skip nr_active increments in RETRY disposition",
                            "    - riscv: kprobes: Fix probe address validation",
                            "    - drm/bridge: lt9211: Drop check for last nibble of version register",
                            "    - powerpc/fadump: skip parameter area allocation when fadump is disabled",
                            "    - ASoC: codecs: Fix gain setting ranges for Renesas IDT821034 codec",
                            "    - ASoC: nau8821: Cancel jdet_work before handling jack ejection",
                            "    - ASoC: nau8821: Generalize helper to clear IRQ status",
                            "    - ASoC: nau8821: Consistently clear interrupts before unmasking",
                            "    - ASoC: nau8821: Add DMI quirk to bypass jack debounce circuit",
                            "    - drm/i915/guc: Skip communication warning on reset in progress",
                            "    - drm/i915/frontbuffer: Move bo refcounting",
                            "      intel_frontbuffer_{get,release}()",
                            "    - drm/i915/fb: Fix the set_tiling vs. addfb race, again",
                            "    - drm/amdgpu: add ip offset support for cyan skillfish",
                            "    - drm/amdgpu: add support for cyan skillfish without IP discovery",
                            "    - drm/amdgpu: fix handling of harvesting for ip_discovery firmware",
                            "    - drm/amdgpu: handle wrap around in reemit handling",
                            "    - drm/amdgpu: set an error on all fences from a bad context",
                            "    - drm/amdgpu: drop unused structures in amdgpu_drm.h",
                            "    - drm/amd/powerplay: Fix CIK shutdown temperature",
                            "    - drm/xe: Enable media sampler power gating",
                            "    - drm/draw: fix color truncation in drm_draw_fill24",
                            "    - drm/rockchip: vop2: use correct destination rectangle height check",
                            "    - HID: intel-thc-hid: Intel-quickspi: switch first interrupt from level to",
                            "      edge detection",
                            "    - sched/fair: Fix pelt lost idle time detection",
                            "    - ALSA: firewire: amdtp-stream: fix enum kernel-doc warnings",
                            "    - accel/qaic: Synchronize access to DBC request queue head & tail pointer",
                            "    - nvme-auth: update sc_c in host response",
                            "    - cxl/trace: Subtract to find an hpa_alias0 in cxl_poison events",
                            "    - selftests/bpf: make arg_parsing.c more robust to crashes",
                            "    - blk-mq: fix stale tag depth for shared sched tags in",
                            "      blk_mq_update_nr_requests()",
                            "    - block: Remove elevator_lock usage from blkg_conf frozen operations",
                            "    - HID: hid-input: only ignore 0 battery events for digitizers",
                            "    - HID: multitouch: fix name of Stylus input devices",
                            "    - drm/xe/evict: drop bogus assert",
                            "    - selftests: arg_parsing: Ensure data is flushed to disk before reading.",
                            "    - nvme/tcp: handle tls partially sent records in write_space()",
                            "    - rust: cpufreq: fix formatting",
                            "    - arm64: debug: always unmask interrupts in el0_softstp()",
                            "    - arm64: cputype: Add Neoverse-V3AE definitions",
                            "    - arm64: errata: Apply workarounds for Neoverse-V3AE",
                            "    - xfs: rename the old_crc variable in xlog_recover_process",
                            "    - xfs: fix log CRC mismatches between i386 and other architectures",
                            "    - NFSD: Rework encoding and decoding of nfsd4_deviceid",
                            "    - NFSD: Minor cleanup in layoutcommit processing",
                            "    - NFSD: Implement large extent array support in pNFS",
                            "    - NFSD: Fix last write offset handling in layoutcommit",
                            "    - phy: cdns-dphy: Store hs_clk_rate and return it",
                            "    - phy: cadence: cdns-dphy: Fix PLL lock and O_CMN_READY polling",
                            "    - x86/resctrl: Refactor resctrl_arch_rmid_read()",
                            "    - x86/resctrl: Fix miscount of bandwidth event when reactivating",
                            "      previously unavailable RMID",
                            "    - cxl: Fix match_region_by_range() to use region_res_match_cxl_range()",
                            "    - phy: cadence: cdns-dphy: Update calibration wait time for startup state",
                            "      machine",
                            "    - drm/xe: Use devm_ioremap_wc for VRAM mapping and drop manual unmap",
                            "    - drm/xe: Use dynamic allocation for tile and device VRAM region",
                            "      structures",
                            "    - drm/xe: Move struct xe_vram_region to a dedicated header",
                            "    - drm/xe: Unify the initialization of VRAM regions",
                            "    - drm/xe: Move rebar to be done earlier",
                            "    - PM: hibernate: Fix pm_hibernation_mode_is_suspend() build breakage",
                            "    - drm/xe: Fix an IS_ERR() vs NULL bug in xe_tile_alloc_vram()",
                            "    - Linux 6.17.5",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40086",
                            "    - drm/xe: Don't allow evicting of BOs in same VM in array of VM binds",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40087",
                            "    - NFSD: Define a proc_layoutcommit for the FlexFiles layout type",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40088",
                            "    - hfsplus: fix slab-out-of-bounds read in hfsplus_strcasecmp()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40162",
                            "    - ASoC: amd/sdw_utils: avoid NULL deref when devm_kasprintf() fails",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40085",
                            "    - ALSA: usb-audio: Fix NULL pointer deference in try_to_register_card",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40172",
                            "    - accel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40177",
                            "    - accel/qaic: Fix bootlog initialization ordering",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40163",
                            "    - sched/deadline: Stop dl_server before CPU goes offline",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40174",
                            "    - x86/mm: Fix SMP ordering in switch_mm_irqs_off()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40089",
                            "    - cxl/features: Add check for no entries in cxl_feature_info",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40176",
                            "    - tls: wait for pending async decryptions if tls_strp_msg_hold fails",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40164",
                            "    - usbnet: Fix using smp_processor_id() in preemptible code warnings",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40091",
                            "    - ixgbe: fix too early devlink_free() in ixgbe_remove()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40175",
                            "    - idpf: cleanup remaining SKBs in PTP flows",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40173",
                            "    - net/ip6_tunnel: Prevent perpetual tunnel growth",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40092",
                            "    - usb: gadget: f_ncm: Refactor bind path to use __free()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40093",
                            "    - usb: gadget: f_ecm: Refactor bind path to use __free()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40094",
                            "    - usb: gadget: f_acm: Refactor bind path to use __free()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40095",
                            "    - usb: gadget: f_rndis: Refactor bind path to use __free()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40165",
                            "    - media: nxp: imx8-isi: m2m: Fix streaming cleanup on release",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40096",
                            "    - drm/sched: Fix potential double free in",
                            "      drm_sched_job_add_resv_dependencies",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40097",
                            "    - ALSA: hda: Fix missing pointer check in hda_component_manager_init",
                            "      function",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40098",
                            "    - ALSA: hda: cs35l41: Fix NULL pointer dereference in",
                            "      cs35l41_get_acpi_mute_state()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40099",
                            "    - cifs: parse_dfs_referrals: prevent oob on malformed input",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40100",
                            "    - btrfs: do not assert we found block group item when creating free space",
                            "      tree",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40101",
                            "    - btrfs: fix memory leaks when rejecting a non SINGLE data profile without",
                            "      an RST",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40167",
                            "    - ext4: detect invalid INLINE_DATA + EXTENTS flag combination",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40102",
                            "    - KVM: arm64: Prevent access to vCPU events before init",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40103",
                            "    - smb: client: Fix refcount leak for cifs_sb_tlink",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40104",
                            "    - ixgbevf: fix mailbox API compatibility by negotiating supported features",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40166",
                            "    - drm/xe/guc: Check GuC running state before deregistering exec queue",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40105",
                            "    - vfs: Don't leak disconnected dentries on umount",
                            "  * The machine didn’t go into suspend and got stuck (LP: #2132095)",
                            "    - platform/x86: alienware-wmi-wmax: Fix NULL pointer dereference in sleep",
                            "      handlers",
                            "  * CAP_PERFMON insufficient to get perf data (LP: #2131046)",
                            "    - SAUCE: perf/core: Allow CAP_PERFMON for paranoid level 4",
                            "  * Poweroff not working consistently after upgrading kernel 6.14.0-17.17 or",
                            "    later (LP: #2115860)",
                            "    - drm/amd: Unify shutdown() callback behavior",
                            "    - drm/amd: Stop exporting amdgpu_device_ip_suspend() outside amdgpu_device",
                            "    - drm/amd: Remove comment about handling errors in",
                            "      amdgpu_device_ip_suspend_phase1()",
                            "    - drm/amd: Don't always set IP block HW status to false",
                            "    - drm/amd: Pass IP suspend errors up to callers",
                            "    - drm/amd: Avoid evicting resources at S5",
                            "  * Re-enable INTEL_SKL_INT3472 for kernels >= 6.16 for Intel IPU camera",
                            "    (LP: #2128792)",
                            "    - Revert \"UBUNTU: [Config] FTBFS: disable INTEL_SKL_INT3472\"",
                            "    - Revert \"UBUNTU: SAUCE: platform/x86: int3472: Add handshake GPIO",
                            "      function\"",
                            "  * Support Samsung S5K3J1 sensor for Intel MIPI camera (LP: #2121852)",
                            "    - SAUCE: media: ipu-bridge: Support s5k3j1 sensor",
                            "  * Questing update: v6.17.4 upstream stable release (LP: #2131259)",
                            "    - fs: always return zero on success from replace_fd()",
                            "    - fscontext: do not consume log entries when returning -EMSGSIZE",
                            "    - btrfs: fix the incorrect max_bytes value for find_lock_delalloc_range()",
                            "    - arm64: map [_text, _stext) virtual address range non-executable+read-",
                            "      only",
                            "    - rseq: Protect event mask against membarrier IPI",
                            "    - statmount: don't call path_put() under namespace semaphore",
                            "    - listmount: don't call path_put() under namespace semaphore",
                            "    - clocksource/drivers/clps711x: Fix resource leaks in error paths",
                            "    - memcg: skip cgroup_file_notify if spinning is not allowed",
                            "    - page_pool: Fix PP_MAGIC_MASK to avoid crashing on some 32-bit arches",
                            "    - PM: runtime: Update kerneldoc return codes",
                            "    - dma-mapping: fix direction in dma_alloc direction traces",
                            "    - cpufreq: Make drivers using CPUFREQ_ETERNAL specify transition latency",
                            "    - nfsd: unregister with rpcbind when deleting a transport",
                            "    - KVM: x86: Add helper to retrieve current value of user return MSR",
                            "    - KVM: SVM: Emulate PERF_CNTR_GLOBAL_STATUS_SET for PerfMonV2",
                            "    - iio: frequency: adf4350: Fix ADF4350_REG3_12BIT_CLKDIV_MODE",
                            "    - media: v4l2-subdev: Fix alloc failure check in",
                            "      v4l2_subdev_call_state_try()",
                            "    - asm-generic/io.h: Skip trace helpers if rwmmio events are disabled",
                            "    - clk: npcm: select CONFIG_AUXILIARY_BUS",
                            "    - clk: thead: th1520-ap: describe gate clocks with clk_gate",
                            "    - clk: thead: th1520-ap: fix parent of padctrl0 clock",
                            "    - clk: thead: Correct parent for DPU pixel clocks",
                            "    - clk: renesas: r9a08g045: Add MSTOP for GPIO",
                            "    - perf disasm: Avoid undefined behavior in incrementing NULL",
                            "    - perf test trace_btf_enum: Skip if permissions are insufficient",
                            "    - perf evsel: Avoid container_of on a NULL leader",
                            "    - libperf event: Ensure tracing data is multiple of 8 sized",
                            "    - clk: qcom: common: Fix NULL vs IS_ERR() check in qcom_cc_icc_register()",
                            "    - clk: qcom: Select the intended config in QCS_DISPCC_615",
                            "    - perf parse-events: Handle fake PMUs in CPU terms",
                            "    - clk: at91: peripheral: fix return value",
                            "    - clk: renesas: cpg-mssr: Fix memory leak in cpg_mssr_reserved_init()",
                            "    - perf: Completely remove possibility to override MAX_NR_CPUS",
                            "    - perf drm_pmu: Fix fd_dir leaks in for_each_drm_fdinfo_in_dir()",
                            "    - perf util: Fix compression checks returning -1 as bool",
                            "    - rtc: x1205: Fix Xicor X1205 vendor prefix",
                            "    - rtc: optee: fix memory leak on driver removal",
                            "    - perf arm_spe: Correct setting remote access",
                            "    - perf arm_spe: Correct memory level for remote access",
                            "    - perf vendor events arm64 AmpereOneX: Fix typo - should be",
                            "      l1d_cache_access_prefetches",
                            "    - perf test: AMD IBS swfilt skip kernel tests if paranoia is >1",
                            "    - perf test shell lbr: Avoid failures with perf event paranoia",
                            "    - perf trace: Fix IS_ERR() vs NULL check bug",
                            "    - perf session: Fix handling when buffer exceeds 2 GiB",
                            "    - perf test: Don't leak workload gopipe in PERF_RECORD_*",
                            "    - perf evsel: Fix uniquification when PMU given without suffix",
                            "    - perf test: Avoid uncore_imc/clockticks in uniquification test",
                            "    - perf evsel: Ensure the fallback message is always written to",
                            "    - perf build-id: Ensure snprintf string is empty when size is 0",
                            "    - clk: mediatek: mt8195-infra_ao: Fix parent for infra_ao_hdmi_26m",
                            "    - clk: mediatek: clk-mux: Do not pass flags to",
                            "      clk_mux_determine_rate_flags()",
                            "    - clk: nxp: lpc18xx-cgu: convert from round_rate() to determine_rate()",
                            "    - clk: nxp: Fix pll0 rate check condition in LPC18xx CGU driver",
                            "    - clk: tegra: do not overallocate memory for bpmp clocks",
                            "    - nfsd: fix assignment of ia_ctime.tv_nsec on delegated mtime update",
                            "    - nfsd: ignore ATTR_DELEG when checking ia_valid before notify_change()",
                            "    - vfs: add ATTR_CTIME_SET flag",
                            "    - nfsd: use ATTR_CTIME_SET for delegated ctime updates",
                            "    - nfsd: track original timestamps in nfs4_delegation",
                            "    - nfsd: fix SETATTR updates for delegated timestamps",
                            "    - nfsd: fix timestamp updates in CB_GETATTR",
                            "    - tracing: Fix the bug where bpf_get_stackid returns -EFAULT on the ARM64",
                            "    - PM: core: Annotate loops walking device links as _srcu",
                            "    - PM: core: Add two macros for walking device links",
                            "    - PM: sleep: Do not wait on SYNC_STATE_ONLY device links",
                            "    - cpufreq: tegra186: Set target frequency for all cpus in policy",
                            "    - scsi: mvsas: Fix use-after-free bugs in mvs_work_queue",
                            "    - perf bpf-filter: Fix opts declaration on older libbpfs",
                            "    - scsi: ufs: sysfs: Make HID attributes visible",
                            "    - mshv: Handle NEED_RESCHED_LAZY before transferring to guest",
                            "    - perf bpf_counter: Fix handling of cpumap fixing hybrid",
                            "    - ASoC: SOF: ipc4-topology: Correct the minimum host DMA buffer size",
                            "    - ASoC: SOF: ipc4-topology: Account for different ChainDMA host buffer",
                            "      size",
                            "    - ASoC: SOF: Intel: hda-pcm: Place the constraint on period time instead",
                            "      of buffer time",
                            "    - LoongArch: Add cflag -fno-isolate-erroneous-paths-dereference",
                            "    - LoongArch: Fix build error for LTO with LLVM-18",
                            "    - LoongArch: Init acpi_gbl_use_global_lock to false",
                            "    - ASoC: SOF: Intel: Read the LLP via the associated Link DMA channel",
                            "    - net: usb: lan78xx: Fix lost EEPROM read timeout error(-ETIMEDOUT) in",
                            "      lan78xx_read_raw_eeprom",
                            "    - net/mlx4: prevent potential use after free in mlx4_en_do_uc_filter()",
                            "    - drm/xe/hw_engine_group: Fix double write lock release in error path",
                            "    - drm/xe/i2c: Don't rely on d3cold.allowed flag in system PM path",
                            "    - s390/cio: Update purge function to unregister the unused subchannels",
                            "    - drm/vmwgfx: Fix a null-ptr access in the cursor snooper",
                            "    - drm/vmwgfx: Fix Use-after-free in validation",
                            "    - drm/vmwgfx: Fix copy-paste typo in validation",
                            "    - net/sctp: fix a null dereference in sctp_disposition",
                            "      sctp_sf_do_5_1D_ce()",
                            "    - tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request().",
                            "    - net: mscc: ocelot: Fix use-after-free caused by cyclic delayed work",
                            "    - selftest: net: ovpn: Fix uninit return values",
                            "    - ice: ice_adapter: release xa entry on adapter allocation failure",
                            "    - net: fsl_pq_mdio: Fix device node reference leak in fsl_pq_mdio_probe",
                            "    - tools build: Align warning options with perf",
                            "    - perf python: split Clang options when invoking Popen",
                            "    - tcp: take care of zero tp->window_clamp in tcp_set_rcvlowat()",
                            "    - mailbox: zynqmp-ipi: Remove redundant mbox_controller_unregister() call",
                            "    - mailbox: zynqmp-ipi: Remove dev.parent check in zynqmp_ipi_free_mboxes",
                            "    - mailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop",
                            "    - mailbox: zynqmp-ipi: Fix SGI cleanup on unbind",
                            "    - bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}",
                            "    - net: mdio: mdio-i2c: Hold the i2c bus lock during smbus transactions",
                            "    - net: sparx5/lan969x: fix flooding configuration on bridge join/leave",
                            "    - net/mlx5: Prevent tunnel mode conflicts between FDB and NIC IPsec tables",
                            "    - net/mlx5e: Prevent tunnel reformat when tunnel mode not allowed",
                            "    - mailbox: mtk-cmdq: Remove pm_runtime APIs from cmdq_mbox_send_data()",
                            "    - drm/amdgpu: Add additional DCE6 SCL registers",
                            "    - drm/amd/display: Add missing DCE6 SCL_HORZ_FILTER_INIT* SRIs",
                            "    - drm/amd/display: Properly clear SCL_*_FILTER_CONTROL on DCE6",
                            "    - drm/amd/display: Properly disable scaling on DCE6",
                            "    - drm/amd/display: Disable scaling on DCE6 for now",
                            "    - drm/amdkfd: Fix kfd process ref leaking when userptr unmapping",
                            "    - net: pse-pd: tps23881: Fix current measurement scaling",
                            "    - crypto: skcipher - Fix reqsize handling",
                            "    - netfilter: nft_objref: validate objref and objrefmap expressions",
                            "    - bridge: br_vlan_fill_forward_path_pvid: use br_vlan_group_rcu()",
                            "    - selftests: netfilter: nft_fib.sh: fix spurious test failures",
                            "    - selftests: netfilter: query conntrack state to check for port clash",
                            "      resolution",
                            "    - io_uring/zcrx: increment fallback loop src offset",
                            "    - net: airoha: Fix loopback mode configuration for GDM2 port",
                            "    - cifs: Fix copy_to_iter return value check",
                            "    - smb: client: fix missing timestamp updates after utime(2)",
                            "    - rtc: isl12022: Fix initial enable_irq/disable_irq balance",
                            "    - cifs: Query EA $LXMOD in cifs_query_path_info() for WSL reparse points",
                            "    - tpm_tis: Fix incorrect arguments in tpm_tis_probe_irq_single",
                            "    - gpio: wcd934x: mark the GPIO controller as sleeping",
                            "    - bpf: Avoid RCU context warning when unpinning htab with internal structs",
                            "    - kbuild: always create intermediate vmlinux.unstripped",
                            "    - kbuild: keep .modinfo section in vmlinux.unstripped",
                            "    - kbuild: Restore pattern to avoid stripping .rela.dyn from vmlinux",
                            "    - kbuild: Add '.rel.*' strip pattern for vmlinux",
                            "    - s390: vmlinux.lds.S: Reorder sections",
                            "    - s390/vmlinux.lds.S: Move .vmlinux.info to end of allocatable sections",
                            "    - ACPICA: acpidump: drop ACPI_NONSTRING attribute from file_name",
                            "    - ACPI: property: Fix buffer properties extraction for subnodes",
                            "    - ACPI: TAD: Add missing sysfs_remove_group() for ACPI_TAD_RT",
                            "    - ACPICA: Debugger: drop ACPI_NONSTRING attribute from name_seg",
                            "    - ACPI: debug: fix signedness issues in read/write helpers",
                            "    - ACPI: battery: Add synchronization between interface updates",
                            "    - arm64: dts: qcom: msm8916: Add missing MDSS reset",
                            "    - arm64: dts: qcom: msm8939: Add missing MDSS reset",
                            "    - arm64: dts: qcom: sdm845: Fix slimbam num-channels/ees",
                            "    - Revert \"UBUNTU: SAUCE: arm64: dts: qcom: x1e80100-pmics: Disable pm8010",
                            "      by default\"",
                            "    - arm64: dts: qcom: x1e80100-pmics: Disable pm8010 by default",
                            "    - arm64: dts: ti: k3-am62a-main: Fix main padcfg length",
                            "    - arm64: dts: ti: k3-am62p: Fix supported hardware for 1GHz OPP",
                            "    - arm64: kprobes: call set_memory_rox() for kprobe page",
                            "    - arm64: mte: Do not flag the zero page as PG_mte_tagged",
                            "    - ARM: AM33xx: Implement TI advisory 1.0.36 (EMU0/EMU1 pins state on",
                            "      reset)",
                            "    - ARM: OMAP2+: pm33xx-core: ix device node reference leaks in",
                            "      amx3_idle_init",
                            "    - firmware: arm_scmi: quirk: Prevent writes to string constants",
                            "    - perf/arm-cmn: Fix CMN S3 DTM offset",
                            "    - KVM: s390: Fix to clear PTE when discarding a swapped page",
                            "    - KVM: arm64: Fix debug checking for np-guests using huge mappings",
                            "    - KVM: arm64: Fix page leak in user_mem_abort()",
                            "    - x86/kvm: Force legacy PCI hole to UC when overriding MTRRs for TDX/SNP",
                            "    - KVM: SVM: Re-load current, not host, TSC_AUX on #VMEXIT from SEV-ES",
                            "      guest",
                            "    - KVM: TDX: Fix uninitialized error code for __tdx_bringup()",
                            "    - dt-bindings: phy: rockchip-inno-csi-dphy: make power-domains non-",
                            "      required",
                            "    - xen: take system_transition_mutex on suspend",
                            "    - xen/events: Cleanup find_virq() return codes",
                            "    - xen/manage: Fix suspend error path",
                            "    - xen/events: Return -EEXIST for bound VIRQs",
                            "    - xen/events: Update virq_to_irq on migration",
                            "    - firmware: exynos-acpm: fix PMIC returned errno",
                            "    - firmware: meson_sm: fix device leak at probe",
                            "    - media: cec: extron-da-hd-4k-plus: drop external-module make commands",
                            "    - media: cx18: Add missing check after DMA map",
                            "    - media: i2c: mt9p031: fix mbus code initialization",
                            "    - media: i2c: mt9v111: fix incorrect type for ret",
                            "    - media: mc: Fix MUST_CONNECT handling for pads with no links",
                            "    - media: pci: ivtv: Add missing check after DMA map",
                            "    - media: pci: mg4b: fix uninitialized iio scan data",
                            "    - media: platform: mtk-mdp3: Add missing MT8188 compatible to comp_dt_ids",
                            "    - media: s5p-mfc: remove an unused/uninitialized variable",
                            "    - media: staging/ipu7: fix isys device runtime PM usage in firmware",
                            "      closing",
                            "    - media: uvcvideo: Avoid variable shadowing in uvc_ctrl_cleanup_fh",
                            "    - media: venus: firmware: Use correct reset sequence for IRIS2",
                            "    - media: venus: pm_helpers: add fallback for the opp-table",
                            "    - media: vivid: fix disappearing <Vendor Command With ID> messages",
                            "    - media: vsp1: Export missing vsp1_isp_free_buffer symbol",
                            "    - media: ti: j721e-csi2rx: Use devm_of_platform_populate",
                            "    - media: ti: j721e-csi2rx: Fix source subdev link creation",
                            "    - media: lirc: Fix error handling in lirc_register()",
                            "    - drm/exynos: exynos7_drm_decon: remove ctx->suspended",
                            "    - drm/panthor: Fix memory leak in panthor_ioctl_group_create()",
                            "    - drm/msm/a6xx: Fix PDC sleep sequence",
                            "    - drm/rcar-du: dsi: Fix 1/2/3 lane support",
                            "    - drm/nouveau: fix bad ret code in nouveau_bo_move_prep",
                            "    - drm/xe/uapi: loosen used tracking restriction",
                            "    - drm/amd/display: Incorrect Mirror Cositing",
                            "    - drm/amd/display: Enable Dynamic DTBCLK Switch",
                            "    - drm/amd/display: Fix unsafe uses of kernel mode FPU",
                            "    - blk-crypto: fix missing blktrace bio split events",
                            "    - btrfs: avoid potential out-of-bounds in btrfs_encode_fh()",
                            "    - bus: mhi: ep: Fix chained transfer handling in read path",
                            "    - bus: mhi: host: Do not use uninitialized 'dev' pointer in",
                            "      mhi_init_irq_setup()",
                            "    - cdx: Fix device node reference leak in cdx_msi_domain_init",
                            "    - clk: qcom: tcsrcc-x1e80100: Set the bi_tcxo as parent to eDP refclk",
                            "    - clk: samsung: exynos990: Use PLL_CON0 for PLL parent muxes",
                            "    - clk: samsung: exynos990: Fix CMU_TOP mux/div bit widths",
                            "    - clk: samsung: exynos990: Replace bogus divs with fixed-factor clocks",
                            "    - copy_sighand: Handle architectures where sizeof(unsigned long) <",
                            "      sizeof(u64)",
                            "    - cpufreq: CPPC: Avoid using CPUFREQ_ETERNAL as transition delay",
                            "    - cpufreq: intel_pstate: Fix object lifecycle issue in",
                            "      update_qos_request()",
                            "    - crypto: aspeed - Fix dma_unmap_sg() direction",
                            "    - crypto: atmel - Fix dma_unmap_sg() direction",
                            "    - crypto: rockchip - Fix dma_unmap_sg() nents value",
                            "    - eventpoll: Replace rwlock with spinlock",
                            "    - fbdev: Fix logic error in \"offb\" name match",
                            "    - fs/ntfs3: Fix a resource leak bug in wnd_extend()",
                            "    - fs: quota: create dedicated workqueue for quota_release_work",
                            "    - fsnotify: pass correct offset to fsnotify_mmap_perm()",
                            "    - fuse: fix possibly missing fuse_copy_finish() call in fuse_notify()",
                            "    - fuse: fix livelock in synchronous file put from fuseblk workers",
                            "    - gpio: mpfs: fix setting gpio direction to output",
                            "    - i3c: Fix default I2C adapter timeout value",
                            "    - iio/adc/pac1934: fix channel disable configuration",
                            "    - iio: dac: ad5360: use int type to store negative error codes",
                            "    - iio: dac: ad5421: use int type to store negative error codes",
                            "    - iio: frequency: adf4350: Fix prescaler usage.",
                            "    - iio: xilinx-ams: Fix AMS_ALARM_THR_DIRECT_MASK",
                            "    - iio: xilinx-ams: Unmask interrupts after updating alarms",
                            "    - init: handle bootloader identifier in kernel parameters",
                            "    - iio: imu: inv_icm42600: Simplify pm_runtime setup",
                            "    - iio: imu: inv_icm42600: Drop redundant pm_runtime reinitialization in",
                            "      resume",
                            "    - iio: imu: inv_icm42600: Avoid configuring if already pm_runtime",
                            "      suspended",
                            "    - iommu/vt-d: PRS isn't usable if PDS isn't supported",
                            "    - ipmi: Rework user message limit handling",
                            "    - ipmi:msghandler:Change seq_lock to a mutex",
                            "    - kernel/sys.c: fix the racy usage of task_lock(tsk->group_leader) in",
                            "      sys_prlimit64() paths",
                            "    - KEYS: trusted_tpm1: Compare HMAC values in constant time",
                            "    - kho: only fill kimage if KHO is finalized",
                            "    - lib/genalloc: fix device leak in of_gen_pool_get()",
                            "    - loop: fix backing file reference leak on validation error",
                            "    - md: fix mssing blktrace bio split events",
                            "    - of: unittest: Fix device reference count leak in",
                            "      of_unittest_pci_node_verify",
                            "    - openat2: don't trigger automounts with RESOLVE_NO_XDEV",
                            "    - padata: Reset next CPU when reorder sequence wraps around",
                            "    - parisc: don't reference obsolete termio struct for TC* constants",
                            "    - parisc: Remove spurious if statement from raw_copy_from_user()",
                            "    - nvme-pci: Add TUXEDO IBS Gen8 to Samsung sleep quirk",
                            "    - pinctrl: samsung: Drop unused S3C24xx driver data",
                            "    - PM: EM: Fix late boot with holes in CPU topology",
                            "    - PM: hibernate: Fix hybrid-sleep",
                            "    - PM: hibernate: Restrict GFP mask in power_down()",
                            "    - power: supply: max77976_charger: fix constant current reporting",
                            "    - powerpc/powernv/pci: Fix underflow and leak issue",
                            "    - powerpc/pseries/msi: Fix potential underflow and leak issue",
                            "    - pwm: berlin: Fix wrong register in suspend/resume",
                            "    - pwm: Fix incorrect variable used in error message",
                            "    - Revert \"ipmi: fix msg stack when IPMI is disconnected\"",
                            "    - sched/deadline: Fix race in push_dl_task()",
                            "    - scsi: hpsa: Fix potential memory leak in hpsa_big_passthru_ioctl()",
                            "    - scsi: sd: Fix build warning in sd_revalidate_disk()",
                            "    - sctp: Fix MAC comparison to be constant-time",
                            "    - smb client: fix bug with newly created file in cached dir",
                            "    - sparc64: fix hugetlb for sun4u",
                            "    - sparc: fix error handling in scan_one_device()",
                            "    - xtensa: simdisk: add input size check in proc_write_simdisk",
                            "    - xsk: Harden userspace-supplied xdp_desc validation",
                            "    - mtd: rawnand: fsmc: Default to autodetect buswidth",
                            "    - mtd: nand: raw: gpmi: fix clocks when CONFIG_PM=N",
                            "    - mmc: core: SPI mode remove cmd7",
                            "    - mmc: mmc_spi: multiple block read remove read crc ack",
                            "    - memory: samsung: exynos-srom: Fix of_iomap leak in exynos_srom_probe",
                            "    - memory: stm32_omm: Fix req2ack update test",
                            "    - rtc: interface: Ensure alarm irq is enabled when UIE is enabled",
                            "    - rtc: interface: Fix long-standing race when setting alarm",
                            "    - rseq/selftests: Use weak symbol reference, not definition, to link with",
                            "      glibc",
                            "    - PCI: xilinx-nwl: Fix ECAM programming",
                            "    - PCI: tegra: Convert struct tegra_msi mask_lock into raw spinlock",
                            "    - PCI/sysfs: Ensure devices are powered for config reads",
                            "    - PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV",
                            "    - PCI/ERR: Fix uevent on failure to recover",
                            "    - PCI/AER: Fix missing uevent on recovery when a reset is requested",
                            "    - PCI/AER: Support errors introduced by PCIe r6.0",
                            "    - PCI: Ensure relaxed tail alignment does not increase min_align",
                            "    - PCI: Fix failure detection during resource resize",
                            "    - PCI: j721e: Fix module autoloading",
                            "    - PCI: j721e: Fix programming sequence of \"strap\" settings",
                            "    - PCI: keystone: Use devm_request_irq() to free \"ks-pcie-error-irq\" on",
                            "      exit",
                            "    - PCI: rcar-gen4: Fix PHY initialization",
                            "    - PCI: rcar-host: Drop PMSR spinlock",
                            "    - PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock",
                            "    - PCI: tegra194: Fix broken tegra_pcie_ep_raise_msi_irq()",
                            "    - PCI: tegra194: Handle errors in BPMP response",
                            "    - PCI: tegra194: Reset BARs when running in PCIe endpoint mode",
                            "    - PCI/pwrctrl: Fix device leak at registration",
                            "    - PCI/pwrctrl: Fix device and OF node leak at bus scan",
                            "    - PCI/pwrctrl: Fix device leak at device stop",
                            "    - spi: cadence-quadspi: Flush posted register writes before INDAC access",
                            "    - spi: cadence-quadspi: Flush posted register writes before DAC access",
                            "    - spi: cadence-quadspi: Fix cqspi_setup_flash()",
                            "    - xfs: use deferred intent items for reaping crosslinked blocks",
                            "    - x86/fred: Remove ENDBR64 from FRED entry points",
                            "    - x86/umip: Check that the instruction opcode is at least two bytes",
                            "    - x86/umip: Fix decoding of register forms of 0F 01 (SGDT and SIDT",
                            "      aliases)",
                            "    - mptcp: pm: in-kernel: usable client side with C-flag",
                            "    - mptcp: reset blackhole on success with non-loopback ifaces",
                            "    - selftests: mptcp: join: validate C-flag + def limit",
                            "    - s390/cio/ioasm: Fix __xsch() condition code handling",
                            "    - s390/dasd: enforce dma_alignment to ensure proper buffer validation",
                            "    - s390/dasd: Return BLK_STS_INVAL for EINVAL from do_dasd_request",
                            "    - s390: Add -Wno-pointer-sign to KBUILD_CFLAGS_DECOMPRESSOR",
                            "    - slab: prevent warnings when slab obj_exts vector allocation fails",
                            "    - slab: mark slab->obj_exts allocation failures unconditionally",
                            "    - wifi: ath11k: HAL SRNG: don't deinitialize and re-initialize again",
                            "    - wifi: iwlwifi: Fix dentry reference leak in iwl_mld_add_link_debugfs",
                            "    - wifi: rtw89: avoid possible TX wait initialization race",
                            "    - wifi: mt76: mt7925u: Add VID/PID for Netgear A9000",
                            "    - wifi: mt76: mt7921u: Add VID/PID for Netgear A7500",
                            "    - mm/thp: fix MTE tag mismatch when replacing zero-filled subpages",
                            "    - mm/rmap: fix soft-dirty and uffd-wp bit loss when remapping zero-filled",
                            "      mTHP subpage to shared zeropage",
                            "    - mm/page_alloc: only set ALLOC_HIGHATOMIC for __GPF_HIGH allocations",
                            "    - mm/hugetlb: early exit from hugetlb_pages_alloc_boot() when",
                            "      max_huge_pages=0",
                            "    - mm/damon/vaddr: do not repeat pte_offset_map_lock() until success",
                            "    - mm/damon/lru_sort: use param_ctx for damon_attrs staging",
                            "    - nfsd: decouple the xprtsec policy check from check_nfsd_access()",
                            "    - NFSD: Fix destination buffer size in nfsd4_ssc_setup_dul()",
                            "    - nfsd: nfserr_jukebox in nlm_fopen should lead to a retry",
                            "    - media: iris: Call correct power off callback in cleanup path",
                            "    - media: iris: Fix firmware reference leak and unmap memory after load",
                            "    - media: iris: fix module removal if firmware download failed",
                            "    - media: iris: vpu3x: Add MNoC low power handshake during hardware power-",
                            "      off",
                            "    - media: iris: Fix port streaming handling",
                            "    - media: iris: Fix buffer count reporting in internal buffer check",
                            "    - media: iris: Allow substate transition to load resources during output",
                            "      streaming",
                            "    - media: iris: Always destroy internal buffers on firmware release",
                            "      response",
                            "    - media: iris: Simplify session stop logic by relying on vb2 checks",
                            "    - media: iris: Update vbuf flags before v4l2_m2m_buf_done",
                            "    - media: iris: Send dummy buffer address for all codecs during drain",
                            "    - media: iris: Fix missing LAST flag handling during drain",
                            "    - media: iris: Fix format check for CAPTURE plane in try_fmt",
                            "    - media: iris: Allow stop on firmware only if start was issued.",
                            "    - ext4: add ext4_sb_bread_nofail() helper function for",
                            "      ext4_free_branches()",
                            "    - ext4: fail unaligned direct IO write with EINVAL",
                            "    - ext4: verify orphan file size is not too big",
                            "    - ext4: increase i_disksize to offset + len in",
                            "      ext4_update_disksize_before_punch()",
                            "    - ext4: correctly handle queries for metadata mappings",
                            "    - ext4: avoid potential buffer over-read in parse_apply_sb_mount_options()",
                            "    - ext4: fix an off-by-one issue during moving extents",
                            "    - ext4: guard against EA inode refcount underflow in xattr update",
                            "    - ext4: validate ea_ino and size in check_xattrs",
                            "    - ACPICA: Allow to skip Global Lock initialization",
                            "    - ext4: free orphan info with kvfree",
                            "    - ipmi: Fix handling of messages with provided receive message pointer",
                            "    - Squashfs: add additional inode sanity checking",
                            "    - Squashfs: reject negative file sizes in squashfs_read_inode()",
                            "    - mm/ksm: fix incorrect KSM counter handling in mm_struct during fork",
                            "    - media: mc: Clear minor number before put device",
                            "    - arm64: dts: qcom: qcs615: add missing dt property in QUP SEs",
                            "    - ACPI: property: Disregard references in data-only subnode lists",
                            "    - ACPI: property: Add code comments explaining what is going on",
                            "    - ACPI: property: Do not pass NULL handles to acpi_attach_data()",
                            "    - irqchip/sifive-plic: Avoid interrupt ID 0 handling during suspend/resume",
                            "    - copy_file_range: limit size if in compat mode",
                            "    - minixfs: Verify inode mode when loading from disk",
                            "    - pid: Add a judgment for ns null in pid_nr_ns",
                            "    - fs: Add 'initramfs_options' to set initramfs mount options",
                            "    - cramfs: Verify inode mode when loading from disk",
                            "    - nsfs: validate extensible ioctls",
                            "    - mnt_ns_tree_remove(): DTRT if mnt_ns had never been added to mnt_ns_list",
                            "    - writeback: Avoid softlockup when switching many inodes",
                            "    - writeback: Avoid excessively long inode switching times",
                            "    - iomap: error out on file IO when there is no inline_data buffer",
                            "    - pidfs: validate extensible ioctls",
                            "    - mount: handle NULL values in mnt_ns_release()",
                            "    - Linux 6.17.4",
                            "  * Questing update: v6.17.4 upstream stable release (LP: #2131259) // Race",
                            "    condition in perf build causes build failure due to missing unistd_64.h",
                            "    header on arm64 (LP: #2131702)",
                            "    - perf tools: Fix arm64 libjvmti build by generating unistd_64.h",
                            "  * Questing update: v6.17.3 upstream stable release (LP: #2129610)",
                            "    - arch: copy_thread: pass clone_flags as u64",
                            "    - filelock: add FL_RECLAIM to show_fl_flags() macro",
                            "    - init: INITRAMFS_PRESERVE_MTIME should depend on BLK_DEV_INITRD",
                            "    - pid: use ns_capable_noaudit() when determining net sysctl permissions",
                            "    - Fix CC_HAS_ASM_GOTO_OUTPUT on non-x86 architectures",
                            "    - [Config]: Update CC configs for v6.17.3",
                            "    - seccomp: Fix a race with WAIT_KILLABLE_RECV if the tracer replies too",
                            "      fast",
                            "    - kbuild: Add missing $(objtree) prefix to powerpc crtsavres.o artifact",
                            "    - selftests: arm64: Check fread return value in exec_target",
                            "    - selftests: arm64: Fix -Waddress warning in tpidr2 test",
                            "    - kselftest/arm64/gcs: Correctly check return value when disabling GCS",
                            "    - hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()",
                            "    - gfs2: Fix GLF_INVALIDATE_IN_PROGRESS flag clearing in do_xmote",
                            "    - gfs2: Remove space before newline",
                            "    - gfs2: Further sanitize lock_dlm.c",
                            "    - gfs2: Fix LM_FLAG_TRY* logic in add_to_queue",
                            "    - gfs2: Remove duplicate check in do_xmote",
                            "    - gfs2: Get rid of GLF_INVALIDATE_IN_PROGRESS",
                            "    - gfs2: do_xmote cleanup",
                            "    - gfs2: Add proper lockspace locking",
                            "    - powerpc/8xx: Remove left-over instruction and comments in",
                            "      DataStoreTLBMiss handler",
                            "    - powerpc/603: Really copy kernel PGD entries into all PGDIRs",
                            "    - powerpc/ftrace: ensure ftrace record ops are always set for NOPs",
                            "    - powerpc64/modules: correctly iterate over stubs in",
                            "      setup_ftrace_ool_stubs",
                            "    - uprobes: uprobe_warn should use passed task",
                            "    - raid6: riscv: Clean up unused header file inclusion",
                            "    - coresight: trbe: Prevent overflow in PERF_IDX2OFF()",
                            "    - perf: arm_spe: Prevent overflow in PERF_IDX2OFF()",
                            "    - erofs: avoid reading more for fragment maps",
                            "    - smb: client: fix sending the iwrap custom IRD/ORD negotiation messages",
                            "    - smb: server: fix IRD/ORD negotiation with the client",
                            "    - perf/x86/intel: Use early_initcall() to hook bts_init()",
                            "    - perf/x86/intel: Fix IA32_PMC_x_CFG_B MSRs access error",
                            "    - x86/vdso: Fix output operand size of RDPID",
                            "    - selftests: cgroup: Make test_pids backwards compatible",
                            "    - sched/fair: Get rid of sched_domains_curr_level hack for tl->cpumask()",
                            "    - [Config]: Update CONFIG_SCHED_MC for v6.17.3",
                            "    - lsm: CONFIG_LSM can depend on CONFIG_SECURITY",
                            "    - cpuset: fix failure to enable isolated partition when containing",
                            "      isolcpus",
                            "    - btrfs: return any hit error from extent_writepage_io()",
                            "    - btrfs: fix symbolic link reading when bs > ps",
                            "    - pinctrl: renesas: rzg2l: Fix invalid unsigned return in rzg3s_oen_read()",
                            "    - arm64: dts: renesas: rzg2lc-smarc: Disable CAN-FD channel0",
                            "    - bpf: Tidy verifier bug message",
                            "    - regmap: Remove superfluous check for !config in __regmap_init()",
                            "    - selftests/bpf: Copy test_kmods when installing selftest",
                            "    - rust: cpumask: Mark CpumaskVar as transparent",
                            "    - bpf/selftests: Fix test_tcpnotify_user",
                            "    - bpf: Remove migrate_disable in kprobe_multi_link_prog_run",
                            "    - libbpf: Fix reuse of DEVMAP",
                            "    - tools/nolibc: fix error return value of clock_nanosleep()",
                            "    - ARM: dts: renesas: porter: Fix CAN pin group",
                            "    - leds: max77705: Function return instead of variable assignment",
                            "    - leds: flash: leds-qcom-flash: Update torch current clamp setting",
                            "    - s390/bpf: Do not write tail call counter into helper and kfunc frames",
                            "    - s390/bpf: Write back tail call counter for BPF_PSEUDO_CALL",
                            "    - s390/bpf: Write back tail call counter for BPF_TRAMP_F_CALL_ORIG",
                            "    - cpufreq: scmi: Account for malformed DT in scmi_dev_used_by_cpus()",
                            "    - arm64: dts: renesas: sparrow-hawk: Invert microSD voltage selector on",
                            "      EVTB1",
                            "    - arm64: dts: renesas: sparrow-hawk: Set VDDQ18_25_AVB voltage on EVTB1",
                            "    - libbpf: Export bpf_object__prepare symbol",
                            "    - firmware: arm_scmi: Mark VirtIO ready before registering",
                            "      scmi_virtio_driver",
                            "    - arm64: dts: imx93-kontron: Fix GPIO for panel regulator",
                            "    - arm64: dts: imx93-kontron: Fix USB port assignment",
                            "    - arm64: dts: imx95: Correct the lpuart7 and lpuart8 srcid",
                            "    - bpf: Remove preempt_disable in bpf_try_get_buffers",
                            "    - ACPI: processor: idle: Fix memory leak when register cpuidle device",
                            "      failed",
                            "    - genirq: Add irq_chip_(startup/shutdown)_parent()",
                            "    - PCI/MSI: Add startup/shutdown for per device domains",
                            "    - irqchip/sg2042-msi: Fix broken affinity setting",
                            "    - scripts/misc-check: update export checks for EXPORT_SYMBOL_FOR_MODULES()",
                            "    - soc: qcom: rpmh-rsc: Unconditionally clear _TRIGGER bit for TCS",
                            "    - pinctrl: meson-gxl: add missing i2c_d pinmux",
                            "    - blk-mq: check kobject state_in_sysfs before deleting in",
                            "      blk_mq_unregister_hctx",
                            "    - selftests/futex: Remove the -g parameter from futex_priv_hash",
                            "    - ARM: at91: pm: fix MCKx restore routine",
                            "    - arm64: dts: apple: t8103-j457: Fix PCIe ethernet iommu-map",
                            "    - regulator: scmi: Use int type to store negative error codes",
                            "    - selftests/futex: Fix some futex_numa_mpol subtests",
                            "    - tools/nolibc: avoid error in dup2() if old fd equals new fd",
                            "    - selftests/nolibc: fix EXPECT_NZ macro",
                            "    - leds: leds-lp55xx: Use correct address for memory programming",
                            "    - PCI/MSI: Check MSI_FLAG_PCI_MSI_MASK_PARENT in",
                            "      cond_[startup|shutdown]_parent()",
                            "    - block: use int to store blk_stack_limits() return value",
                            "    - ARM: dts: stm32: stm32mp151c-plyaqm: Use correct dai-format property",
                            "    - dt-bindings: vendor-prefixes: Add undocumented vendor prefixes",
                            "    - genirq/test: Fix depth tests on architectures with NOREQUEST by default.",
                            "    - genirq/test: Select IRQ_DOMAIN",
                            "    - genirq/test: Depend on SPARSE_IRQ",
                            "    - genirq/test: Drop CONFIG_GENERIC_IRQ_MIGRATION assumptions",
                            "    - genirq/test: Ensure CPU 1 is online for hotplug test",
                            "    - selftests/bpf: Fix count write in testapp_xdp_metadata_copy()",
                            "    - vdso/datastore: Gate time data behind CONFIG_GENERIC_GETTIMEOFDAY",
                            "    - PM: sleep: core: Clear power.must_resume in noirq suspend error path",
                            "    - blk-mq: fix elevator depth_updated method",
                            "    - vdso: Add struct __kernel_old_timeval forward declaration to gettime.h",
                            "    - ARM: dts: ti: omap: am335x-baltos: Fix ti,en-ck32k-xtal property in DTS",
                            "      to use correct boolean syntax",
                            "    - ARM: dts: ti: omap: omap3-devkit8000-lcd: Fix ti,keep-vref-on property",
                            "      to use correct boolean syntax in DTS",
                            "    - ARM: dts: omap: am335x-cm-t335: Remove unused mcasp num-serializer",
                            "      property",
                            "    - PM / devfreq: mtk-cci: Fix potential error pointer dereference in",
                            "      probe()",
                            "    - power: supply: cw2015: Fix a alignment coding style issue",
                            "    - hwmon: (asus-ec-sensors) Narrow lock for X870E-CREATOR WIFI",
                            "    - pinctrl: renesas: Use int type to store negative error codes",
                            "    - pinctrl: eswin: Fix regulator error check and Kconfig dependency",
                            "    - null_blk: Fix the description of the cache_size module argument",
                            "    - blk-throttle: fix access race during throttle policy activation",
                            "    - selftests: vDSO: Fix -Wunitialized in powerpc VDSO_CALL() wrapper",
                            "    - selftests: vDSO: vdso_test_abi: Correctly skip whole test with missing",
                            "      vDSO",
                            "    - irqchip/gic-v5: Fix loop in gicv5_its_create_itt_two_level() cleanup",
                            "      path",
                            "    - irqchip/gic-v5: Fix error handling in gicv5_its_irq_domain_alloc()",
                            "    - tick: Do not set device to detached state in tick_shutdown()",
                            "    - arm64: dts: mediatek: mt8195: Remove suspend-breaking reset from pcie0",
                            "    - arm64: dts: mediatek: mt8183: Fix out of range pull values",
                            "    - nbd: restrict sockets to TCP and UDP",
                            "    - PM / devfreq: rockchip-dfi: double count on RK3588",
                            "    - firmware: firmware: meson-sm: fix compile-test default",
                            "    - dts: arm: amlogic: fix pwm node for c3",
                            "    - soc: mediatek: mtk-svs: fix device leaks on mt8183 probe failure",
                            "    - soc: mediatek: mtk-svs: fix device leaks on mt8192 probe failure",
                            "    - cpuidle: qcom-spm: fix device and OF node leaks at probe",
                            "    - block: cleanup bio_issue",
                            "    - block: initialize bio issue time in blk_mq_submit_bio()",
                            "    - block: factor out a helper bio_submit_split_bioset()",
                            "    - block: skip unnecessary checks for split bio",
                            "    - block: fix ordering of recursive split IO",
                            "    - blk-mq: remove useless checkings in blk_mq_update_nr_requests()",
                            "    - blk-mq: check invalid nr_requests in queue_requests_store()",
                            "    - blk-mq: convert to serialize updating nr_requests with",
                            "      update_nr_hwq_lock",
                            "    - blk-mq: cleanup shared tags case in blk_mq_update_nr_requests()",
                            "    - blk-mq: split bitmap grow and resize case in blk_mq_update_nr_requests()",
                            "    - blk-mq-sched: add new parameter nr_requests in blk_mq_alloc_sched_tags()",
                            "    - blk-mq: fix potential deadlock while nr_requests grown",
                            "    - arm64: dts: allwinner: a527: cubie-a5e: Add ethernet PHY reset setting",
                            "    - arm64: dts: allwinner: t527: avaota-a1: Add ethernet PHY reset setting",
                            "    - arm64: dts: rockchip: Add RTC on rk3576-evb1-v10",
                            "    - arm64: dts: rockchip: Add WiFi on rk3576-evb1-v10",
                            "    - arm64: dts: rockchip: Fix network on rk3576 evb1 board",
                            "    - arm64: dts: ti: k3-j742s2-mcu-wakeup: Override firmware-name for MCU R5F",
                            "      cores",
                            "    - arm64: dts: ti: k3: Rename rproc reserved-mem nodes to 'memory@addr'",
                            "    - Revert \"arm64: dts: ti: k3-j721e-sk: Fix reversed C6x carveout",
                            "      locations\"",
                            "    - Revert \"arm64: dts: ti: k3-j721e-beagleboneai64: Fix reversed C6x",
                            "      carveout locations\"",
                            "    - arm64: dts: mediatek: mt8188: Change efuse fallback compatible to mt8186",
                            "    - arm64: dts: mediatek: mt8186-tentacruel: Fix touchscreen model",
                            "    - arm64: dts: ti: k3-pinctrl: Fix the bug in existing macros",
                            "    - arm64: dts: renesas: r9a09g047e57-smarc: Fix gpio key's pin control node",
                            "    - arm64: dts: mediatek: mt6331: Fix pmic, regulators, rtc, keys node names",
                            "    - mmc: core: Fix variable shadowing in mmc_route_rpmb_frames()",
                            "    - arm64: dts: mediatek: mt6795-xperia-m5: Fix mmc0 latch-ck value",
                            "    - arm64: dts: mediatek: mt7986a: Fix PCI-Express T-PHY node address",
                            "    - arm64: dts: mediatek: mt8395-kontron-i1200: Fix MT6360 regulator nodes",
                            "    - arm64: dts: mediatek: mt8516-pumpkin: Fix machine compatible",
                            "    - arm64: dts: allwinner: a527: cubie-a5e: Add LEDs",
                            "    - arm64: dts: allwinner: a527: cubie-a5e: Drop external 32.768 KHz crystal",
                            "    - arm64: dts: allwinner: t527: avaota-a1: hook up external 32k crystal",
                            "    - arm64: dts: allwinner: t527: orangepi-4a: hook up external 32k crystal",
                            "    - pwm: tiehrpwm: Don't drop runtime PM reference in .free()",
                            "    - pwm: tiehrpwm: Make code comment in .free() more useful",
                            "    - pwm: tiehrpwm: Fix various off-by-one errors in duty-cycle calculation",
                            "    - pwm: tiehrpwm: Fix corner case in clock divisor calculation",
                            "    - ACPICA: Apply ACPI_NONSTRING",
                            "    - ACPICA: Fix largest possible resource descriptor index",
                            "    - riscv, bpf: Sign extend struct ops return values properly",
                            "    - nvme-auth: update bi_directional flag",
                            "    - nvmet-fc: move lsop put work to nvmet_fc_ls_req_op",
                            "    - nvmet-fcloop: call done callback even when remote port is gone",
                            "    - nvme-tcp: send only permitted commands for secure concat",
                            "    - i3c: master: svc: Use manual response for IBI events",
                            "    - i3c: master: svc: Recycle unused IBI slot",
                            "    - block: update validation of atomic writes boundary for stacked devices",
                            "    - block: fix stacking of atomic writes when atomics are not supported",
                            "    - selftests: watchdog: skip ping loop if WDIOF_KEEPALIVEPING not supported",
                            "    - selftests/kselftest_harness: Add harness-selftest.expected to TEST_FILES",
                            "    - blk-throttle: fix throtl_data leak during disk release",
                            "    - bpf: Explicitly check accesses to bpf_sock_addr",
                            "    - mmc: select REGMAP_MMIO with MMC_LOONGSON2",
                            "    - selftests/futex: Fix futex_wait() for 32bit ARM",
                            "    - selftest/futex: Make the error check more precise for futex_numa_mpol",
                            "    - selftest/futex: Compile also with libnuma < 2.0.16",
                            "    - bpf: dont report verifier bug for missing bpf_scc_visit on speculative",
                            "      path",
                            "    - bpf, arm64: Call bpf_jit_binary_pack_finalize() in bpf_jit_free()",
                            "    - arm64: dts: apple: t600x: Add missing WiFi properties",
                            "    - arm64: dts: apple: t600x: Add bluetooth device nodes",
                            "    - arm64: dts: apple: Add ethernet0 alias for J375 template",
                            "    - selftests: always install UAPI headers to the correct directory",
                            "    - smp: Fix up and expand the smp_call_function_many() kerneldoc",
                            "    - mfd: max77705: max77705_charger: move active discharge setting to mfd",
                            "      parent",
                            "    - power: supply: max77705_charger: refactoring: rename charger to chg",
                            "    - power: supply: max77705_charger: use regfields for config registers",
                            "    - power: supply: max77705_charger: rework interrupts",
                            "    - tools/nolibc: make time_t robust if __kernel_old_time_t is missing in",
                            "      host headers",
                            "    - spi: fix return code when spi device has too many chipselects",
                            "    - clocksource/drivers/timer-tegra186: Avoid 64-bit divide operation",
                            "    - clocksource/drivers/tegra186: Avoid 64-bit division",
                            "    - bpf: Mark kfuncs as __noclone",
                            "    - once: fix race by moving DO_ONCE to separate section",
                            "    - hwmon: (mlxreg-fan) Separate methods of fan setting coming from",
                            "      different subsystems",
                            "    - tools/nolibc: add stdbool.h to nolibc includes",
                            "    - thermal/drivers/qcom: Make LMH select QCOM_SCM",
                            "    - thermal/drivers/qcom/lmh: Add missing IRQ includes",
                            "    - i2c: mediatek: fix potential incorrect use of I2C_MASTER_WRRD",
                            "    - i2c: spacemit: ensure bus release check runs when wait_bus_idle() fails",
                            "    - i2c: spacemit: remove stop function to avoid bus error",
                            "    - i2c: spacemit: disable SDA glitch fix to avoid restart delay",
                            "    - i2c: spacemit: check SDA instead of SCL after bus reset",
                            "    - i2c: spacemit: ensure SDA is released after bus reset",
                            "    - i2c: designware: Fix clock issue when PM is disabled",
                            "    - i2c: designware: Add disabling clocks when probe fails",
                            "    - libbpf: Fix error when st-prefix_ops and ops from differ btf",
                            "    - bpf: Enforce expected_attach_type for tailcall compatibility",
                            "    - i3c: fix big-endian FIFO transfers",
                            "    - mfd: max77705: Setup the core driver as an interrupt controller",
                            "    - drm/sched: Fix a race in DRM_GPU_SCHED_STAT_NO_HANG test",
                            "    - drm/panel-edp: Add disable to 100ms for MNB601LS1-4",
                            "    - drm/display: bridge-connector: correct CEC bridge pointers in",
                            "      drm_bridge_connector_init",
                            "    - drm/panel-edp: Add 50ms disable delay for four panels",
                            "    - drm/vmwgfx: fix missing assignment to ts",
                            "    - drm/amd/display: Reduce Stack Usage by moving 'audio_output' into",
                            "      'stream_res' v4",
                            "    - drm/panel: novatek-nt35560: Fix invalid return value",
                            "    - drm/amdgpu: fix link error for !PM_SLEEP",
                            "    - drm/amdgpu: Fix jpeg v4.0.3 poison irq call trace on sriov guest",
                            "    - drm/amdgpu: Fix vcn v4.0.3 poison irq call trace on sriov guest",
                            "    - PCI: endpoint: pci-ep-msi: Fix NULL vs IS_ERR() check in",
                            "      pci_epf_write_msi_msg()",
                            "    - PCI: xgene-msi: Return negative -EINVAL in xgene_msi_handler_setup()",
                            "    - drm/radeon/r600_cs: clean up of dead code in r600_cs",
                            "    - f2fs: fix condition in __allow_reserved_blocks()",
                            "    - f2fs: fix to avoid overflow while left shift operation",
                            "    - f2fs: fix to zero data after EOF for compressed file correctly",
                            "    - drm/bridge: it6505: select REGMAP_I2C",
                            "    - wifi: rtw88: Lock rtwdev->mutex before setting the LED",
                            "    - HID: steelseries: refactor probe() and remove()",
                            "    - media: zoran: Remove zoran_fh structure",
                            "    - phy: rockchip: naneng-combphy: Enable U3 OTG port for RK3568",
                            "    - drm/bridge: cdns-dsi: Fix the _atomic_check()",
                            "    - usb: host: max3421-hcd: Fix error pointer dereference in probe cleanup",
                            "    - usb: misc: qcom_eud: Access EUD_MODE_MANAGER2 through secure calls",
                            "    - PCI/pwrctrl: Fix double cleanup on devm_add_action_or_reset() failure",
                            "    - misc: pci_endpoint_test: Fix array underflow in",
                            "      pci_endpoint_test_ioctl()",
                            "    - serial: max310x: Add error checking in probe()",
                            "    - drm/amd/display: Remove redundant semicolons",
                            "    - drm/amd/display: Add NULL pointer checks in dc_stream cursor attribute",
                            "      functions",
                            "    - crypto: keembay - Add missing check after sg_nents_for_len()",
                            "    - hwrng: nomadik - add ARM_AMBA dependency",
                            "    - docs: iio: ad3552r: Fix malformed code-block directive",
                            "    - fwctl/mlx5: Fix memory alloc/free in mlx5ctl_fw_rpc()",
                            "    - scsi: pm80xx: Restore support for expanders",
                            "    - scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod",
                            "    - scsi: libsas: Add dev_parent_is_expander() helper",
                            "    - scsi: pm80xx: Use dev_parent_is_expander() helper",
                            "    - scsi: pm80xx: Add helper function to get the local phy id",
                            "    - scsi: pm80xx: Fix pm8001_abort_task() for chip_8006 when using an",
                            "      expander",
                            "    - mptcp: Fix up subflow's memcg when CONFIG_SOCK_CGROUP_DATA=n.",
                            "    - scsi: myrs: Fix dma_alloc_coherent() error check",
                            "    - f2fs: fix to clear unusable_cap for checkpoint=enable",
                            "    - f2fs: fix to avoid NULL pointer dereference in",
                            "      f2fs_check_quota_consistency()",
                            "    - f2fs: fix to allow removing qf_name",
                            "    - Revert \"UBUNTU: SAUCE: drm/dp: drm_edp_backlight_set_level: do not",
                            "      always send 3-byte commands\"",
                            "    - drm/dp: drm_edp_backlight_set_level: do not always send 3-byte commands",
                            "    - crypto: octeontx2 - Call strscpy() with correct size argument",
                            "    - drm: re-allow no-op changes on non-primary planes in async flips",
                            "    - media: rj54n1cb0c: Fix memleak in rj54n1_probe()",
                            "    - media: staging/ipu7: convert to use pci_alloc_irq_vectors() API",
                            "    - media: staging/ipu7: Don't set name for IPU7 PCI device",
                            "    - media: staging/ipu7: cleanup the MMU correctly in IPU7 driver release",
                            "    - media: i2c: vd55g1: Fix duster register address",
                            "    - drm/panel: Allow powering on panel follower after panel is enabled",
                            "    - HID: i2c-hid: Make elan touch controllers power on after panel is",
                            "      enabled",
                            "    - RDMA/mlx5: Better estimate max_qp_wr to reflect WQE count",
                            "    - RDMA/mlx5: Fix vport loopback forcing for MPV device",
                            "    - wifi: rtw88: Use led->brightness_set_blocking for PCI too",
                            "    - net: phy: introduce phy_id_compare_vendor() PHY ID helper",
                            "    - net: phy: as21xxx: better handle PHY HW reset on soft-reboot",
                            "    - PCI: rcar-host: Pass proper IRQ domain to generic_handle_domain_irq()",
                            "    - fuse: remove unneeded offset assignment when filling write pages",
                            "    - PCI: qcom: Restrict port parsing only to PCIe bridge child nodes",
                            "    - cdx: don't select CONFIG_GENERIC_MSI_IRQ",
                            "    - PCI/ACPI: Fix pci_acpi_preserve_config() memory leak",
                            "    - HID: i2c-hid: Fix test in i2c_hid_core_register_panel_follower()",
                            "    - ALSA: lx_core: use int type to store negative error codes",
                            "    - media: st-delta: avoid excessive stack usage",
                            "    - drm/amdgpu/vcn: Add regdump helper functions",
                            "    - drm/amdgpu/vcn: Hold pg_lock before vcn power off",
                            "    - drm/amdgpu: Check vcn state before profile switch",
                            "    - accel/amdxdna: Use int instead of u32 to store error codes",
                            "    - efi: Explain OVMF acronym in OVMF_DEBUG_LOG help text",
                            "    - net: dst: introduce dst->dev_rcu",
                            "    - ipv6: mcast: Add ip6_mc_find_idev() helper",
                            "    - ipv6: start using dst_dev_rcu()",
                            "    - ipv6: use RCU in ip6_xmit()",
                            "    - ipv6: use RCU in ip6_output()",
                            "    - net: use dst_dev_rcu() in sk_setup_caps()",
                            "    - tcp_metrics: use dst_dev_net_rcu()",
                            "    - ipv4: start using dst_dev_rcu()",
                            "    - crypto: hisilicon/zip - remove unnecessary validation for high-",
                            "      performance mode configurations",
                            "    - crypto: hisilicon - re-enable address prefetch after device resuming",
                            "    - crypto: hisilicon - check the sva module status while enabling or",
                            "      disabling address prefetch",
                            "    - crypto: hisilicon/qm - check whether the input function and PF are on",
                            "      the same device",
                            "    - crypto: hisilicon/qm - request reserved interrupt for virtual function",
                            "    - inet: ping: check sock_net() in ping_get_port() and ping_lookup()",
                            "    - dmaengine: Fix dma_async_tx_descriptor->tx_submit documentation",
                            "    - coresight: trbe: Add ISB after TRBLIMITR write",
                            "    - coresight: Fix missing include for FIELD_GET",
                            "    - coresight: Only register perf symlink for sinks with alloc_buffer",
                            "    - drm/amdgpu: Power up UVD 3 for FW validation (v2)",
                            "    - drm/amd/pm: Disable ULV even if unsupported (v3)",
                            "    - drm/amd/pm: Fix si_upload_smc_data (v3)",
                            "    - drm/amd/pm: Adjust si_upload_smc_data register programming (v3)",
                            "    - drm/amd/pm: Treat zero vblank time as too short in si_dpm (v3)",
                            "    - drm/amd/pm: Disable MCLK switching with non-DC at 120 Hz+ (v2)",
                            "    - drm/amd/pm: Disable SCLK switching on Oland with high pixel clocks (v3)",
                            "    - wifi: mac80211: Make CONNECTION_MONITOR optional for MLO sta",
                            "    - wifi: mwifiex: send world regulatory domain to driver",
                            "    - wifi: brcmfmac: fix 43752 SDIO FWVID incorrectly labelled as Cypress",
                            "      (CYW)",
                            "    - drm/msm: Do not validate SSPP when it is not ready",
                            "    - PCI: tegra: Fix devm_kcalloc() argument order for port->phys allocation",
                            "    - wifi: mac80211: consider links for validating SCAN_FLAG_AP in scan",
                            "      request during MLO",
                            "    - PCI: qcom: Add equalization settings for 8.0 GT/s and 32.0 GT/s",
                            "    - tcp: fix __tcp_close() to only send RST when required",
                            "    - fanotify: Validate the return value of mnt_ns_from_dentry() before",
                            "      dereferencing",
                            "    - drm/amdkfd: Fix error code sign for EINVAL in svm_ioctl()",
                            "    - usb: phy: twl6030: Fix incorrect type for ret",
                            "    - usb: gadget: configfs: Correctly set use_os_string at bind",
                            "    - tty: n_gsm: Don't block input queue by waiting MSC",
                            "    - misc: genwqe: Fix incorrect cmd field being reported in error",
                            "    - pps: fix warning in pps_register_cdev when register device fail",
                            "    - drm/msm: Fix obj leak in VM_BIND error path",
                            "    - drm/msm: Fix missing VM_BIND offset/range validation",
                            "    - wifi: iwlwifi: Remove redundant header files",
                            "    - drm/msm/mdp4: stop supporting no-IOMMU configuration",
                            "    - drm/msm: stop supporting no-IOMMU configuration",
                            "    - idpf: fix Rx descriptor ready check barrier in splitq",
                            "    - ASoC: Intel: bytcht_es8316: Fix invalid quirk input mapping",
                            "    - ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping",
                            "    - ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping",
                            "    - ipv6: snmp: do not use SNMP_MIB_SENTINEL anymore",
                            "    - ipv6: snmp: do not track per idev ICMP6_MIB_RATELIMITHOST",
                            "    - drm/msm: Fix bootup splat with separate_gpu_drm modparam",
                            "    - drm/msm/dpu: fix incorrect type for ret",
                            "    - wifi: mac80211: fix reporting of all valid links in sta_set_sinfo()",
                            "    - fs: ntfs3: Fix integer overflow in run_unpack()",
                            "    - fs/ntfs3: reject index allocation if $BITMAP is empty but blocks exist",
                            "    - iio: consumers: Fix handling of negative channel scale in",
                            "      iio_convert_raw_to_processed()",
                            "    - iio: consumers: Fix offset handling in iio_convert_raw_to_processed()",
                            "    - mm/slub: Fix cmp_loc_by_count() to return 0 when counts are equal",
                            "    - tools: ynl: fix undefined variable name",
                            "    - RDMA/mlx5: Fix page size bitmap calculation for KSM mode",
                            "    - netfilter: ipset: Remove unused htable_bits in macro ahash_region",
                            "    - ipvs: Use READ_ONCE/WRITE_ONCE for ipvs->enable",
                            "    - HID: steelseries: Fix STEELSERIES_SRWS1 handling in steelseries_remove()",
                            "    - watchdog: intel_oc_wdt: Do not try to write into const memory",
                            "    - watchdog: mpc8xxx_wdt: Reload the watchdog timer when enabling the",
                            "      watchdog",
                            "    - PCI: endpoint: pci-epf-test: Fix doorbell test support",
                            "    - drivers/base/node: handle error properly in register_one_node()",
                            "    - RDMA/cm: Rate limit destroy CM ID timeout error message",
                            "    - wifi: mt76: mt7996: Fix mt7996_mcu_sta_ba wcid configuration",
                            "    - wifi: mt76: mt7996: Fix mt7996_mcu_bss_mld_tlv routine",
                            "    - wifi: mt76: fix potential memory leak in mt76_wmac_probe()",
                            "    - wifi: mt76: mt7996: Use proper link_id in link_sta_rc_update callback",
                            "    - wifi: mt76: mt7996: Check phy before init msta_link in",
                            "      mt7996_mac_sta_add_links()",
                            "    - wifi: mt76: mt7996: Fix tx-queues initialization for second phy on",
                            "      mt7996",
                            "    - wifi: mt76: mt7996: Fix RX packets configuration for primary WED device",
                            "    - wifi: mt76: mt7996: Convert mt7996_wed_rro_addr to LE",
                            "    - wifi: mt76: mt7915: fix mt7981 pre-calibration",
                            "    - wifi: mt76: mt7996: remove redundant per-phy mac80211 calls during",
                            "      restart",
                            "    - ASoC: Intel: hda-sdw-bpt: set persistent_buffer false",
                            "    - srcu/tiny: Remove preempt_disable/enable() in srcu_gp_start_if_needed()",
                            "    - drm/amdgpu: Fix allocating extra dwords for rings (v2)",
                            "    - f2fs: fix to update map->m_next_extent correctly in f2fs_map_blocks()",
                            "    - f2fs: fix to truncate first page in error path of f2fs_truncate()",
                            "    - f2fs: fix to avoid migrating empty section",
                            "    - f2fs: fix to mitigate overhead of f2fs_zero_post_eof_page()",
                            "    - RISC-V: KVM: Write hgatp register with valid mode bits",
                            "    - ALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on",
                            "      PREEMPT_RT",
                            "    - ACPI: NFIT: Fix incorrect ndr_desc being reportedin dev_err message",
                            "    - scsi: qla2xxx: edif: Fix incorrect sign of error code",
                            "    - scsi: qla2xxx: Fix incorrect sign of error code in START_SP_W_RETRIES()",
                            "    - scsi: qla2xxx: Fix incorrect sign of error code in qla_nvme_xmt_ls_rsp()",
                            "    - HID: hidraw: tighten ioctl command parsing",
                            "    - f2fs: fix zero-sized extent for precache extents",
                            "    - smc: Fix use-after-free in __pnet_find_base_ndev().",
                            "    - smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().",
                            "    - smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().",
                            "    - smc: Use __sk_dst_get() and dst_dev_rcu() in smc_vlan_by_tcpsk().",
                            "    - tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().",
                            "    - mptcp: Call dst_release() in mptcp_active_enable().",
                            "    - mptcp: Use __sk_dst_get() and dst_dev_rcu() in mptcp_active_enable().",
                            "    - Revert \"usb: xhci: Avoid Stop Endpoint retry loop if the endpoint seems",
                            "      Running\"",
                            "    - RDMA/core: Resolve MAC of next-hop device without ARP support",
                            "    - IB/sa: Fix sa_local_svc_timeout_ms read race",
                            "    - Documentation: trace: historgram-design: Separate sched_waking histogram",
                            "      section heading and the following diagram",
                            "    - ASoC: SOF: ipc4-pcm: Fix incorrect comparison with number of tdm_slots",
                            "    - wifi: ath12k: initialize eirp_power before use",
                            "    - wifi: ath12k: fix overflow warning on num_pwr_levels",
                            "    - wifi: ath12k: fix signal in radiotap for WCN7850",
                            "    - wifi: ath12k: fix HAL_PHYRX_COMMON_USER_INFO handling in monitor mode",
                            "    - wifi: ath12k: fix the fetching of combined rssi",
                            "    - wifi: ath12k: Add fallback for invalid channel number in PHY metadata",
                            "    - wifi: ath12k: fix wrong logging ID used for CE",
                            "    - wifi: ath10k: avoid unnecessary wait for service ready message",
                            "    - iommu/vt-d: debugfs: Fix legacy mode page table dump logic",
                            "    - wifi: mac80211: fix Rx packet handling when pubsta information is not",
                            "      available",
                            "    - ASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback",
                            "    - sparc: fix accurate exception reporting in copy_{from_to}_user for",
                            "      UltraSPARC",
                            "    - sparc: fix accurate exception reporting in copy_{from_to}_user for",
                            "      UltraSPARC III",
                            "    - sparc: fix accurate exception reporting in copy_{from_to}_user for",
                            "      Niagara",
                            "    - sparc: fix accurate exception reporting in copy_to_user for Niagara 4",
                            "    - sparc: fix accurate exception reporting in copy_{from,to}_user for M7",
                            "    - vfio/pds: replace bitmap_free with vfree",
                            "    - crypto: comp - Use same definition of context alloc and free ops",
                            "    - crypto: hisilicon/qm - set NULL to qm->debug.qm_diff_regs",
                            "    - wifi: ath12k: Fix peer lookup in ath12k_dp_mon_rx_deliver_msdu()",
                            "    - rpmsg: qcom_smd: Fix fallback to qcom,ipc parse",
                            "    - remoteproc: qcom_q6v5_mss: support loading MBN file on msm8974",
                            "    - RDMA/rxe: Fix race in do_task() when draining",
                            "    - selftests/mm: fix va_high_addr_switch.sh failure on x86_64",
                            "    - wifi: rtw89: fix leak in rtw89_core_send_nullfunc()",
                            "    - wifi: rtw89: avoid circular locking dependency in ser_state_run()",
                            "    - PCI: tegra194: Fix duplicate PLL disable in",
                            "      pex_ep_event_pex_rst_assert()",
                            "    - remoteproc: qcom: q6v5: Avoid disabling handover IRQ twice",
                            "    - remoteproc: qcom: pas: Shutdown lite ADSP DTB on X1E",
                            "    - wifi: ath12k: Refactor RX TID deletion handling into helper function",
                            "    - wifi: ath12k: Fix flush cache failure during RX queue update",
                            "    - wifi: cfg80211: fix width unit in cfg80211_radio_chandef_valid()",
                            "    - dm vdo: return error on corrupted metadata in start_restoring_volume",
                            "      functions",
                            "    - coresight: fix indentation error in cscfg_remove_owned_csdev_configs()",
                            "    - coresight-etm4x: Conditionally access register TRCEXTINSELR",
                            "    - coresight: tmc: Support atclk",
                            "    - coresight: catu: Support atclk",
                            "    - coresight: etm4x: Support atclk",
                            "    - coresight: Appropriately disable programming clocks",
                            "    - coresight: Appropriately disable trace bus clocks",
                            "    - coresight: Avoid enable programming clock duplicately",
                            "    - coresight: trbe: Return NULL pointer for allocation failures",
                            "    - coresight: tpda: fix the logic to setup the element size",
                            "    - coresight: Fix incorrect handling for return value of devm_kzalloc",
                            "    - NFSv4.1: fix backchannel max_resp_sz verification check",
                            "    - net: ethtool: tsconfig: set command must provide a reply",
                            "    - netfilter: nfnetlink: reset nlh pointer during batch replay",
                            "    - netfilter: nf_conntrack: do not skip entries in /proc/net/nf_conntrack",
                            "    - scsi: ufs: core: Fix data race in CPU latency PM QoS request handling",
                            "    - scsi: mpt3sas: Fix crash in transport port remove by using ioc_info()",
                            "    - usb: vhci-hcd: Prevent suspending virtually attached devices",
                            "    - PCI: rcar-gen4: Add missing 1ms delay after PWR reset assertion",
                            "    - PCI: rcar-gen4: Assure reset occurs before DBI access",
                            "    - PCI: rcar-gen4: Fix inverted break condition in PHY initialization",
                            "    - ASoC: qcom: sc8280xp: use sa8775p/ subdir for QCS9100 / QCS9075",
                            "    - iommu/vt-d: Disallow dirty tracking if incoherent page walk",
                            "    - iommu/selftest: prevent use of uninitialized variable",
                            "    - RDMA/siw: Always report immediate post SQ errors",
                            "    - net: enetc: Fix probing error message typo for the ENETCv4 PF driver",
                            "    - net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast",
                            "    - ptp: Add a upper bound on max_vclocks",
                            "    - vhost: vringh: Fix copy_to_iter return value check",
                            "    - net: macb: remove illusion about TBQPH/RBQPH being per-queue",
                            "    - net: macb: move ring size computation to functions",
                            "    - net: macb: single dma_alloc_coherent() for DMA descriptors",
                            "    - Bluetooth: btintel_pcie: Refactor Device Coredump",
                            "    - Bluetooth: MGMT: Fix not exposing debug UUID on",
                            "      MGMT_OP_READ_EXP_FEATURES_INFO",
                            "    - Bluetooth: ISO: Fix possible UAF on iso_conn_free",
                            "    - Bluetooth: ISO: free rx_skb if not consumed",
                            "    - Bluetooth: ISO: don't leak skb in ISO_CONT RX",
                            "    - Bluetooth: hci_sync: Fix using random address for BIG/PA advertisements",
                            "    - KEYS: X.509: Fix Basic Constraints CA flag parsing",
                            "    - hwrng: ks-sa - fix division by zero in ks_sa_rng_init",
                            "    - cramfs: fix incorrect physical page address calculation",
                            "    - ocfs2: fix double free in user_cluster_connect()",
                            "    - drivers/base/node: fix double free in register_one_node()",
                            "    - f2fs: fix UAF issue in f2fs_merge_page_bio()",
                            "    - mtd: rawnand: atmel: Fix error handling path in",
                            "      atmel_nand_controller_add_nands",
                            "    - PCI: j721e: Fix incorrect error message in probe()",
                            "    - idpf: fix mismatched free function for dma_alloc_coherent",
                            "    - tcp: use skb->len instead of skb->truesize in tcp_can_ingest()",
                            "    - nfp: fix RSS hash key size when RSS is not supported",
                            "    - net: ena: return 0 in ena_get_rxfh_key_size() when RSS hash key is not",
                            "      configurable",
                            "    - net: dlink: handle copy_thresh allocation failure",
                            "    - net/mlx5: Stop polling for command response if interface goes down",
                            "    - net/mlx5: pagealloc: Fix reclaim race during command interface teardown",
                            "    - net/mlx5: fw reset, add reset timeout work",
                            "    - smb: client: fix crypto buffers in non-linear memory",
                            "    - bonding: fix xfrm offload feature setup on active-backup mode",
                            "    - net: enetc: initialize SW PIR and CIR based HW PIR and CIR values",
                            "    - iommufd: Register iommufd mock devices with fwspec",
                            "    - Revert \"net/mlx5e: Update and set Xon/Xoff upon MTU set\"",
                            "    - NFSD: filecache: add STATX_DIOALIGN and STATX_DIO_READ_ALIGN support",
                            "    - nfs/localio: avoid issuing misaligned IO using O_DIRECT",
                            "    - octeontx2-vf: fix bitmap leak",
                            "    - octeontx2-pf: fix bitmap leak",
                            "    - vhost: vringh: Modify the return value check",
                            "    - selftests/bpf: Fix typos and grammar in test sources",
                            "    - selftests/bpf: move get_ksyms and get_addrs to trace_helpers.c",
                            "    - selftests/bpf: Fix realloc size in bpf_get_addrs",
                            "    - bpf: Skip scalar adjustment for BPF_NEG if dst is a pointer",
                            "    - bpf: Reject negative offsets for ALU ops",
                            "    - tpm: Disable TPM2_TCG_HMAC by default",
                            "    - ALSA: hda/hdmi: Add pin fix for HP ProDesk model",
                            "    - ALSA: hda/realtek: Add quirk for HP Spectre 14t-ea100",
                            "    - Squashfs: fix uninit-value in squashfs_get_parent",
                            "    - uio_hv_generic: Let userspace take care of interrupt mask",
                            "    - hisi_acc_vfio_pci: Fix reference leak in hisi_acc_vfio_debug_init",
                            "    - io_uring/waitid: always prune wait queue entry in io_waitid_wait()",
                            "    - io_uring/zcrx: fix overshooting recv limit",
                            "    - ASoC: wcd934x: fix error handling in wcd934x_codec_parse_data()",
                            "    - ASoC: SOF: ipc3-topology: Fix multi-core and static pipelines tear down",
                            "    - ASoC: codecs: wcd937x: set the comp soundwire port correctly",
                            "    - ASoC: codecs: wcd937x: make stub functions inline",
                            "    - ASoC: SOF: ipc4-pcm: fix delay calculation when DSP resamples",
                            "    - ASoC: SOF: ipc4-pcm: fix start offset calculation for chain DMA",
                            "    - fs: udf: fix OOB read in lengthAllocDescs handling",
                            "    - net: nfc: nci: Add parameter validation for packet data",
                            "    - mfd: rz-mtu3: Fix MTU5 NFCR register offset",
                            "    - mfd: intel_soc_pmic_chtdc_ti: Set use_single_read regmap_config flag",
                            "    - mfd: vexpress-sysreg: Check the return value of devm_gpiochip_add_data()",
                            "    - tracing: Fix lock imbalance in s_start() memory allocation failure path",
                            "    - tracing: Fix race condition in kprobe initialization causing NULL",
                            "      pointer dereference",
                            "    - tracing: Fix wakeup tracers on failure of acquiring calltime",
                            "    - tracing: Fix irqoff tracers on failure of acquiring calltime",
                            "    - tracing: Have trace_marker use per-cpu data to read user space",
                            "    - tracing: Fix tracing_mark_raw_write() to use buf and not ubuf",
                            "    - tracing: Stop fortify-string from warning in tracing_mark_raw_write()",
                            "    - dm: fix queue start/stop imbalance under suspend/load/resume races",
                            "    - dm: fix NULL pointer dereference in __dm_suspend()",
                            "    - LoongArch: Automatically disable kaslr if boot from kexec_file",
                            "    - pwm: loongson: Fix LOONGSON_PWM_FREQ_DEFAULT",
                            "    - LoongArch: BPF: Sign-extend struct ops return values properly",
                            "    - LoongArch: BPF: No support of struct argument in trampoline programs",
                            "    - LoongArch: BPF: Don't align trampoline size",
                            "    - LoongArch: BPF: Make trampoline size stable",
                            "    - LoongArch: BPF: Make error handling robust in",
                            "      arch_prepare_bpf_trampoline()",
                            "    - LoongArch: BPF: Remove duplicated bpf_flush_icache()",
                            "    - LoongArch: BPF: No text_poke() for kernel text",
                            "    - LoongArch: BPF: Remove duplicated flags check",
                            "    - LoongArch: BPF: Fix uninitialized symbol 'retval_off'",
                            "    - mm/ksm: fix flag-dropping behavior in ksm_madvise",
                            "    - ksmbd: Fix race condition in RPC handle list access",
                            "    - ksmbd: fix error code overwriting in smb2_get_info_filesystem()",
                            "    - ksmbd: add max ip connections parameter",
                            "    - ext4: fix potential null deref in ext4_mb_init()",
                            "    - ext4: fix checks for orphan inodes",
                            "    - KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn't valid",
                            "    - fbdev: simplefb: Fix use after free in simplefb_detach_genpds()",
                            "    - mm: hugetlb: avoid soft lockup when mprotect to large memory area",
                            "    - selftests/mm: skip soft-dirty tests when CONFIG_MEM_SOFT_DIRTY is",
                            "      disabled",
                            "    - nvdimm: ndtest: Return -ENOMEM if devm_kcalloc() fails in ndtest_probe()",
                            "    - misc: fastrpc: Save actual DMA size in fastrpc_map structure",
                            "    - misc: fastrpc: Fix fastrpc_map_lookup operation",
                            "    - misc: fastrpc: fix possible map leak in fastrpc_put_args",
                            "    - misc: fastrpc: Skip reference for DMA handles",
                            "    - Input: atmel_mxt_ts - allow reset GPIO to sleep",
                            "    - Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info",
                            "      leak",
                            "    - sunrpc: fix null pointer dereference on zero-length checksum",
                            "    - PCI/AER: Avoid NULL pointer dereference in aer_ratelimit()",
                            "    - remoteproc: pru: Fix potential NULL pointer dereference in",
                            "      pru_rproc_set_ctable()",
                            "    - PCI: endpoint: pci-epf-test: Add NULL check for DMA channels before",
                            "      release",
                            "    - thunderbolt: Fix use-after-free in tb_dp_dprx_work",
                            "    - tee: fix register_shm_helper()",
                            "    - pinctrl: check the return value of pinmux_ops::get_function_name()",
                            "    - bus: fsl-mc: Check return value of platform_get_resource()",
                            "    - net/9p: Fix buffer overflow in USB transport layer",
                            "    - net: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock",
                            "    - usb: typec: tipd: Clear interrupts first",
                            "    - arm64: dts: qcom: qcm2290: Disable USB SS bus instances in park mode",
                            "    - usb: cdns3: cdnsp-pci: remove redundant pci_disable_device() call",
                            "    - scsi: ufs: core: Fix PM QoS mutex initialization",
                            "    - drm/amdgpu/vcn: Fix double-free of vcn dump buffer",
                            "    - Linux 6.17.3",
                            "  * CVE-2025-40019",
                            "    - crypto: essiv - Check ssize for decryption and in-place encryption",
                            "  * CVE-2025-40214",
                            "    - af_unix: Initialise scc_index in unix_add_edge().",
                            "  * Miscellaneous Ubuntu changes",
                            "    - [SAUCE] Fix selftest/net/rtnetlink.sh for Big Endian",
                            "",
                            "  [ Ubuntu-riscv: 6.17.0-12.12.1 ]",
                            "",
                            "  * questing/linux-riscv: 6.17.0-12.12.1 -proposed tracker (LP: #2138113)",
                            "  [ Ubuntu: 6.17.0-12.12 ]",
                            "  * questing/linux: 6.17.0-12.12 -proposed tracker (LP: #2138115)",
                            "  * CVE-2025-40019",
                            "    - crypto: essiv - Check ssize for decryption and in-place encryption",
                            "  * CVE-2025-40214",
                            "    - af_unix: Initialise scc_index in unix_add_edge().",
                            ""
                        ],
                        "package": "linux-riscv-6.17",
                        "version": "6.17.0-14.14.1~24.04.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2137844,
                            2013232,
                            2074082,
                            2137845,
                            1786013,
                            2137849,
                            1786013,
                            2136820,
                            2137698,
                            2129812,
                            2125022,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136813,
                            2132317,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2132095,
                            2131046,
                            2115860,
                            2128792,
                            2121852,
                            2131259,
                            2131259,
                            2131702,
                            2129610,
                            2138113,
                            2138115
                        ],
                        "author": "Emil Renner Berthing <emil.renner.berthing@canonical.com>",
                        "date": "Tue, 27 Jan 2026 20:04:21 +0100"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * noble/linux-riscv-6.17: 6.17.0-9.9.1~24.04.1 -proposed tracker (LP: #2133507)",
                            "",
                            "  * Enable Nezha board (LP: #1975592)",
                            "    - SAUCE: mmc: pwrseq_simple: always fall back to GPIO based reset control",
                            "    - SAUCE: nvmem: core: update cell->bytes after shifting bits",
                            "    - SAUCE: dt-bindings: pwm: Add binding for Allwinner D1/T113-S3/R329 PWM",
                            "      controller",
                            "    - SAUCE: pwm: Add Allwinner's D1/T113-S3/R329 SoCs PWM support",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add pwm node",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add PWM pins",
                            "    - SAUCE: mmc: sunxi-mmc: Correct the maximum segment size",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add misc nodes",
                            "    - SAUCE: riscv: dts: allwinner: Keep aldo regulator on",
                            "    - SAUCE: riscv: dts: allwinner: Add button on the Nezha board",
                            "    - SAUCE: riscv: dts: allwinner: Add button on the Lichee RV Dock",
                            "    - SAUCE: regulator: dt-bindings: Add Allwinner D1 LDOs",
                            "    - SAUCE: regulator: sun20i: Add support for Allwinner D1 analog LDOs",
                            "    - SAUCE: regulator: sun20i: Use device_node_to_regmap()",
                            "    - SAUCE: dt-bindings: thermal: sun8i: Add compatible for D1",
                            "    - SAUCE: thermal: sun8i: Set the event type for new samples",
                            "    - SAUCE: thermal: sun8i: Ensure vref is powered",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add thermal sensor and zone",
                            "    - SAUCE: riscv: dts: allwinner: d1: Hook up PWM-controlled CPU voltage",
                            "      regulators",
                            "    - SAUCE: drm/sun4i: dsi: Allow panel attach before card registration",
                            "    - SAUCE: drm/sun4i: mixer: Remove unused CMA headers",
                            "    - SAUCE: drm/sun4i: tcon: Always protect the LCD dotclock rate",
                            "    - SAUCE: drm/sun4i: tcon_top: Register reset, clock gates in probe",
                            "    - SAUCE: riscv: dts: allwinner: lichee-rv-86-panel-480p: Add panel",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add HDMI pipeline",
                            "    - SAUCE: riscv: dts: allwinner: d1: Enable HDMI on supported boards",
                            "    - SAUCE: dt-bindings: display: sun4i-tcon: Add external LVDS PHY",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add LVDS0 PHY",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add LED controller node",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add RGB LEDs to boards",
                            "    - SAUCE: ASoC: sun20i-codec: New driver for D1 internal codec",
                            "    - SAUCE: [WIP] ASoC: sun20i-codec: What is this ramp thing?",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add sound cards to boards",
                            "    - SAUCE: dt-bindings: display: sun8i-a83t-dw-hdmi: Remove #phy-cells",
                            "    - SAUCE: dt-bindings: display: Add D1 HDMI compatibles",
                            "    - SAUCE: drm/sun4i: Add support for D1 HDMI",
                            "    - SAUCE: drm/sun4i: sun8i-hdmi-phy: Add support for D1 PHY",
                            "    - SAUCE: [HACK] drm/sun4i: Copy in BSP code for D1 HDMI PHY",
                            "    - SAUCE: riscv: dts: allwinner: Add Nezha and Lichee RV SPI nodes",
                            "    - SAUCE: dt-bindings: display: Add Sitronix ST7701s panel binding",
                            "    - SAUCE: drm/panel: Add driver for ST7701s DPI LCD panel",
                            "    - [Config] riscv: updateconfigs for D1 support",
                            "",
                            "  * Enable StarFive VisionFive 2 board (LP: #2013232)",
                            "    - SAUCE: PCI: starfive: Offload the NVMe timeout workaround to host",
                            "      drivers.",
                            "    - SAUCE: pwm: opencores: Add PWM driver support",
                            "    - riscv: dts: starfive: jh7110-common: drop no-sdio property from mmc1",
                            "    - dt-bindings: memory-controllers: add StarFive JH7110 SoC DMC",
                            "    - riscv: dts: starfive: jh7110: add DMC memory controller",
                            "    - riscv: dts: starfive: jh7110: bootph-pre-ram hinting needed by boot",
                            "      loader",
                            "    - riscv: dts: starfive: jh7110-common: drop no-mmc property from mmc1",
                            "    - riscv: dts: starfive: jh7110-common: drop mmc post-power-on-delay-ms",
                            "    - riscv: dts: starfive: add common board dtsi for Milk-V Mars CM variants",
                            "    - dt-bindings: riscv: starfive: add milkv,marscm-emmc",
                            "    - riscv: dts: starfive: add Milk-V Mars CM system-on-module",
                            "    - dt-bindings: riscv: starfive: add milkv,marscm-lite",
                            "    - riscv: dts: starfive: add Milk-V Mars CM Lite system-on-module",
                            "    - SAUCE: dts: starfive: jh7110-common: split out mmc0 reset pins from",
                            "      common into boards",
                            "    - SAUCE: dt-bindings: riscv: Add StarFive JH7110S SoC and VisionFive 2",
                            "      Lite board",
                            "    - SAUCE: riscv: dts: starfive: jh7110-common: Move out some nodes to the",
                            "      board dts",
                            "    - SAUCE: riscv: dts: starfive: Add common board dtsi for VisionFive 2 Lite",
                            "      variants",
                            "    - SAUCE: riscv: dts: starfive: Add VisionFive 2 Lite board device tree",
                            "    - SAUCE: riscv: dts: starfive: Add VisionFive 2 Lite eMMC board device",
                            "      tree",
                            "    - SAUCE: dt-bindings: riscv: starfive: add xunlong,orangepi-rv",
                            "    - SAUCE: riscv: dts: starfive: add Orange Pi RV",
                            "    - [Config] riscv: updateconfigs for JH7110 support",
                            "",
                            "  * Miscellaneous Ubuntu changes",
                            "    - SAUCE: tools/lib/perf: Fix -Werror=alloc-size-larger-than in cpumap.c",
                            "    - [Config] Enable pre-RVA23 hardware",
                            ""
                        ],
                        "package": "linux-riscv-6.17",
                        "version": "6.17.0-9.9.1~24.04.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2133507,
                            1975592,
                            2013232
                        ],
                        "author": "Emil Renner Berthing <emil.renner.berthing@canonical.com>",
                        "date": "Thu, 18 Dec 2025 14:49:05 +0100"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Create Noble backport",
                            "",
                            "  [ Ubuntu: 6.17.0-9.9.1 ]",
                            ""
                        ],
                        "package": "linux-riscv-6.17",
                        "version": "6.17.0-9.9.1~24.04.0",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [],
                        "author": "Emil Renner Berthing <emil.renner.berthing@canonical.com>",
                        "date": "Thu, 18 Dec 2025 14:06:20 +0100"
                    }
                ],
                "notes": "For a newly added package only the three most recent changelog entries are shown.",
                "is_version_downgrade": false
            },
            {
                "name": "linux-riscv-6.17-headers-6.17.0-14",
                "from_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "to_version": {
                    "source_package_name": "linux-riscv-6.17",
                    "source_package_version": "6.17.0-14.14.1~24.04.1",
                    "version": "6.17.0-14.14.1~24.04.1"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-40256",
                        "url": "https://ubuntu.com/security/CVE-2025-40256",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68204",
                        "url": "https://ubuntu.com/security/CVE-2025-68204",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68203",
                        "url": "https://ubuntu.com/security/CVE-2025-68203",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40267",
                        "url": "https://ubuntu.com/security/CVE-2025-40267",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68198",
                        "url": "https://ubuntu.com/security/CVE-2025-68198",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68199",
                        "url": "https://ubuntu.com/security/CVE-2025-68199",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40268",
                        "url": "https://ubuntu.com/security/CVE-2025-40268",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40269",
                        "url": "https://ubuntu.com/security/CVE-2025-40269",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68205",
                        "url": "https://ubuntu.com/security/CVE-2025-68205",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40270",
                        "url": "https://ubuntu.com/security/CVE-2025-40270",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40271",
                        "url": "https://ubuntu.com/security/CVE-2025-40271",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40272",
                        "url": "https://ubuntu.com/security/CVE-2025-40272",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68245",
                        "url": "https://ubuntu.com/security/CVE-2025-68245",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68240",
                        "url": "https://ubuntu.com/security/CVE-2025-68240",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68241",
                        "url": "https://ubuntu.com/security/CVE-2025-68241",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68211",
                        "url": "https://ubuntu.com/security/CVE-2025-68211",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68246",
                        "url": "https://ubuntu.com/security/CVE-2025-68246",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40273",
                        "url": "https://ubuntu.com/security/CVE-2025-40273",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40212",
                        "url": "https://ubuntu.com/security/CVE-2025-40212",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40274",
                        "url": "https://ubuntu.com/security/CVE-2025-40274",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68202",
                        "url": "https://ubuntu.com/security/CVE-2025-68202",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68239",
                        "url": "https://ubuntu.com/security/CVE-2025-68239",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68247",
                        "url": "https://ubuntu.com/security/CVE-2025-68247",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68208",
                        "url": "https://ubuntu.com/security/CVE-2025-68208",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68200",
                        "url": "https://ubuntu.com/security/CVE-2025-68200",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40275",
                        "url": "https://ubuntu.com/security/CVE-2025-40275",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68242",
                        "url": "https://ubuntu.com/security/CVE-2025-68242",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68243",
                        "url": "https://ubuntu.com/security/CVE-2025-68243",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40276",
                        "url": "https://ubuntu.com/security/CVE-2025-40276",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40277",
                        "url": "https://ubuntu.com/security/CVE-2025-40277",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68206",
                        "url": "https://ubuntu.com/security/CVE-2025-68206",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68209",
                        "url": "https://ubuntu.com/security/CVE-2025-68209",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40278",
                        "url": "https://ubuntu.com/security/CVE-2025-40278",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40279",
                        "url": "https://ubuntu.com/security/CVE-2025-40279",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40280",
                        "url": "https://ubuntu.com/security/CVE-2025-40280",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40281",
                        "url": "https://ubuntu.com/security/CVE-2025-40281",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40282",
                        "url": "https://ubuntu.com/security/CVE-2025-40282",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40283",
                        "url": "https://ubuntu.com/security/CVE-2025-40283",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40284",
                        "url": "https://ubuntu.com/security/CVE-2025-40284",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68210",
                        "url": "https://ubuntu.com/security/CVE-2025-68210",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40285",
                        "url": "https://ubuntu.com/security/CVE-2025-40285",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40286",
                        "url": "https://ubuntu.com/security/CVE-2025-40286",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40287",
                        "url": "https://ubuntu.com/security/CVE-2025-40287",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40288",
                        "url": "https://ubuntu.com/security/CVE-2025-40288",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40289",
                        "url": "https://ubuntu.com/security/CVE-2025-40289",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68201",
                        "url": "https://ubuntu.com/security/CVE-2025-68201",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68207",
                        "url": "https://ubuntu.com/security/CVE-2025-68207",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68244",
                        "url": "https://ubuntu.com/security/CVE-2025-68244",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68316",
                        "url": "https://ubuntu.com/security/CVE-2025-68316",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40292",
                        "url": "https://ubuntu.com/security/CVE-2025-40292",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68180",
                        "url": "https://ubuntu.com/security/CVE-2025-68180",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40327",
                        "url": "https://ubuntu.com/security/CVE-2025-40327",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40328",
                        "url": "https://ubuntu.com/security/CVE-2025-40328",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40291",
                        "url": "https://ubuntu.com/security/CVE-2025-40291",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68322",
                        "url": "https://ubuntu.com/security/CVE-2025-68322",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40293",
                        "url": "https://ubuntu.com/security/CVE-2025-40293",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40294",
                        "url": "https://ubuntu.com/security/CVE-2025-40294",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40329",
                        "url": "https://ubuntu.com/security/CVE-2025-40329",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40295",
                        "url": "https://ubuntu.com/security/CVE-2025-40295",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40296",
                        "url": "https://ubuntu.com/security/CVE-2025-40296",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40297",
                        "url": "https://ubuntu.com/security/CVE-2025-40297",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68320",
                        "url": "https://ubuntu.com/security/CVE-2025-68320",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68169",
                        "url": "https://ubuntu.com/security/CVE-2025-68169",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68197",
                        "url": "https://ubuntu.com/security/CVE-2025-68197",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40330",
                        "url": "https://ubuntu.com/security/CVE-2025-40330",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68192",
                        "url": "https://ubuntu.com/security/CVE-2025-68192",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40331",
                        "url": "https://ubuntu.com/security/CVE-2025-40331",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68187",
                        "url": "https://ubuntu.com/security/CVE-2025-68187",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68167",
                        "url": "https://ubuntu.com/security/CVE-2025-68167",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68319",
                        "url": "https://ubuntu.com/security/CVE-2025-68319",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40298",
                        "url": "https://ubuntu.com/security/CVE-2025-40298",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40299",
                        "url": "https://ubuntu.com/security/CVE-2025-40299",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40301",
                        "url": "https://ubuntu.com/security/CVE-2025-40301",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40358",
                        "url": "https://ubuntu.com/security/CVE-2025-40358",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68186",
                        "url": "https://ubuntu.com/security/CVE-2025-68186",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68184",
                        "url": "https://ubuntu.com/security/CVE-2025-68184",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40302",
                        "url": "https://ubuntu.com/security/CVE-2025-40302",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40303",
                        "url": "https://ubuntu.com/security/CVE-2025-40303",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40362",
                        "url": "https://ubuntu.com/security/CVE-2025-40362",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40332",
                        "url": "https://ubuntu.com/security/CVE-2025-40332",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40304",
                        "url": "https://ubuntu.com/security/CVE-2025-40304",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40305",
                        "url": "https://ubuntu.com/security/CVE-2025-40305",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68318",
                        "url": "https://ubuntu.com/security/CVE-2025-68318",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40209",
                        "url": "https://ubuntu.com/security/CVE-2025-40209",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68183",
                        "url": "https://ubuntu.com/security/CVE-2025-68183",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68173",
                        "url": "https://ubuntu.com/security/CVE-2025-68173",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40306",
                        "url": "https://ubuntu.com/security/CVE-2025-40306",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40307",
                        "url": "https://ubuntu.com/security/CVE-2025-40307",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40308",
                        "url": "https://ubuntu.com/security/CVE-2025-40308",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40309",
                        "url": "https://ubuntu.com/security/CVE-2025-40309",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68174",
                        "url": "https://ubuntu.com/security/CVE-2025-68174",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40310",
                        "url": "https://ubuntu.com/security/CVE-2025-40310",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40361",
                        "url": "https://ubuntu.com/security/CVE-2025-40361",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40311",
                        "url": "https://ubuntu.com/security/CVE-2025-40311",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68185",
                        "url": "https://ubuntu.com/security/CVE-2025-68185",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68176",
                        "url": "https://ubuntu.com/security/CVE-2025-68176",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68190",
                        "url": "https://ubuntu.com/security/CVE-2025-68190",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68168",
                        "url": "https://ubuntu.com/security/CVE-2025-68168",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40312",
                        "url": "https://ubuntu.com/security/CVE-2025-40312",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40333",
                        "url": "https://ubuntu.com/security/CVE-2025-40333",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68321",
                        "url": "https://ubuntu.com/security/CVE-2025-68321",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40334",
                        "url": "https://ubuntu.com/security/CVE-2025-40334",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68191",
                        "url": "https://ubuntu.com/security/CVE-2025-68191",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68309",
                        "url": "https://ubuntu.com/security/CVE-2025-68309",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40313",
                        "url": "https://ubuntu.com/security/CVE-2025-40313",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40335",
                        "url": "https://ubuntu.com/security/CVE-2025-40335",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40314",
                        "url": "https://ubuntu.com/security/CVE-2025-40314",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40336",
                        "url": "https://ubuntu.com/security/CVE-2025-40336",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68193",
                        "url": "https://ubuntu.com/security/CVE-2025-68193",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68175",
                        "url": "https://ubuntu.com/security/CVE-2025-68175",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68188",
                        "url": "https://ubuntu.com/security/CVE-2025-68188",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68315",
                        "url": "https://ubuntu.com/security/CVE-2025-68315",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40337",
                        "url": "https://ubuntu.com/security/CVE-2025-40337",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40338",
                        "url": "https://ubuntu.com/security/CVE-2025-40338",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40339",
                        "url": "https://ubuntu.com/security/CVE-2025-40339",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68194",
                        "url": "https://ubuntu.com/security/CVE-2025-68194",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40363",
                        "url": "https://ubuntu.com/security/CVE-2025-40363",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68311",
                        "url": "https://ubuntu.com/security/CVE-2025-68311",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40340",
                        "url": "https://ubuntu.com/security/CVE-2025-40340",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68196",
                        "url": "https://ubuntu.com/security/CVE-2025-68196",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68178",
                        "url": "https://ubuntu.com/security/CVE-2025-68178",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40341",
                        "url": "https://ubuntu.com/security/CVE-2025-40341",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40342",
                        "url": "https://ubuntu.com/security/CVE-2025-40342",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40343",
                        "url": "https://ubuntu.com/security/CVE-2025-40343",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68177",
                        "url": "https://ubuntu.com/security/CVE-2025-68177",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68317",
                        "url": "https://ubuntu.com/security/CVE-2025-68317",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40315",
                        "url": "https://ubuntu.com/security/CVE-2025-40315",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40316",
                        "url": "https://ubuntu.com/security/CVE-2025-40316",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40360",
                        "url": "https://ubuntu.com/security/CVE-2025-40360",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68179",
                        "url": "https://ubuntu.com/security/CVE-2025-68179",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68310",
                        "url": "https://ubuntu.com/security/CVE-2025-68310",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40317",
                        "url": "https://ubuntu.com/security/CVE-2025-40317",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40359",
                        "url": "https://ubuntu.com/security/CVE-2025-40359",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68181",
                        "url": "https://ubuntu.com/security/CVE-2025-68181",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68170",
                        "url": "https://ubuntu.com/security/CVE-2025-68170",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40213",
                        "url": "https://ubuntu.com/security/CVE-2025-40213",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40318",
                        "url": "https://ubuntu.com/security/CVE-2025-40318",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68312",
                        "url": "https://ubuntu.com/security/CVE-2025-68312",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40344",
                        "url": "https://ubuntu.com/security/CVE-2025-40344",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68172",
                        "url": "https://ubuntu.com/security/CVE-2025-68172",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40319",
                        "url": "https://ubuntu.com/security/CVE-2025-40319",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68182",
                        "url": "https://ubuntu.com/security/CVE-2025-68182",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68314",
                        "url": "https://ubuntu.com/security/CVE-2025-68314",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68189",
                        "url": "https://ubuntu.com/security/CVE-2025-68189",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68171",
                        "url": "https://ubuntu.com/security/CVE-2025-68171",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68313",
                        "url": "https://ubuntu.com/security/CVE-2025-68313",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40320",
                        "url": "https://ubuntu.com/security/CVE-2025-40320",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40321",
                        "url": "https://ubuntu.com/security/CVE-2025-40321",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40322",
                        "url": "https://ubuntu.com/security/CVE-2025-40322",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40211",
                        "url": "https://ubuntu.com/security/CVE-2025-40211",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40323",
                        "url": "https://ubuntu.com/security/CVE-2025-40323",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40210",
                        "url": "https://ubuntu.com/security/CVE-2025-40210",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40324",
                        "url": "https://ubuntu.com/security/CVE-2025-40324",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40326",
                        "url": "https://ubuntu.com/security/CVE-2025-40326",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40084",
                        "url": "https://ubuntu.com/security/CVE-2025-40084",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40222",
                        "url": "https://ubuntu.com/security/CVE-2025-40222",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40223",
                        "url": "https://ubuntu.com/security/CVE-2025-40223",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40106",
                        "url": "https://ubuntu.com/security/CVE-2025-40106",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40224",
                        "url": "https://ubuntu.com/security/CVE-2025-40224",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40225",
                        "url": "https://ubuntu.com/security/CVE-2025-40225",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40226",
                        "url": "https://ubuntu.com/security/CVE-2025-40226",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40227",
                        "url": "https://ubuntu.com/security/CVE-2025-40227",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40228",
                        "url": "https://ubuntu.com/security/CVE-2025-40228",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40229",
                        "url": "https://ubuntu.com/security/CVE-2025-40229",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40230",
                        "url": "https://ubuntu.com/security/CVE-2025-40230",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40231",
                        "url": "https://ubuntu.com/security/CVE-2025-40231",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40233",
                        "url": "https://ubuntu.com/security/CVE-2025-40233",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40235",
                        "url": "https://ubuntu.com/security/CVE-2025-40235",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40236",
                        "url": "https://ubuntu.com/security/CVE-2025-40236",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40237",
                        "url": "https://ubuntu.com/security/CVE-2025-40237",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40238",
                        "url": "https://ubuntu.com/security/CVE-2025-40238",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40239",
                        "url": "https://ubuntu.com/security/CVE-2025-40239",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40240",
                        "url": "https://ubuntu.com/security/CVE-2025-40240",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40241",
                        "url": "https://ubuntu.com/security/CVE-2025-40241",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40242",
                        "url": "https://ubuntu.com/security/CVE-2025-40242",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40243",
                        "url": "https://ubuntu.com/security/CVE-2025-40243",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40244",
                        "url": "https://ubuntu.com/security/CVE-2025-40244",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40245",
                        "url": "https://ubuntu.com/security/CVE-2025-40245",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40086",
                        "url": "https://ubuntu.com/security/CVE-2025-40086",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40087",
                        "url": "https://ubuntu.com/security/CVE-2025-40087",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40088",
                        "url": "https://ubuntu.com/security/CVE-2025-40088",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40162",
                        "url": "https://ubuntu.com/security/CVE-2025-40162",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40085",
                        "url": "https://ubuntu.com/security/CVE-2025-40085",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40172",
                        "url": "https://ubuntu.com/security/CVE-2025-40172",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40177",
                        "url": "https://ubuntu.com/security/CVE-2025-40177",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40163",
                        "url": "https://ubuntu.com/security/CVE-2025-40163",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40174",
                        "url": "https://ubuntu.com/security/CVE-2025-40174",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40089",
                        "url": "https://ubuntu.com/security/CVE-2025-40089",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40176",
                        "url": "https://ubuntu.com/security/CVE-2025-40176",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40164",
                        "url": "https://ubuntu.com/security/CVE-2025-40164",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40091",
                        "url": "https://ubuntu.com/security/CVE-2025-40091",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40175",
                        "url": "https://ubuntu.com/security/CVE-2025-40175",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40173",
                        "url": "https://ubuntu.com/security/CVE-2025-40173",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40092",
                        "url": "https://ubuntu.com/security/CVE-2025-40092",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40093",
                        "url": "https://ubuntu.com/security/CVE-2025-40093",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40094",
                        "url": "https://ubuntu.com/security/CVE-2025-40094",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40095",
                        "url": "https://ubuntu.com/security/CVE-2025-40095",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40165",
                        "url": "https://ubuntu.com/security/CVE-2025-40165",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40096",
                        "url": "https://ubuntu.com/security/CVE-2025-40096",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40097",
                        "url": "https://ubuntu.com/security/CVE-2025-40097",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40098",
                        "url": "https://ubuntu.com/security/CVE-2025-40098",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40099",
                        "url": "https://ubuntu.com/security/CVE-2025-40099",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40100",
                        "url": "https://ubuntu.com/security/CVE-2025-40100",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40101",
                        "url": "https://ubuntu.com/security/CVE-2025-40101",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40167",
                        "url": "https://ubuntu.com/security/CVE-2025-40167",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40102",
                        "url": "https://ubuntu.com/security/CVE-2025-40102",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40103",
                        "url": "https://ubuntu.com/security/CVE-2025-40103",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40104",
                        "url": "https://ubuntu.com/security/CVE-2025-40104",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40166",
                        "url": "https://ubuntu.com/security/CVE-2025-40166",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40105",
                        "url": "https://ubuntu.com/security/CVE-2025-40105",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40019",
                        "url": "https://ubuntu.com/security/CVE-2025-40019",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40214",
                        "url": "https://ubuntu.com/security/CVE-2025-40214",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [
                    2137844,
                    2013232,
                    2074082,
                    2137845,
                    1786013,
                    2137849,
                    1786013,
                    2136820,
                    2137698,
                    2129812,
                    2125022,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136813,
                    2132317,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2132095,
                    2131046,
                    2115860,
                    2128792,
                    2121852,
                    2131259,
                    2131259,
                    2131702,
                    2129610,
                    2138113,
                    2138115,
                    2133507,
                    1975592,
                    2013232
                ],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-40256",
                                "url": "https://ubuntu.com/security/CVE-2025-40256",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68204",
                                "url": "https://ubuntu.com/security/CVE-2025-68204",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68203",
                                "url": "https://ubuntu.com/security/CVE-2025-68203",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40267",
                                "url": "https://ubuntu.com/security/CVE-2025-40267",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68198",
                                "url": "https://ubuntu.com/security/CVE-2025-68198",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68199",
                                "url": "https://ubuntu.com/security/CVE-2025-68199",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40268",
                                "url": "https://ubuntu.com/security/CVE-2025-40268",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40269",
                                "url": "https://ubuntu.com/security/CVE-2025-40269",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68205",
                                "url": "https://ubuntu.com/security/CVE-2025-68205",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40270",
                                "url": "https://ubuntu.com/security/CVE-2025-40270",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40271",
                                "url": "https://ubuntu.com/security/CVE-2025-40271",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40272",
                                "url": "https://ubuntu.com/security/CVE-2025-40272",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68245",
                                "url": "https://ubuntu.com/security/CVE-2025-68245",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68240",
                                "url": "https://ubuntu.com/security/CVE-2025-68240",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68241",
                                "url": "https://ubuntu.com/security/CVE-2025-68241",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68211",
                                "url": "https://ubuntu.com/security/CVE-2025-68211",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68246",
                                "url": "https://ubuntu.com/security/CVE-2025-68246",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40273",
                                "url": "https://ubuntu.com/security/CVE-2025-40273",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40212",
                                "url": "https://ubuntu.com/security/CVE-2025-40212",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40274",
                                "url": "https://ubuntu.com/security/CVE-2025-40274",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68202",
                                "url": "https://ubuntu.com/security/CVE-2025-68202",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68239",
                                "url": "https://ubuntu.com/security/CVE-2025-68239",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68247",
                                "url": "https://ubuntu.com/security/CVE-2025-68247",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68208",
                                "url": "https://ubuntu.com/security/CVE-2025-68208",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68200",
                                "url": "https://ubuntu.com/security/CVE-2025-68200",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40275",
                                "url": "https://ubuntu.com/security/CVE-2025-40275",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68242",
                                "url": "https://ubuntu.com/security/CVE-2025-68242",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68243",
                                "url": "https://ubuntu.com/security/CVE-2025-68243",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40276",
                                "url": "https://ubuntu.com/security/CVE-2025-40276",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40277",
                                "url": "https://ubuntu.com/security/CVE-2025-40277",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68206",
                                "url": "https://ubuntu.com/security/CVE-2025-68206",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68209",
                                "url": "https://ubuntu.com/security/CVE-2025-68209",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40278",
                                "url": "https://ubuntu.com/security/CVE-2025-40278",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40279",
                                "url": "https://ubuntu.com/security/CVE-2025-40279",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40280",
                                "url": "https://ubuntu.com/security/CVE-2025-40280",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40281",
                                "url": "https://ubuntu.com/security/CVE-2025-40281",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40282",
                                "url": "https://ubuntu.com/security/CVE-2025-40282",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40283",
                                "url": "https://ubuntu.com/security/CVE-2025-40283",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40284",
                                "url": "https://ubuntu.com/security/CVE-2025-40284",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68210",
                                "url": "https://ubuntu.com/security/CVE-2025-68210",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40285",
                                "url": "https://ubuntu.com/security/CVE-2025-40285",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40286",
                                "url": "https://ubuntu.com/security/CVE-2025-40286",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40287",
                                "url": "https://ubuntu.com/security/CVE-2025-40287",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40288",
                                "url": "https://ubuntu.com/security/CVE-2025-40288",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40289",
                                "url": "https://ubuntu.com/security/CVE-2025-40289",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68201",
                                "url": "https://ubuntu.com/security/CVE-2025-68201",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68207",
                                "url": "https://ubuntu.com/security/CVE-2025-68207",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68244",
                                "url": "https://ubuntu.com/security/CVE-2025-68244",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68316",
                                "url": "https://ubuntu.com/security/CVE-2025-68316",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40292",
                                "url": "https://ubuntu.com/security/CVE-2025-40292",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68180",
                                "url": "https://ubuntu.com/security/CVE-2025-68180",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40327",
                                "url": "https://ubuntu.com/security/CVE-2025-40327",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40328",
                                "url": "https://ubuntu.com/security/CVE-2025-40328",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40291",
                                "url": "https://ubuntu.com/security/CVE-2025-40291",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68322",
                                "url": "https://ubuntu.com/security/CVE-2025-68322",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40293",
                                "url": "https://ubuntu.com/security/CVE-2025-40293",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40294",
                                "url": "https://ubuntu.com/security/CVE-2025-40294",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40329",
                                "url": "https://ubuntu.com/security/CVE-2025-40329",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40295",
                                "url": "https://ubuntu.com/security/CVE-2025-40295",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40296",
                                "url": "https://ubuntu.com/security/CVE-2025-40296",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40297",
                                "url": "https://ubuntu.com/security/CVE-2025-40297",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68320",
                                "url": "https://ubuntu.com/security/CVE-2025-68320",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68169",
                                "url": "https://ubuntu.com/security/CVE-2025-68169",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68197",
                                "url": "https://ubuntu.com/security/CVE-2025-68197",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40330",
                                "url": "https://ubuntu.com/security/CVE-2025-40330",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68192",
                                "url": "https://ubuntu.com/security/CVE-2025-68192",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40331",
                                "url": "https://ubuntu.com/security/CVE-2025-40331",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68187",
                                "url": "https://ubuntu.com/security/CVE-2025-68187",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68167",
                                "url": "https://ubuntu.com/security/CVE-2025-68167",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68319",
                                "url": "https://ubuntu.com/security/CVE-2025-68319",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40298",
                                "url": "https://ubuntu.com/security/CVE-2025-40298",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40299",
                                "url": "https://ubuntu.com/security/CVE-2025-40299",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40301",
                                "url": "https://ubuntu.com/security/CVE-2025-40301",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40358",
                                "url": "https://ubuntu.com/security/CVE-2025-40358",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68186",
                                "url": "https://ubuntu.com/security/CVE-2025-68186",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68184",
                                "url": "https://ubuntu.com/security/CVE-2025-68184",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40302",
                                "url": "https://ubuntu.com/security/CVE-2025-40302",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40303",
                                "url": "https://ubuntu.com/security/CVE-2025-40303",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40362",
                                "url": "https://ubuntu.com/security/CVE-2025-40362",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40332",
                                "url": "https://ubuntu.com/security/CVE-2025-40332",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40304",
                                "url": "https://ubuntu.com/security/CVE-2025-40304",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40305",
                                "url": "https://ubuntu.com/security/CVE-2025-40305",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68318",
                                "url": "https://ubuntu.com/security/CVE-2025-68318",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40209",
                                "url": "https://ubuntu.com/security/CVE-2025-40209",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68183",
                                "url": "https://ubuntu.com/security/CVE-2025-68183",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68173",
                                "url": "https://ubuntu.com/security/CVE-2025-68173",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40306",
                                "url": "https://ubuntu.com/security/CVE-2025-40306",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40307",
                                "url": "https://ubuntu.com/security/CVE-2025-40307",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40308",
                                "url": "https://ubuntu.com/security/CVE-2025-40308",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40309",
                                "url": "https://ubuntu.com/security/CVE-2025-40309",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68174",
                                "url": "https://ubuntu.com/security/CVE-2025-68174",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40310",
                                "url": "https://ubuntu.com/security/CVE-2025-40310",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40361",
                                "url": "https://ubuntu.com/security/CVE-2025-40361",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40311",
                                "url": "https://ubuntu.com/security/CVE-2025-40311",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68185",
                                "url": "https://ubuntu.com/security/CVE-2025-68185",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68176",
                                "url": "https://ubuntu.com/security/CVE-2025-68176",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68190",
                                "url": "https://ubuntu.com/security/CVE-2025-68190",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68168",
                                "url": "https://ubuntu.com/security/CVE-2025-68168",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40312",
                                "url": "https://ubuntu.com/security/CVE-2025-40312",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40333",
                                "url": "https://ubuntu.com/security/CVE-2025-40333",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68321",
                                "url": "https://ubuntu.com/security/CVE-2025-68321",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40334",
                                "url": "https://ubuntu.com/security/CVE-2025-40334",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68191",
                                "url": "https://ubuntu.com/security/CVE-2025-68191",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68309",
                                "url": "https://ubuntu.com/security/CVE-2025-68309",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40313",
                                "url": "https://ubuntu.com/security/CVE-2025-40313",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40335",
                                "url": "https://ubuntu.com/security/CVE-2025-40335",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40314",
                                "url": "https://ubuntu.com/security/CVE-2025-40314",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40336",
                                "url": "https://ubuntu.com/security/CVE-2025-40336",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68193",
                                "url": "https://ubuntu.com/security/CVE-2025-68193",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68175",
                                "url": "https://ubuntu.com/security/CVE-2025-68175",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68188",
                                "url": "https://ubuntu.com/security/CVE-2025-68188",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68315",
                                "url": "https://ubuntu.com/security/CVE-2025-68315",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40337",
                                "url": "https://ubuntu.com/security/CVE-2025-40337",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40338",
                                "url": "https://ubuntu.com/security/CVE-2025-40338",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40339",
                                "url": "https://ubuntu.com/security/CVE-2025-40339",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68194",
                                "url": "https://ubuntu.com/security/CVE-2025-68194",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40363",
                                "url": "https://ubuntu.com/security/CVE-2025-40363",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68311",
                                "url": "https://ubuntu.com/security/CVE-2025-68311",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40340",
                                "url": "https://ubuntu.com/security/CVE-2025-40340",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68196",
                                "url": "https://ubuntu.com/security/CVE-2025-68196",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68178",
                                "url": "https://ubuntu.com/security/CVE-2025-68178",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40341",
                                "url": "https://ubuntu.com/security/CVE-2025-40341",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40342",
                                "url": "https://ubuntu.com/security/CVE-2025-40342",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40343",
                                "url": "https://ubuntu.com/security/CVE-2025-40343",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68177",
                                "url": "https://ubuntu.com/security/CVE-2025-68177",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68317",
                                "url": "https://ubuntu.com/security/CVE-2025-68317",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40315",
                                "url": "https://ubuntu.com/security/CVE-2025-40315",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40316",
                                "url": "https://ubuntu.com/security/CVE-2025-40316",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40360",
                                "url": "https://ubuntu.com/security/CVE-2025-40360",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68179",
                                "url": "https://ubuntu.com/security/CVE-2025-68179",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68310",
                                "url": "https://ubuntu.com/security/CVE-2025-68310",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40317",
                                "url": "https://ubuntu.com/security/CVE-2025-40317",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40359",
                                "url": "https://ubuntu.com/security/CVE-2025-40359",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68181",
                                "url": "https://ubuntu.com/security/CVE-2025-68181",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68170",
                                "url": "https://ubuntu.com/security/CVE-2025-68170",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40213",
                                "url": "https://ubuntu.com/security/CVE-2025-40213",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40318",
                                "url": "https://ubuntu.com/security/CVE-2025-40318",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68312",
                                "url": "https://ubuntu.com/security/CVE-2025-68312",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40344",
                                "url": "https://ubuntu.com/security/CVE-2025-40344",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68172",
                                "url": "https://ubuntu.com/security/CVE-2025-68172",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40319",
                                "url": "https://ubuntu.com/security/CVE-2025-40319",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68182",
                                "url": "https://ubuntu.com/security/CVE-2025-68182",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68314",
                                "url": "https://ubuntu.com/security/CVE-2025-68314",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68189",
                                "url": "https://ubuntu.com/security/CVE-2025-68189",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68171",
                                "url": "https://ubuntu.com/security/CVE-2025-68171",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68313",
                                "url": "https://ubuntu.com/security/CVE-2025-68313",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40320",
                                "url": "https://ubuntu.com/security/CVE-2025-40320",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40321",
                                "url": "https://ubuntu.com/security/CVE-2025-40321",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40322",
                                "url": "https://ubuntu.com/security/CVE-2025-40322",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40211",
                                "url": "https://ubuntu.com/security/CVE-2025-40211",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40323",
                                "url": "https://ubuntu.com/security/CVE-2025-40323",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40210",
                                "url": "https://ubuntu.com/security/CVE-2025-40210",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40324",
                                "url": "https://ubuntu.com/security/CVE-2025-40324",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40326",
                                "url": "https://ubuntu.com/security/CVE-2025-40326",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40084",
                                "url": "https://ubuntu.com/security/CVE-2025-40084",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40222",
                                "url": "https://ubuntu.com/security/CVE-2025-40222",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40223",
                                "url": "https://ubuntu.com/security/CVE-2025-40223",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40106",
                                "url": "https://ubuntu.com/security/CVE-2025-40106",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40224",
                                "url": "https://ubuntu.com/security/CVE-2025-40224",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40225",
                                "url": "https://ubuntu.com/security/CVE-2025-40225",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40226",
                                "url": "https://ubuntu.com/security/CVE-2025-40226",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40227",
                                "url": "https://ubuntu.com/security/CVE-2025-40227",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40228",
                                "url": "https://ubuntu.com/security/CVE-2025-40228",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40229",
                                "url": "https://ubuntu.com/security/CVE-2025-40229",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40230",
                                "url": "https://ubuntu.com/security/CVE-2025-40230",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40231",
                                "url": "https://ubuntu.com/security/CVE-2025-40231",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40233",
                                "url": "https://ubuntu.com/security/CVE-2025-40233",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40235",
                                "url": "https://ubuntu.com/security/CVE-2025-40235",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40236",
                                "url": "https://ubuntu.com/security/CVE-2025-40236",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40237",
                                "url": "https://ubuntu.com/security/CVE-2025-40237",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40238",
                                "url": "https://ubuntu.com/security/CVE-2025-40238",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40239",
                                "url": "https://ubuntu.com/security/CVE-2025-40239",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40240",
                                "url": "https://ubuntu.com/security/CVE-2025-40240",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40241",
                                "url": "https://ubuntu.com/security/CVE-2025-40241",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40242",
                                "url": "https://ubuntu.com/security/CVE-2025-40242",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40243",
                                "url": "https://ubuntu.com/security/CVE-2025-40243",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40244",
                                "url": "https://ubuntu.com/security/CVE-2025-40244",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40245",
                                "url": "https://ubuntu.com/security/CVE-2025-40245",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40086",
                                "url": "https://ubuntu.com/security/CVE-2025-40086",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40087",
                                "url": "https://ubuntu.com/security/CVE-2025-40087",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40088",
                                "url": "https://ubuntu.com/security/CVE-2025-40088",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40162",
                                "url": "https://ubuntu.com/security/CVE-2025-40162",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40085",
                                "url": "https://ubuntu.com/security/CVE-2025-40085",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40172",
                                "url": "https://ubuntu.com/security/CVE-2025-40172",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40177",
                                "url": "https://ubuntu.com/security/CVE-2025-40177",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40163",
                                "url": "https://ubuntu.com/security/CVE-2025-40163",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40174",
                                "url": "https://ubuntu.com/security/CVE-2025-40174",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40089",
                                "url": "https://ubuntu.com/security/CVE-2025-40089",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40176",
                                "url": "https://ubuntu.com/security/CVE-2025-40176",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40164",
                                "url": "https://ubuntu.com/security/CVE-2025-40164",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40091",
                                "url": "https://ubuntu.com/security/CVE-2025-40091",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40175",
                                "url": "https://ubuntu.com/security/CVE-2025-40175",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40173",
                                "url": "https://ubuntu.com/security/CVE-2025-40173",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40092",
                                "url": "https://ubuntu.com/security/CVE-2025-40092",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40093",
                                "url": "https://ubuntu.com/security/CVE-2025-40093",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40094",
                                "url": "https://ubuntu.com/security/CVE-2025-40094",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40095",
                                "url": "https://ubuntu.com/security/CVE-2025-40095",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40165",
                                "url": "https://ubuntu.com/security/CVE-2025-40165",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40096",
                                "url": "https://ubuntu.com/security/CVE-2025-40096",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40097",
                                "url": "https://ubuntu.com/security/CVE-2025-40097",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40098",
                                "url": "https://ubuntu.com/security/CVE-2025-40098",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40099",
                                "url": "https://ubuntu.com/security/CVE-2025-40099",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40100",
                                "url": "https://ubuntu.com/security/CVE-2025-40100",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40101",
                                "url": "https://ubuntu.com/security/CVE-2025-40101",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40167",
                                "url": "https://ubuntu.com/security/CVE-2025-40167",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40102",
                                "url": "https://ubuntu.com/security/CVE-2025-40102",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40103",
                                "url": "https://ubuntu.com/security/CVE-2025-40103",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40104",
                                "url": "https://ubuntu.com/security/CVE-2025-40104",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40166",
                                "url": "https://ubuntu.com/security/CVE-2025-40166",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40105",
                                "url": "https://ubuntu.com/security/CVE-2025-40105",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40019",
                                "url": "https://ubuntu.com/security/CVE-2025-40019",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40214",
                                "url": "https://ubuntu.com/security/CVE-2025-40214",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * noble/linux-riscv-6.17: 6.17.0-14.14.1~24.04.1 -proposed tracker (LP: #2137844)",
                            "",
                            "  * Enable StarFive VisionFive 2 board (LP: #2013232)",
                            "    - SAUCE: PCI: starfive: Use regulator APIs instead of GPIO APIs to control",
                            "      the 3V3 power supply of PCIe slots",
                            "",
                            "  * Enable Microchip PIC64GX Curiosity Kit (LP: #2074082)",
                            "    - dt-bindings: cache: sifive,ccache0: add a pic64gx compatible",
                            "    - dt-bindings: interrupt-controller: sifive,plic: Add pic64gx",
                            "      compatibility",
                            "    - dt-bindings: gpio: mpfs-gpio: Add pic64gx GPIO compatibility",
                            "    - dt-bindings: net: cdns,macb: Add pic64gx compatibility",
                            "    - riscv: dts: microchip: Minor whitespace cleanup",
                            "    - riscv: dts: microchip: add common board dtsi for icicle kit variants",
                            "    - dt-bindings: riscv: microchip: document icicle kit with production",
                            "      device",
                            "    - riscv: dts: microchip: add icicle kit with production device",
                            "    - riscv: dts: microchip: rename icicle kit ccc clock and other minor fixes",
                            "    - dt-bindings: riscv: microchip: document Discovery Kit",
                            "    - riscv: dts: microchip: add a device tree for Discovery Kit",
                            "    - dt-bindings: soc: microchip: document the simple-mfd syscon on PolarFire",
                            "      SoC",
                            "    - soc: microchip: add mfd drivers for two syscon regions on PolarFire SoC",
                            "    - MAINTAINERS: add new soc drivers to Microchip RISC-V entry",
                            "    - MAINTAINERS: rename Microchip RISC-V entry",
                            "    - dt-bindings: pinctrl: document pic64gx \"gpio2\" pinmux",
                            "    - pinctrl: add pic64gx \"gpio2\" pinmux driver",
                            "    - dt-bindings: pinctrl: document polarfire soc iomux0 pinmux",
                            "    - pinctrl: add polarfire soc iomux0 pinmux driver",
                            "    - MAINTAINERS: add Microchip RISC-V pinctrl drivers/bindings to entry",
                            "    - dt-bindings: clk: microchip: mpfs: remove first reg region",
                            "    - clk: microchip: mpfs: use regmap for clocks",
                            "    - reset: mpfs: add non-auxiliary bus probing",
                            "    - pinctrl: pic64gx-gpio2: Add REGMAP_MMIO dependency",
                            "    - pinctrl: add CONFIG_OF dependencies for microchip drivers",
                            "    - SAUCE: pinctrl: move microchip riscv pinctrl drivers to a folder",
                            "    - SAUCE: pinctrl: add generic functions + pins mapper",
                            "    - SAUCE: dt-bindings: pinctrl: document polarfire soc mssio pin controller",
                            "    - SAUCE: pinctrl: add polarfire soc mssio pinctrl driver",
                            "    - SAUCE: MAINTAINERS: add Microchip mpfs mssio driver/bindings to entry",
                            "    - SAUCE: dt-bindings: soc: microchip: add compatible for the mss-top-",
                            "      sysreg on pic64gx",
                            "    - SAUCE: dt-bindings: soc: microchip: mpfs-sys-controller: Add pic64gx",
                            "      compatibility",
                            "    - SAUCE: soc: microchip: mpfs-sys-controller: add support for pic64gx",
                            "    - SAUCE: dt-bindings: timer: sifive,clint: add pic64gx compatibility",
                            "    - SAUCE: clk: microchip: drop POLARFIRE from ARCH_MICROCHIP_POLARFIRE",
                            "    - SAUCE: dt-bindings: clock: mpfs-ccc: Add pic64gx compatibility",
                            "    - SAUCE: dt-bindings: clock: mpfs-clkcfg: Add pic64gx compatibility",
                            "    - SAUCE: dt-bindings: mbox: add pic64gx mailbox compatibility to mpfs",
                            "      mailbox",
                            "    - SAUCE: mailbox: mpfs: drop POLARFIRE from ARCH_MICROCHIP_POLARFIRE",
                            "    - SAUCE: dt-bindings: riscv: microchip: document the PIC64GX curiosity kit",
                            "    - SAUCE: riscv: dts: microchip: add pic64gx and its curiosity kit",
                            "    - SAUCE: riscv: dts: microchip: remove POLARFIRE mention in Makefile",
                            "    - [Config] riscv: updateconfigs for PIC64GX support",
                            "",
                            "  [ Ubuntu-riscv: 6.17.0-14.14.1 ]",
                            "",
                            "  * questing/linux-riscv: 6.17.0-14.14.1 -proposed tracker (LP: #2137845)",
                            "  * Packaging resync (LP: #1786013)",
                            "    - [Packaging] debian.riscv/dkms-versions -- update from kernel-versions",
                            "      (main/2026.01.12)",
                            "  [ Ubuntu: 6.17.0-14.14 ]",
                            "  * questing/linux: 6.17.0-14.14 -proposed tracker (LP: #2137849)",
                            "  * Packaging resync (LP: #1786013)",
                            "    - [Packaging] debian.master/dkms-versions -- update from kernel-versions",
                            "      (main/2026.01.12)",
                            "  * ubuntu_kselftests:_net/net:gre_gso.sh failing (LP: #2136820)",
                            "    - SAUCE increase socat timeout in gre_gso.sh",
                            "  * ubuntu_blktrace_smoke_test fails on questing with rust coreutils",
                            "    (LP: #2137698)",
                            "    - SAUCE: Revert \"ext4: fail unaligned direct IO write with EINVAL\"",
                            "  * bareudp.sh in ubuntu_kselftests_net fails because of dash default shell",
                            "    (LP: #2129812)",
                            "    - selftests: net: use BASH for bareudp testing",
                            "  * CVE-2025-40256",
                            "    - xfrm: also call xfrm_state_delete_tunnel at destroy time for states that",
                            "      were never added",
                            "  * Enable PMF on AMD HPT/STX/KRK (LP: #2125022)",
                            "    - platform/x86/amd/pmf: Add support for adjusting PMF PPT and PPT APU",
                            "      thresholds",
                            "    - platform/x86/amd/pmf: Extend custom BIOS inputs for more policies",
                            "    - platform/x86/amd/pmf: Update ta_pmf_action structure member",
                            "    - platform/x86/amd/pmf: Add helper to verify BIOS input notifications are",
                            "      enable/disable",
                            "    - platform/x86/amd/pmf: Add custom BIOS input support for AMD_CPU_ID_PS",
                            "    - platform/x86/amd/pmf: Preserve custom BIOS inputs for evaluating the",
                            "      policies",
                            "    - platform/x86/amd/pmf: Call enact function sooner to process early",
                            "      pending requests",
                            "    - platform/x86/amd/pmf: Add debug logs for pending requests and custom",
                            "      BIOS inputs",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850)",
                            "    - iommufd/selftest: Fix ioctl return value in _test_cmd_trigger_vevents()",
                            "    - drm/mediatek: Add pm_runtime support for GCE power control",
                            "    - drm/i915: Fix conversion between clock ticks and nanoseconds",
                            "    - drm/amdgpu: set default gfx reset masks for gfx6-8",
                            "    - drm/amd/display: Don't stretch non-native images by default in eDP",
                            "    - smb: client: fix refcount leak in smb2_set_path_attr",
                            "    - iommufd: Make vfio_compat's unmap succeed if the range is already empty",
                            "    - futex: Optimize per-cpu reference counting",
                            "    - drm/amd: Fix suspend failure with secure display TA",
                            "    - drm/xe: Move declarations under conditional branch",
                            "    - drm/xe: Do clean shutdown also when using flr",
                            "    - drm/amd/display: Add pixel_clock to amd_pp_display_configuration",
                            "    - drm/amd/pm: Use pm_display_cfg in legacy DPM (v2)",
                            "    - drm/amd/display: Disable fastboot on DCE 6 too",
                            "    - drm/amd/pm: Disable MCLK switching on SI at high pixel clocks",
                            "    - drm/amd: Disable ASPM on SI",
                            "    - arm64: kprobes: check the return value of set_memory_rox()",
                            "    - compiler_types: Move unused static inline functions warning to W=2",
                            "    - riscv: Build loader.bin exclusively for Canaan K210",
                            "    - RISC-V: clear hot-unplugged cores from all task mm_cpumasks to avoid",
                            "      rfence errors",
                            "    - riscv: acpi: avoid errors caused by probing DT devices when ACPI is used",
                            "    - fs: return EOPNOTSUPP from file_setattr/file_getattr syscalls",
                            "    - ASoC: nau8821: Avoid unnecessary blocking in IRQ handler",
                            "    - NFS4: Fix state renewals missing after boot",
                            "    - drm/amdkfd: fix suspend/resume all calls in mes based eviction path",
                            "    - NFS4: Apply delay_retrans to async operations",
                            "    - HID: intel-thc-hid: intel-quickspi: Add ARL PCI Device Id's",
                            "    - HID: quirks: avoid Cooler Master MM712 dongle wakeup bug",
                            "    - ixgbe: handle IXGBE_VF_GET_PF_LINK_STATE mailbox operation",
                            "    - HID: nintendo: Wait longer for initial probe",
                            "    - NFS: check if suid/sgid was cleared after a write as needed",
                            "    - HID: quirks: Add ALWAYS_POLL quirk for VRS R295 steering wheel",
                            "    - io_uring: fix unexpected placement on same size resizing",
                            "    - HID: logitech-hidpp: Add HIDPP_QUIRK_RESET_HI_RES_SCROLL",
                            "    - ASoC: max98090/91: fixed max98091 ALSA widget powering up/down",
                            "    - ALSA: hda/realtek: Fix mute led for HP Omen 17-cb0xxx",
                            "    - ixgbe: handle IXGBE_VF_FEATURES_NEGOTIATE mbox cmd",
                            "    - wifi: ath11k: zero init info->status in wmi_process_mgmt_tx_comp()",
                            "    - selftests: net: local_termination: Wait for interfaces to come up",
                            "    - net: fec: correct rx_bytes statistic for the case SHIFT16 is set",
                            "    - net: phy: micrel: Introduce lanphy_modify_page_reg",
                            "    - net: phy: micrel: Replace hardcoded pages with defines",
                            "    - net: phy: micrel: lan8814 fix reset of the QSGMII interface",
                            "    - rust: Add -fno-isolate-erroneous-paths-dereference to",
                            "      bindgen_skip_c_flags",
                            "    - NFSD: Skip close replay processing if XDR encoding fails",
                            "    - Bluetooth: 6lowpan: fix BDADDR_LE vs ADDR_LE_DEV address type confusion",
                            "    - Bluetooth: 6lowpan: Don't hold spin lock over sleeping functions",
                            "    - Bluetooth: hci_conn: Fix not cleaning up PA_LINK connections",
                            "    - net: dsa: tag_brcm: do not mark link local traffic as offloaded",
                            "    - net/smc: fix mismatch between CLC header and proposal",
                            "    - net/handshake: Fix memory leak in tls_handshake_accept()",
                            "    - net: ethernet: ti: am65-cpsw-qos: fix IET verify/response timeout",
                            "    - net: ethernet: ti: am65-cpsw-qos: fix IET verify retry mechanism",
                            "    - net: mdio: fix resource leak in mdiobus_register_device()",
                            "    - wifi: mac80211: skip rate verification for not captured PSDUs",
                            "    - Bluetooth: hci_event: Fix not handling PA Sync Lost event",
                            "    - net/mlx5e: Fix missing error assignment in mlx5e_xfrm_add_state()",
                            "    - net/mlx5e: Fix maxrate wraparound in threshold between units",
                            "    - net/mlx5e: Fix wraparound in rate limiting for values above 255 Gbps",
                            "    - net/mlx5e: Fix potentially misleading debug message",
                            "    - net/mlx5: Fix typo of MLX5_EQ_DOORBEL_OFFSET",
                            "    - net/mlx5: Store the global doorbell in mlx5_priv",
                            "    - net/mlx5e: Prepare for using different CQ doorbells",
                            "    - net_sched: limit try_bulk_dequeue_skb() batches",
                            "    - wifi: iwlwifi: mvm: fix beacon template/fixed rate",
                            "    - wifi: iwlwifi: mld: always take beacon ies in link grading",
                            "    - virtio-net: fix incorrect flags recording in big mode",
                            "    - hsr: Fix supervision frame sending on HSRv0",
                            "    - hsr: Follow standard for HSRv0 supervision frames",
                            "    - ACPI: CPPC: Detect preferred core availability on online CPUs",
                            "    - ACPI: CPPC: Check _CPC validity for only the online CPUs",
                            "    - ACPI: CPPC: Perform fast check switch only for online CPUs",
                            "    - ACPI: CPPC: Limit perf ctrs in PCC check only to online CPUs",
                            "    - cpufreq: intel_pstate: Check IDA only before MSR_IA32_PERF_CTL writes",
                            "    - Bluetooth: L2CAP: export l2cap_chan_hold for modules",
                            "    - io_uring/rsrc: don't use blk_rq_nr_phys_segments() as number of bvecs",
                            "    - acpi,srat: Fix incorrect device handle check for Generic Initiator",
                            "    - regulator: fixed: fix GPIO descriptor leak on register failure",
                            "    - ASoC: cs4271: Fix regulator leak on probe failure",
                            "    - ASoC: codecs: va-macro: fix resource leak in probe error path",
                            "    - drm/vmwgfx: Restore Guest-Backed only cursor plane support",
                            "    - ASoC: tas2781: fix getting the wrong device number",
                            "    - pnfs: Fix TLS logic in _nfs4_pnfs_v3_ds_connect()",
                            "    - pnfs: Fix TLS logic in _nfs4_pnfs_v4_ds_connect()",
                            "    - pnfs: Set transport security policy to RPC_XPRTSEC_NONE unless using TLS",
                            "    - simplify nfs_atomic_open_v23()",
                            "    - NFSv2/v3: Fix error handling in nfs_atomic_open_v23()",
                            "    - NFS: sysfs: fix leak when nfs_client kobject add fails",
                            "    - NFSv4: Fix an incorrect parameter when calling nfs4_call_sync()",
                            "    - drm/amd/amdgpu: Ensure isp_kernel_buffer_alloc() creates a new BO",
                            "    - acpi/hmat: Fix lockdep warning for hmem_register_resource()",
                            "    - ASoC: rsnd: fix OF node reference leak in rsnd_ssiu_probe()",
                            "    - drm/client: fix MODULE_PARM_DESC string for \"active\"",
                            "    - irqchip/riscv-intc: Add missing free() callback in riscv_intc_domain_ops",
                            "    - lib/crypto: arm/curve25519: Disable on CPU_BIG_ENDIAN",
                            "    - hostfs: Fix only passing host root in boot stage with new mount",
                            "    - afs: Fix dynamic lookup to fail on cell lookup failure",
                            "    - mtd: onenand: Pass correct pointer to IRQ handler",
                            "    - virtio-fs: fix incorrect check for fsvq->kobj",
                            "    - fs/namespace: correctly handle errors returned by grab_requested_mnt_ns",
                            "    - perf header: Write bpf_prog (infos|btfs)_cnt to data file",
                            "    - perf build: Don't fail fast path feature detection when binutils-devel",
                            "      is not available",
                            "    - perf lock: Fix segfault due to missing kernel map",
                            "    - perf test shell lock_contention: Extra debug diagnostics",
                            "    - perf test: Fix lock contention test",
                            "    - arm64: dts: rockchip: Set correct pinctrl for I2S1 8ch TX on odroid-m1",
                            "    - arm64: dts: rockchip: Fix PCIe power enable pin for BigTreeTech CB2 and",
                            "      Pi2",
                            "    - arm64: dts: rockchip: Make RK3588 GPU OPP table naming less generic",
                            "    - ARM: dts: imx6ull-engicam-microgea-rmm: fix report-rate-hz value",
                            "    - ARM: dts: imx51-zii-rdu1: Fix audmux node names",
                            "    - arm64: dts: imx8-ss-img: Avoid gpio0_mipi_csi GPIOs being deferred",
                            "    - arm64: dts: imx8mp-kontron: Fix USB OTG role switching",
                            "    - HID: hid-ntrig: Prevent memory leak in ntrig_report_version()",
                            "    - ARM: dts: BCM53573: Fix address of Luxul XAP-1440's Ethernet PHY",
                            "    - arm64: dts: rockchip: Fix USB power enable pin for BTT CB2 and Pi2",
                            "    - arm64: dts: rockchip: drop reset from rk3576 i2c9 node",
                            "    - pwm: adp5585: Correct mismatched pwm chip info",
                            "    - HID: playstation: Fix memory leak in dualshock4_get_calibration_data()",
                            "    - HID: uclogic: Fix potential memory leak in error path",
                            "    - LoongArch: KVM: Restore guest PMU if it is enabled",
                            "    - LoongArch: KVM: Add delay until timer interrupt injected",
                            "    - LoongArch: KVM: Fix max supported vCPUs set with EIOINTC",
                            "    - KVM: arm64: Make all 32bit ID registers fully writable",
                            "    - KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated",
                            "    - KVM: nSVM: Always recalculate LBR MSR intercepts in svm_update_lbrv()",
                            "    - KVM: nSVM: Fix and simplify LBR virtualization handling with nested",
                            "    - KVM: VMX: Fix check for valid GVA on an EPT violation",
                            "    - nfsd: add missing FATTR4_WORD2_CLONE_BLKSIZE from supported attributes",
                            "    - gcov: add support for GCC 15",
                            "    - kho: warn and exit when unpreserved page wasn't preserved",
                            "    - strparser: Fix signed/unsigned mismatch bug",
                            "    - dma-mapping: benchmark: Restore padding to ensure uABI remained",
                            "      consistent",
                            "    - maple_tree: fix tracepoint string pointers",
                            "    - LoongArch: Consolidate early_ioremap()/ioremap_prot()",
                            "    - LoongArch: Use correct accessor to read FWPC/MWPC",
                            "    - LoongArch: Let {pte,pmd}_modify() record the status of _PAGE_DIRTY",
                            "    - mm/damon/sysfs: change next_update_jiffies to a global variable",
                            "    - selftests/tracing: Run sample events to clear page cache events",
                            "    - wifi: mac80211: reject address change while connecting",
                            "    - mm/huge_memory: preserve PG_has_hwpoisoned if a folio is split to >0",
                            "      order",
                            "    - mm/mm_init: fix hash table order logging in alloc_large_system_hash()",
                            "    - mm/damon/stat: change last_refresh_jiffies to a global variable",
                            "    - mm/kmsan: fix kmsan kmalloc hook when no stack depots are allocated yet",
                            "    - mm/shmem: fix THP allocation and fallback loop",
                            "    - mm/mremap: honour writable bit in mremap pte batching",
                            "    - mm/huge_memory: fix folio split check for anon folios in swapcache",
                            "    - mmc: sdhci-of-dwcmshc: Change DLL_STRBIN_TAPNUM_DEFAULT to 0x4",
                            "    - mmc: pxamci: Simplify pxamci_probe() error handling using devm APIs",
                            "    - mmc: dw_mmc-rockchip: Fix wrong internal phase calculate",
                            "    - ASoC: sdw_utils: fix device reference leak in is_sdca_endpoint_present()",
                            "    - crypto: hisilicon/qm - Fix device reference leak in qm_get_qos_value",
                            "    - smb: client: fix cifs_pick_channel when channel needs reconnect",
                            "    - spi: Try to get ACPI GPIO IRQ earlier",
                            "    - x86/microcode/AMD: Add Zen5 model 0x44, stepping 0x1 minrev",
                            "    - x86/CPU/AMD: Add additional fixed RDSEED microcode revisions",
                            "    - selftests/user_events: fix type cast for write_index packed member in",
                            "      perf_test",
                            "    - gendwarfksyms: Skip files with no exports",
                            "    - ftrace: Fix BPF fexit with livepatch",
                            "    - LoongArch: Consolidate max_pfn & max_low_pfn calculation",
                            "    - LoongArch: Use physical addresses for CSR_MERRENTRY/CSR_TLBRENTRY",
                            "    - EDAC/altera: Handle OCRAM ECC enable after warm reset",
                            "    - EDAC/altera: Use INTTEST register for Ethernet and USB SBE injection",
                            "    - PM: hibernate: Emit an error when image writing fails",
                            "    - PM: hibernate: Use atomic64_t for compressed_size variable",
                            "    - btrfs: zoned: fix conventional zone capacity calculation",
                            "    - btrfs: zoned: fix stripe width calculation",
                            "    - btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe()",
                            "    - btrfs: do not update last_log_commit when logging inode due to a new",
                            "      name",
                            "    - btrfs: release root after error in data_reloc_print_warning_inode()",
                            "    - drm/amdkfd: relax checks for over allocation of save area",
                            "    - drm/amdgpu: disable peer-to-peer access for DCC-enabled GC12 VRAM",
                            "      surfaces",
                            "    - drm/i915/psr: fix pipe to vblank conversion",
                            "    - drm/xe/xe3lpg: Extend Wa_15016589081 for xe3lpg",
                            "    - drm/xe/xe3: Extend wa_14023061436",
                            "    - drm/xe/xe3: Add WA_14024681466 for Xe3_LPG",
                            "    - pmdomain: imx: Fix reference count leak in imx_gpc_remove",
                            "    - pmdomain: samsung: plug potential memleak during probe",
                            "    - pmdomain: samsung: Rework legacy splash-screen handover workaround",
                            "    - selftests: mptcp: connect: fix fallback note due to OoO",
                            "    - selftests: mptcp: join: rm: set backup flag",
                            "    - selftests: mptcp: join: endpoints: longer transfer",
                            "    - selftests: mptcp: connect: trunc: read all recv data",
                            "    - selftests: mptcp: join: userspace: longer transfer",
                            "    - selftests: mptcp: join: properly kill background tasks",
                            "    - mm/huge_memory: do not change split_huge_page*() target order silently",
                            "    - mm/memory: do not populate page table entries beyond i_size",
                            "    - scripts/decode_stacktrace.sh: symbol: avoid trailing whitespaces",
                            "    - scripts/decode_stacktrace.sh: symbol: preserve alignment",
                            "    - scripts/decode_stacktrace.sh: fix build ID and PC source parsing",
                            "    - ASoC: da7213: Convert to DEFINE_RUNTIME_DEV_PM_OPS()",
                            "    - ASoC: da7213: Use component driver suspend/resume",
                            "    - KVM: x86: Rename local \"ecx\" variables to \"msr\" and \"pmc\" as appropriate",
                            "    - KVM: x86: Add support for RDMSR/WRMSRNS w/ immediate on Intel",
                            "    - KVM: VMX: Inject #UD if guest tries to execute SEAMCALL or TDCALL",
                            "    - isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe()",
                            "    - net: phy: micrel: Fix lan8814_config_init",
                            "    - Linux 6.17.9",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68204",
                            "    - pmdomain: arm: scmi: Fix genpd leak on provider registration failure",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68203",
                            "    - drm/amdgpu: fix lock warning in amdgpu_userq_fence_driver_process",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40267",
                            "    - io_uring/rw: ensure allocated iovec gets cleared for early failure",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68198",
                            "    - crash: fix crashkernel resource shrink",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68199",
                            "    - codetag: debug: handle existing CODETAG_EMPTY in mark_objexts_empty for",
                            "      slabobj_ext",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40268",
                            "    - cifs: client: fix memory leak in smb3_fs_context_parse_param",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40269",
                            "    - ALSA: usb-audio: Fix potential overflow of PCM transfer buffer",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68205",
                            "    - ALSA: hda/hdmi: Fix breakage at probing nvhdmi-mcp driver",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40270",
                            "    - mm, swap: fix potential UAF issue for VMA readahead",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40271",
                            "    - fs/proc: fix uaf in proc_readdir_de()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40272",
                            "    - mm/secretmem: fix use-after-free race in fault handler",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68245",
                            "    - net: netpoll: fix incorrect refcount handling causing incorrect cleanup",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68240",
                            "    - nilfs2: avoid having an active sc_timer before freeing sci",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68241",
                            "    - ipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68211",
                            "    - ksm: use range-walk function to jump over holes in",
                            "      scan_get_next_rmap_item",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68246",
                            "    - ksmbd: close accepted socket when per-IP limit rejects connection",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40273",
                            "    - NFSD: free copynotify stateid in nfs4_free_ol_stateid()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40212",
                            "    - nfsd: fix refcount leak in nfsd_set_fh_dentry()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40274",
                            "    - KVM: guest_memfd: Remove bindings on memslot deletion when gmem is dying",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68202",
                            "    - sched_ext: Fix unsafe locking in the scx_dump_state()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68239",
                            "    - binfmt_misc: restore write access before closing files opened by",
                            "      open_exec()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68247",
                            "    - posix-timers: Plug potential memory leak in do_timer_create()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68208",
                            "    - bpf: account for current allocated stack depth in",
                            "      widen_imprecise_scalars()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68200",
                            "    - bpf: Add bpf_prog_run_data_pointers()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40275",
                            "    - ALSA: usb-audio: Fix NULL pointer dereference in",
                            "      snd_usb_mixer_controls_badd",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68242",
                            "    - NFS: Fix LTP test failures when timestamps are delegated",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68243",
                            "    - NFS: Check the TLS certificate fields in nfs_match_client()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40276",
                            "    - drm/panthor: Flush shmem writes before mapping buffers CPU-uncached",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40277",
                            "    - drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68206",
                            "    - netfilter: nft_ct: add seqadj extension for natted connections",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68209",
                            "    - mlx5: Fix default values in create CQ",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40278",
                            "    - net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-",
                            "      infoleak",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40279",
                            "    - net: sched: act_connmark: initialize struct tc_ife to fix kernel leak",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40280",
                            "    - tipc: Fix use-after-free in tipc_mon_reinit_self().",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40281",
                            "    - sctp: prevent possible shift-out-of-bounds in sctp_transport_update_rto",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40282",
                            "    - Bluetooth: 6lowpan: reset link-local header on ipv6 recv path",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40283",
                            "    - Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40284",
                            "    - Bluetooth: MGMT: cancel mesh send timer when hdev removed",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68210",
                            "    - erofs: avoid infinite loop due to incomplete zstd-compressed data",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40285",
                            "    - smb/server: fix possible refcount leak in smb2_sess_setup()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40286",
                            "    - smb/server: fix possible memory leak in smb2_read()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40287",
                            "    - exfat: fix improper check of dentry.stream.valid_size",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40288",
                            "    - drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40289",
                            "    - drm/amdgpu: hide VRAM sysfs attributes on GPUs without VRAM",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68201",
                            "    - drm/amdgpu: remove two invalid BUG_ON()s",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68207",
                            "    - drm/xe/guc: Synchronize Dead CT worker with unbind",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68244",
                            "    - drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833)",
                            "    - Revert \"Bluetooth: L2CAP: convert timeouts to secs_to_jiffies()\"",
                            "    - sched_ext: Mark scx_bpf_dsq_move_set_[slice|vtime]() with KF_RCU",
                            "    - net: usb: asix_devices: Check return value of usbnet_get_endpoints",
                            "    - fbdev: atyfb: Check if pll_ops->init_pll failed",
                            "    - ACPI: button: Call input_free_device() on failing input device",
                            "      registration",
                            "    - ACPI: fan: Use platform device for devres-related actions",
                            "    - virtio-net: drop the multi-buffer XDP packet in zerocopy",
                            "    - batman-adv: Release references to inactive interfaces",
                            "    - Bluetooth: rfcomm: fix modem control handling",
                            "    - net: phy: dp83867: Disable EEE support as not implemented",
                            "    - fbdev: pvr2fb: Fix leftover reference to ONCHIP_NR_DMA_CHANNELS",
                            "    - fbdev: valkyriefb: Fix reference count leak in valkyriefb_init",
                            "    - mptcp: drop bogus optimization in __mptcp_check_push()",
                            "    - mptcp: restore window probe",
                            "    - ASoC: qdsp6: q6asm: do not sleep while atomic",
                            "    - ASoC: renesas: rz-ssi: Use proper dma_buffer_pos after resume",
                            "    - s390/pci: Restore IRQ unconditionally for the zPCI device",
                            "    - x86/build: Disable SSE4a",
                            "    - wifi: ath10k: Fix memory leak on unsupported WMI command",
                            "    - wifi: ath11k: Add missing platform IDs for quirk table",
                            "    - wifi: ath12k: free skb during idr cleanup callback",
                            "    - wifi: ath11k: avoid bit operation on key flags",
                            "    - drm/msm/a6xx: Fix GMU firmware parser",
                            "    - ALSA: usb-audio: fix control pipe direction",
                            "    - ASoC: cs-amp-lib-test: Fix missing include of kunit/test-bug.h",
                            "    - wifi: mac80211: reset FILS discovery and unsol probe resp intervals",
                            "    - wifi: mac80211: fix key tailroom accounting leak",
                            "    - wifi: nl80211: call kfree without a NULL check",
                            "    - kunit: test_dev_action: Correctly cast 'priv' pointer to long*",
                            "    - scsi: ufs: core: Initialize value of an attribute returned by uic cmd",
                            "    - scsi: core: Fix the unit attention counter implementation",
                            "    - bpf: Do not audit capability check in do_jit()",
                            "    - nvmet-auth: update sc_c in host response",
                            "    - crypto: s390/phmac - Do not modify the req->nbytes value",
                            "    - ASoC: Intel: avs: Unprepare a stream when XRUN occurs",
                            "    - ASoC: fsl_sai: fix bit order for DSD format",
                            "    - ASoC: fsl_micfil: correct the endian format for DSD",
                            "    - libbpf: Fix powerpc's stack register definition in bpf_tracing.h",
                            "    - ASoC: mediatek: Fix double pm_runtime_disable in remove functions",
                            "    - Bluetooth: ISO: Fix BIS connection dst_type handling",
                            "    - Bluetooth: btmtksdio: Add pmctrl handling for BT closed state during",
                            "      reset",
                            "    - Bluetooth: HCI: Fix tracking of advertisement set/instance 0x00",
                            "    - Bluetooth: ISO: Fix another instance of dst_type handling",
                            "    - Bluetooth: btintel_pcie: Fix event packet loss issue",
                            "    - Bluetooth: hci_conn: Fix connection cleanup with BIG with 2 or more BIS",
                            "    - Bluetooth: hci_core: Fix tracking of periodic advertisement",
                            "    - bpf: Conditionally include dynptr copy kfuncs",
                            "    - drm/msm: Ensure vm is created in VM_BIND ioctl",
                            "    - ALSA: usb-audio: add mono main switch to Presonus S1824c",
                            "    - ALSA: usb-audio: don't log messages meant for 1810c when initializing",
                            "      1824c",
                            "    - ACPI: MRRM: Check revision of MRRM table",
                            "    - drm/etnaviv: fix flush sequence logic",
                            "    - tools: ynl: fix string attribute length to include null terminator",
                            "    - net: hns3: return error code when function fails",
                            "    - sfc: fix potential memory leak in efx_mae_process_mport()",
                            "    - tools: ynl: avoid print_field when there is no reply",
                            "    - dpll: spec: add missing module-name and clock-id to pin-get reply",
                            "    - ASoC: fsl_sai: Fix sync error in consumer mode",
                            "    - ASoC: soc_sdw_utils: remove cs42l43 component_name",
                            "    - drm/amd/pm: fix smu table id bound check issue in smu_cmn_update_table()",
                            "    - drm/amd/pm/powerplay/smumgr: Fix PCIeBootLinkLevel value on Fiji",
                            "    - drm/amd/pm/powerplay/smumgr: Fix PCIeBootLinkLevel value on Iceland",
                            "    - drm/amdgpu: fix SPDX headers on amdgpu_cper.c/h",
                            "    - drm/amdgpu: fix SPDX header on amd_cper.h",
                            "    - drm/amdgpu: fix SPDX header on irqsrcs_vcn_5_0.h",
                            "    - ACPI: fan: Use ACPI handle when retrieving _FST",
                            "    - block: fix op_is_zone_mgmt() to handle REQ_OP_ZONE_RESET_ALL",
                            "    - block: make REQ_OP_ZONE_OPEN a write operation",
                            "    - dma-fence: Fix safe access wrapper to call timeline name method",
                            "    - kbuild: align modinfo section for Secureboot Authenticode EDK2 compat",
                            "    - regmap: irq: Correct documentation of wake_invert flag",
                            "    - [Config] Disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP for s390x",
                            "    - s390/mm: Fix memory leak in add_marker() when kvrealloc() fails",
                            "    - drm/xe: Do not wake device during a GT reset",
                            "    - drm/sched: avoid killing parent entity on child SIGKILL",
                            "    - drm/sched: Fix race in drm_sched_entity_select_rq()",
                            "    - drm/nouveau: Fix race in nouveau_sched_fini()",
                            "    - drm/i915/dmc: Clear HRR EVT_CTL/HTP to zero on ADL-S",
                            "    - drm/ast: Clear preserved bits from register output value",
                            "    - drm/amd: Check that VPE has reached DPM0 in idle handler",
                            "    - drm/amd/display: Fix incorrect return of vblank enable on unconfigured",
                            "      crtc",
                            "    - drm/amd/display: Don't program BLNDGAM_MEM_PWR_FORCE when CM low-power",
                            "      is disabled on DCN30",
                            "    - drm/amd/display: Add HDR workaround for a specific eDP",
                            "    - mptcp: leverage skb deferral free",
                            "    - mptcp: fix MSG_PEEK stream corruption",
                            "    - cpuidle: governors: menu: Rearrange main loop in menu_select()",
                            "    - cpuidle: governors: menu: Select polling state in some more cases",
                            "    - PM: hibernate: Combine return paths in power_down()",
                            "    - PM: sleep: Allow pm_restrict_gfp_mask() stacking",
                            "    - mfd: kempld: Switch back to earlier ->init() behavior",
                            "    - soc: aspeed: socinfo: Add AST27xx silicon IDs",
                            "    - firmware: qcom: scm: preserve assign_mem() error return value",
                            "    - soc: qcom: smem: Fix endian-unaware access of num_entries",
                            "    - spi: loopback-test: Don't use %pK through printk",
                            "    - spi: spi-qpic-snand: handle 'use_ecc' parameter of",
                            "      qcom_spi_config_cw_read()",
                            "    - soc: ti: pruss: don't use %pK through printk",
                            "    - bpf: Don't use %pK through printk",
                            "    - mmc: sdhci: Disable SD card clock before changing parameters",
                            "    - pinctrl: single: fix bias pull up/down handling in pin_config_set",
                            "    - mmc: host: renesas_sdhi: Fix the actual clock",
                            "    - memstick: Add timeout to prevent indefinite waiting",
                            "    - cpufreq: ti: Add support for AM62D2",
                            "    - bpf: Use tnums for JEQ/JNE is_branch_taken logic",
                            "    - firmware: ti_sci: Enable abort handling of entry to LPM",
                            "    - firewire: ohci: move self_id_complete tracepoint after validating",
                            "      register",
                            "    - irqchip/sifive-plic: Respect mask state when setting affinity",
                            "    - irqchip/loongson-eiointc: Route interrupt parsed from bios table",
                            "    - ACPI: sysfs: Use ACPI_FREE() for freeing an ACPI object",
                            "    - ACPI: video: force native for Lenovo 82K8",
                            "    - libbpf: Fix USDT SIB argument handling causing unrecognized register",
                            "      error",
                            "    - selftests/bpf: Fix bpf_prog_detach2 usage in test_lirc_mode2",
                            "    - arm64: versal-net: Update rtc calibration value",
                            "    - Revert \"UBUNTU: SAUCE: firmware: qcom: scm: Allow QSEECOM on Dell",
                            "      Inspiron 7441 / Latitude 7455\"",
                            "    - firmware: qcom: scm: Allow QSEECOM on Dell Inspiron 7441 / Latitude 7455",
                            "    - kselftest/arm64: tpidr2: Switch to waitpid() over wait4()",
                            "    - arc: Fix __fls() const-foldability via __builtin_clzl()",
                            "    - selftests/bpf: Upon failures, exit with code 1 in test_xsk.sh",
                            "    - irqchip/gic-v2m: Handle Multiple MSI base IRQ Alignment",
                            "    - ACPI: PRM: Skip handlers with NULL handler_address or NULL VA",
                            "    - ACPI: resource: Skip IRQ override on ASUS Vivobook Pro N6506CU",
                            "    - ACPI: scan: Add Intel CVS ACPI HIDs to acpi_ignore_dep_ids[]",
                            "    - thermal: gov_step_wise: Allow cooling level to be reduced earlier",
                            "    - thermal: intel: selftests: workload_hint: Mask unsupported types",
                            "    - power: supply: qcom_battmgr: add OOI chemistry",
                            "    - hwmon: (k10temp) Add thermal support for AMD Family 1Ah-based models",
                            "    - hwmon: (k10temp) Add device ID for Strix Halo",
                            "    - hwmon: (lenovo-ec-sensors) Update P8 supprt",
                            "    - hwmon: (sbtsi_temp) AMD CPU extended temperature range support",
                            "    - pinctrl: renesas: rzg2l: Add suspend/resume support for Schmitt control",
                            "      registers",
                            "    - pinctrl: keembay: release allocated memory in detach path",
                            "    - power: supply: sbs-charger: Support multiple devices",
                            "    - io_uring/rsrc: respect submitter_task in io_register_clone_buffers()",
                            "    - hwmon: sy7636a: add alias",
                            "    - selftests/bpf: Fix incorrect array size calculation",
                            "    - block: check for valid bio while splitting",
                            "    - irqchip/loongson-pch-lpc: Use legacy domain for PCH-LPC IRQ controller",
                            "    - cpufreq: ondemand: Update the efficient idle check for Intel extended",
                            "      Families",
                            "    - arm64: zynqmp: Disable coresight by default",
                            "    - arm64: zynqmp: Revert usb node drive strength and slew rate for zcu106",
                            "    - soc/tegra: fuse: Add Tegra114 nvmem cells and fuse lookups",
                            "    - ARM: tegra: p880: set correct touchscreen clipping",
                            "    - ARM: tegra: transformer-20: add missing magnetometer interrupt",
                            "    - ARM: tegra: transformer-20: fix audio-codec interrupt",
                            "    - firmware: qcom: tzmem: disable sc7180 platform",
                            "    - soc: ti: k3-socinfo: Add information for AM62L SR1.1",
                            "    - mmc: sdhci-msm: Enable tuning for SDR50 mode for SD card",
                            "    - pwm: pca9685: Use bulk write to atomicially update registers",
                            "    - ACPICA: dispatcher: Use acpi_ds_clear_operands() in",
                            "      acpi_ds_call_control_method()",
                            "    - tee: allow a driver to allocate a tee_device without a pool",
                            "    - kunit: Enable PCI on UML without triggering WARN()",
                            "    - selftests/bpf: Fix arena_spin_lock selftest failure",
                            "    - bpf: Do not limit bpf_cgroup_from_id to current's namespace",
                            "    - i3c: mipi-i3c-hci-pci: Add support for Intel Wildcat Lake-U I3C",
                            "    - rust: kunit: allow `cfg` on `test`s",
                            "    - video: backlight: lp855x_bl: Set correct EPROM start for LP8556",
                            "    - i3c: dw: Add shutdown support to dw_i3c_master driver",
                            "    - io_uring/zcrx: check all niovs filled with dma addresses",
                            "    - tools/cpupower: fix error return value in cpupower_write_sysfs()",
                            "    - io_uring/zcrx: account niov arrays to cgroup",
                            "    - pmdomain: apple: Add \"apple,t8103-pmgr-pwrstate\"",
                            "    - power: supply: qcom_battmgr: handle charging state change notifications",
                            "    - bpftool: Fix -Wuninitialized-const-pointer warnings with clang >= 21",
                            "    - cpuidle: Fail cpuidle device registration if there is one already",
                            "    - selftests/bpf: Fix selftest verifier_arena_large failure",
                            "    - selftests: ublk: fix behavior when fio is not installed",
                            "    - spi: rpc-if: Add resume support for RZ/G3E",
                            "    - ACPI: SPCR: Support Precise Baud Rate field",
                            "    - clocksource/drivers/vf-pit: Replace raw_readl/writel to readl/writel",
                            "    - clocksource/drivers/timer-rtl-otto: Work around dying timers",
                            "    - clocksource/drivers/timer-rtl-otto: Do not interfere with interrupts",
                            "    - riscv: bpf: Fix uninitialized symbol 'retval_off'",
                            "    - bpf: Clear pfmemalloc flag when freeing all fragments",
                            "    - selftests: drv-net: Pull data before parsing headers",
                            "    - nvme: Use non zero KATO for persistent discovery connections",
                            "    - uprobe: Do not emulate/sstep original instruction when ip is changed",
                            "    - hwmon: (asus-ec-sensors) increase timeout for locking ACPI mutex",
                            "    - hwmon: (dell-smm) Remove Dell Precision 490 custom config data",
                            "    - hwmon: (dell-smm) Add support for Dell OptiPlex 7040",
                            "    - tools/cpupower: Fix incorrect size in cpuidle_state_disable()",
                            "    - selftests/bpf: Fix flaky bpf_cookie selftest",
                            "    - tools/power turbostat: Fix incorrect sorting of PMT telemetry",
                            "    - tools/power x86_energy_perf_policy: Fix incorrect fopen mode usage",
                            "    - tools/power x86_energy_perf_policy: Enhance HWP enable",
                            "    - tools/power x86_energy_perf_policy: Prefer driver HWP limits",
                            "    - mfd: simple-mfd-i2c: Add compatible strings for Layerscape QIXIS FPGA",
                            "    - mfd: stmpe: Remove IRQ domain upon removal",
                            "    - mfd: stmpe-i2c: Add missing MODULE_LICENSE",
                            "    - mfd: qnap-mcu: Handle errors returned from qnap_mcu_write",
                            "    - mfd: qnap-mcu: Include linux/types.h in qnap-mcu.h shared header",
                            "    - mfd: madera: Work around false-positive -Wininitialized warning",
                            "    - mfd: da9063: Split chip variant reading in two bus transactions",
                            "    - mfd: macsmc: Add \"apple,t8103-smc\" compatible",
                            "    - mfd: core: Increment of_node's refcount before linking it to the",
                            "      platform device",
                            "    - mfd: cs42l43: Move IRQ enable/disable to encompass force suspend",
                            "    - mfd: intel-lpss: Add Intel Wildcat Lake LPSS PCI IDs",
                            "    - drm/xe/ptl: Apply Wa_16026007364",
                            "    - drm/xe/configfs: Enforce canonical device names",
                            "    - drm/amd/display: Update tiled to tiled copy command",
                            "    - drm/amd/display: fix condition for setting timing_adjust_pending",
                            "    - drm/amd/display: ensure committing streams is seamless",
                            "    - drm/amdgpu: add range check for RAS bad page address",
                            "    - drm/amdgpu: Check vcn sram load return value",
                            "    - drm/amd/display: Remove check DPIA HPD status for BW Allocation",
                            "    - drm/amd/display: Increase AUX Intra-Hop Done Max Wait Duration",
                            "    - drm/amd/display: Fix dmub_cmd header alignment",
                            "    - drm/xe/guc: Add more GuC load error status codes",
                            "    - drm/xe/pf: Don't resume device from restart worker",
                            "    - drm/amdgpu: Fix build error when CONFIG_SUSPEND is disabled",
                            "    - drm/amdgpu: Update IPID value for bad page threshold CPER",
                            "    - drm/amdgpu: Avoid rma causes GPU duplicate reset",
                            "    - drm/amdgpu: Effective health check before reset",
                            "    - drm/amd/amdgpu: Release xcp drm memory after unplug",
                            "    - drm/amdgpu: Fix vcn v5.0.1 poison irq call trace",
                            "    - drm/xe: Extend wa_13012615864 to additional Xe2 and Xe3 platforms",
                            "    - drm/amdgpu: Skip poison aca bank from UE channel",
                            "    - drm/amd/display: add more cyan skillfish devices",
                            "    - drm/amdgpu: Initialize jpeg v5_0_1 ras function",
                            "    - drm/amdgpu: skip mgpu fan boost for multi-vf",
                            "    - drm/amd/display: fix dmub access race condition",
                            "    - drm/amd/display: update dpp/disp clock from smu clock table",
                            "    - drm/amd/pm: Use cached metrics data on aldebaran",
                            "    - drm/amd/pm: Use cached metrics data on arcturus",
                            "    - accel/amdxdna: Unify pm and rpm suspend and resume callbacks",
                            "    - drm/amdgpu/jpeg: Hold pg_lock before jpeg poweroff",
                            "    - drm/xe/pf: Program LMTT directory pointer on all GTs within a tile",
                            "    - drm/nouveau: replace snprintf() with scnprintf() in nvkm_snprintbf()",
                            "    - ASoC: tas2781: Add keyword \"init\" in profile section",
                            "    - ASoC: mediatek: Use SND_JACK_AVOUT for HDMI/DP jacks",
                            "    - drm/amd/display: Reset apply_eamless_boot_optimization when dpms_off",
                            "    - drm/amdgpu: add to custom amdgpu_drm_release drm_dev_enter/exit",
                            "    - drm/amd/display: Wait until OTG enable state is cleared",
                            "    - drm/xe: rework PDE PAT index selection",
                            "    - docs: kernel-doc: avoid script crash on ancient Python",
                            "    - drm/sharp-memory: Do not access GEM-DMA vaddr directly",
                            "    - PCI: Disable MSI on RDC PCI to PCIe bridges",
                            "    - drm/nouveau: always set RMDevidCheckIgnore for GSP-RM",
                            "    - drm/panel-edp: Add SHP LQ134Z1 panel for Dell XPS 9345",
                            "    - selftests/net: Replace non-standard __WORDSIZE with sizeof(long) * 8",
                            "    - selftests/net: Ensure assert() triggers in psock_tpacket.c",
                            "    - wifi: rtw89: print just once for unknown C2H events",
                            "    - wifi: rtw88: sdio: use indirect IO for device registers before power-on",
                            "    - wifi: rtw89: add dummy C2H handlers for BCN resend and update done",
                            "    - drm/amdkfd: return -ENOTTY for unsupported IOCTLs",
                            "    - selftests: drv-net: devmem: add / correct the IPv6 support",
                            "    - selftests: drv-net: devmem: flip the direction of Tx tests",
                            "    - media: pci: ivtv: Don't create fake v4l2_fh",
                            "    - media: amphion: Delete v4l2_fh synchronously in .release()",
                            "    - drm/tidss: Use the crtc_* timings when programming the HW",
                            "    - drm/bridge: cdns-dsi: Fix REG_WAKEUP_TIME value",
                            "    - drm/bridge: cdns-dsi: Don't fail on MIPI_DSI_MODE_VIDEO_BURST",
                            "    - drm/tidss: Set crtc modesetting parameters with adjusted mode",
                            "    - drm/tidss: Remove early fb",
                            "    - RDMA/mana_ib: Drain send wrs of GSI QP",
                            "    - media: i2c: Kconfig: Ensure a dependency on HAVE_CLK for",
                            "      VIDEO_CAMERA_SENSOR",
                            "    - PCI/ERR: Update device error_state already after reset",
                            "    - x86/vsyscall: Do not require X86_PF_INSTR to emulate vsyscall",
                            "    - net: stmmac: Check stmmac_hw_setup() in stmmac_resume()",
                            "    - ice: Don't use %pK through printk or tracepoints",
                            "    - thunderbolt: Use is_pciehp instead of is_hotplug_bridge",
                            "    - ASoC: es8323: enable DAPM power widgets for playback DAC and output",
                            "    - powerpc/eeh: Use result of error_detected() in uevent",
                            "    - s390/pci: Use pci_uevent_ers() in PCI recovery",
                            "    - bridge: Redirect to backup port when port is administratively down",
                            "    - selftests: drv-net: wait for carrier",
                            "    - net: phy: mscc: report and configure in-band auto-negotiation for",
                            "      SGMII/QSGMII",
                            "    - scsi: ufs: host: mediatek: Fix auto-hibern8 timer configuration",
                            "    - scsi: ufs: host: mediatek: Fix PWM mode switch issue",
                            "    - scsi: ufs: host: mediatek: Assign power mode userdata before FASTAUTO",
                            "      mode change",
                            "    - scsi: ufs: host: mediatek: Change reset sequence for improved stability",
                            "    - scsi: ufs: host: mediatek: Fix invalid access in vccqx handling",
                            "    - gpu: nova-core: register: allow fields named `offset`",
                            "    - drm/panthor: Serialize GPU cache flush operations",
                            "    - HID: pidff: Use direction fix only for conditional effects",
                            "    - HID: pidff: PERMISSIVE_CONTROL quirk autodetection",
                            "    - drm/bridge: display-connector: don't set OP_DETECT for DisplayPorts",
                            "    - drm/amdkfd: Handle lack of READ permissions in SVM mapping",
                            "    - drm/amdgpu: refactor bad_page_work for corner case handling",
                            "    - hwrng: timeriomem - Use us_to_ktime() where appropriate",
                            "    - iio: adc: spear_adc: mask SPEAR_ADC_STATUS channel and avg sample before",
                            "      setting register",
                            "    - iio: adc: imx93_adc: load calibrated values even calibration failed",
                            "    - usb: gadget: f_ncm: Fix MAC assignment NCM ethernet",
                            "    - ASoC: es8323: remove DAC enablement write from es8323_probe",
                            "    - ASoC: es8323: add proper left/right mixer controls via DAPM",
                            "    - ASoC: codecs: wsa883x: Handle shared reset GPIO for WSA883x speakers",
                            "    - drm/xe: Make page size consistent in loop",
                            "    - wifi: rtw89: wow: remove notify during WoWLAN net-detect",
                            "    - wifi: rtw89: fix BSSID comparison for non-transmitted BSSID",
                            "    - wifi: rtw89: 8851b: rfk: update IQK TIA setting",
                            "    - dm error: mark as DM_TARGET_PASSES_INTEGRITY",
                            "    - char: misc: Make misc_register() reentry for miscdevice who wants",
                            "      dynamic minor",
                            "    - char: misc: Does not request module for miscdevice with dynamic minor",
                            "    - net: When removing nexthops, don't call synchronize_net if it is not",
                            "      necessary",
                            "    - net: Call trace_sock_exceed_buf_limit() for memcg failure with",
                            "      SK_MEM_RECV.",
                            "    - dmaengine: idxd: Add a new IAA device ID for Wildcat Lake family",
                            "      platforms",
                            "    - PCI/P2PDMA: Fix incorrect pointer usage in devm_kfree() call",
                            "    - bnxt_en: Add Hyper-V VF ID",
                            "    - tty: serial: Modify the use of dev_err_probe()",
                            "    - ALSA: usb-audio: Add validation of UAC2/UAC3 effect units",
                            "    - Octeontx2-af: Broadcast XON on all channels",
                            "    - idpf: do not linearize big TSO packets",
                            "    - drm/xe/pcode: Initialize data0 for pcode read routine",
                            "    - drm/panel: ilitek-ili9881c: turn off power-supply when init fails",
                            "    - drm/panel: ilitek-ili9881c: move display_on/_off dcs calls to",
                            "      (un-)prepare",
                            "    - rds: Fix endianness annotation for RDS_MPATH_HASH",
                            "    - net: wangxun: limit tx_max_coalesced_frames_irq",
                            "    - iio: imu: bmi270: Match PNP ID found on newer GPD firmware",
                            "    - media: ipu6: isys: Set embedded data type correctly for metadata formats",
                            "    - rpmsg: char: Export alias for RPMSG ID rpmsg-raw from table",
                            "    - net: ipv4: allow directed broadcast routes to use dst hint",
                            "    - scsi: mpi3mr: Fix device loss during enclosure reboot due to zero link",
                            "      speed",
                            "    - wifi: rtw89: coex: Limit Wi-Fi scan slot cost to avoid A2DP glitch",
                            "    - scsi: mpi3mr: Fix I/O failures during controller reset",
                            "    - scsi: mpi3mr: Fix controller init failure on fault during queue creation",
                            "    - scsi: pm80xx: Fix race condition caused by static variables",
                            "    - extcon: adc-jack: Fix wakeup source leaks on device unbind",
                            "    - extcon: fsa9480: Fix wakeup source leaks on device unbind",
                            "    - extcon: axp288: Fix wakeup source leaks on device unbind",
                            "    - drm/xe: Set GT as wedged before sending wedged uevent",
                            "    - remoteproc: wkup_m3: Use devm_pm_runtime_enable() helper",
                            "    - drm/xe/wcl: Extend L3bank mask workaround",
                            "    - net: phy: fixed_phy: let fixed_phy_unregister free the phy_device",
                            "    - selftests: drv-net: hds: restore hds settings",
                            "    - fuse: zero initialize inode private data",
                            "    - virtio_fs: fix the hash table using in virtio_fs_enqueue_req()",
                            "    - selftests: pci_endpoint: Skip IRQ test if IRQ is out of range.",
                            "    - drm/xe: Ensure GT is in C0 during resumes",
                            "    - misc: pci_endpoint_test: Skip IRQ tests if irq is out of range",
                            "    - drm/amdgpu: Correct the loss of aca bank reg info",
                            "    - drm/amdgpu: Correct the counts of nr_banks and nr_errors",
                            "    - drm/amdkfd: fix vram allocation failure for a special case",
                            "    - drm/amd/display: Support HW cursor 180 rot for any number of pipe splits",
                            "    - drm/amdkfd: Tie UNMAP_LATENCY to queue_preemption",
                            "    - drm/amd/display: wait for otg update pending latch before clock",
                            "      optimization",
                            "    - drm/amd/display: Consider sink max slice width limitation for dsc",
                            "    - drm/amdgpu/vpe: cancel delayed work in hw_fini",
                            "    - drm/xe: Cancel pending TLB inval workers on teardown",
                            "    - net: Prevent RPS table overwrite of active flows",
                            "    - eth: fbnic: Reset hw stats upon PCI error",
                            "    - wifi: iwlwifi: mld: trigger mlo scan only when not in EMLSR",
                            "    - platform/x86/intel-uncore-freq: Fix warning in partitioned system",
                            "    - drm/msm/dpu: Filter modes based on adjusted mode clock",
                            "    - drm/msm: Use of_reserved_mem_region_to_resource() for \"memory-region\"",
                            "    - selftests: drv-net: rss_ctx: fix the queue count check",
                            "    - media: fix uninitialized symbol warnings",
                            "    - media: pci: mgb4: Fix timings comparison in VIDIOC_S_DV_TIMINGS",
                            "    - ASoC: SOF: ipc4-pcm: Add fixup for channels",
                            "    - drm/amdgpu: Notify pmfw bad page threshold exceeded",
                            "    - drm/amd/display: Increase minimum clock for TMDS 420 with pipe splitting",
                            "    - drm/amdgpu: Avoid jpeg v5.0.1 poison irq call trace on sriov guest",
                            "    - drm/amd/display: incorrect conditions for failing dto calculations",
                            "    - drm/amdgpu: Avoid vcn v5.0.1 poison irq call trace on sriov guest",
                            "    - drm/amdgpu: Respect max pixel clock for HDMI and DVI-D (v2)",
                            "    - mips: lantiq: danube: add missing properties to cpu node",
                            "    - mips: lantiq: danube: add model to EASY50712 dts",
                            "    - mips: lantiq: danube: add missing device_type in pci node",
                            "    - mips: lantiq: xway: sysctrl: rename stp clock",
                            "    - mips: lantiq: danube: rename stp node on EASY50712 reference board",
                            "    - inet_diag: annotate data-races in inet_diag_bc_sk()",
                            "    - microchip: lan865x: add ndo_eth_ioctl handler to enable PHY ioctl",
                            "      support",
                            "    - crypto: qat - use kcalloc() in qat_uclo_map_objs_from_mof()",
                            "    - scsi: pm8001: Use int instead of u32 to store error codes",
                            "    - iio: adc: ad7124: do not require mclk",
                            "    - scsi: ufs: exynos: fsd: Gate ref_clk and put UFS device in reset on",
                            "      suspend",
                            "    - media: imx-mipi-csis: Only set clock rate when specified in DT",
                            "    - wifi: iwlwifi: pcie: remember when interrupts are disabled",
                            "    - drm/st7571-i2c: add support for inverted pixel format",
                            "    - ptp: Limit time setting of PTP clocks",
                            "    - dmaengine: sh: setup_xref error handling",
                            "    - dmaengine: mv_xor: match alloc_wc and free_wc",
                            "    - dmaengine: dw-edma: Set status for callback_result",
                            "    - netfilter: nf_tables: all transaction allocations can now sleep",
                            "    - drm/msm/dsi/phy: Toggle back buffer resync after preparing PLL",
                            "    - drm/msm/dsi/phy_7nm: Fix missing initial VCO rate",
                            "    - drm/amdgpu: Allow kfd CRIU with no buffer objects",
                            "    - drm/xe/guc: Increase GuC crash dump buffer size",
                            "    - drm/amd/pm: Increase SMC timeout on SI and warn (v3)",
                            "    - move_mount(2): take sanity checks in 'beneath' case into do_lock_mount()",
                            "    - selftests: drv-net: rss_ctx: make the test pass with few queues",
                            "    - ipv6: Add sanity checks on ipv6_devconf.rpl_seg_enabled",
                            "    - drm/xe: Extend Wa_22021007897 to Xe3 platforms",
                            "    - wifi: mac80211: count reg connection element in the size",
                            "    - drm/panthor: check bo offset alignment in vm bind",
                            "    - drm: panel-backlight-quirks: Make EDID match optional",
                            "    - ixgbe: reduce number of reads when getting OROM data",
                            "    - netlink: specs: fou: change local-v6/peer-v6 check",
                            "    - net: nfc: nci: Increase NCI_DATA_TIMEOUT to 3000 ms",
                            "    - media: adv7180: Add missing lock in suspend callback",
                            "    - media: adv7180: Do not write format to device in set_fmt",
                            "    - media: adv7180: Only validate format in querystd",
                            "    - media: verisilicon: Explicitly disable selection api ioctls for decoders",
                            "    - wifi: mac80211: Fix 6 GHz Band capabilities element advertisement in",
                            "      lower bands",
                            "    - platform/x86: think-lmi: Add extra TC BIOS error messages",
                            "    - platform/x86/intel-uncore-freq: Present unique domain ID per package",
                            "    - ALSA: usb-audio: apply quirk for MOONDROP Quark2",
                            "    - PCI: imx6: Enable the Vaux supply if available",
                            "    - drm/xe/guc: Set upper limit of H2G retries over CTB",
                            "    - net: call cond_resched() less often in __release_sock()",
                            "    - smsc911x: add second read of EEPROM mac when possible corruption seen",
                            "    - drm/xe: improve dma-resv handling for backup object",
                            "    - iommu/amd: Add support to remap/unmap IOMMU buffers for kdump",
                            "    - iommu/amd: Skip enabling command/event buffers for kdump",
                            "    - iommu/amd: Reuse device table for kdump",
                            "    - crypto: ccp: Skip SEV and SNP INIT for kdump boot",
                            "    - iommu/apple-dart: Clear stream error indicator bits for T8110 DARTs",
                            "    - bus: mhi: host: pci_generic: Add support for all Foxconn T99W696 SKU",
                            "      variants",
                            "    - drm/amdgpu: Correct info field of bad page threshold exceed CPER",
                            "    - drm/amd: add more cyan skillfish PCI ids",
                            "    - drm/amdgpu: don't enable SMU on cyan skillfish",
                            "    - drm/amdgpu: add support for cyan skillfish gpu_info",
                            "    - drm/amd/display: Fix pbn_div Calculation Error",
                            "    - drm/amd/display: dont wait for pipe update during medupdate/highirq",
                            "    - drm/amd/pm: refine amdgpu pm sysfs node error code",
                            "    - drm/amd/display: Indicate when custom brightness curves are in use",
                            "    - selftests: ncdevmem: don't retry EFAULT",
                            "    - net: dsa: felix: support phy-mode = \"10g-qxgmii\"",
                            "    - usb: gadget: f_hid: Fix zero length packet transfer",
                            "    - serial: qcom-geni: Add DFS clock mode support to GENI UART driver",
                            "    - serdev: Drop dev_pm_domain_detach() call",
                            "    - tty/vt: Add missing return value for VT_RESIZE in vt_ioctl()",
                            "    - eeprom: at25: support Cypress FRAMs without device ID",
                            "    - drm/msm/adreno: Add speedbins for A663 GPU",
                            "    - drm/msm: Fix 32b size truncation",
                            "    - dt-bindings: display/msm/gmu: Update Adreno 623 bindings",
                            "    - drm/msm: make sure to not queue up recovery more than once",
                            "    - char: Use list_del_init() in misc_deregister() to reinitialize list",
                            "      pointer",
                            "    - drm/msm/adreno: Add speedbin data for A623 GPU",
                            "    - drm/msm/adreno: Add fenced regwrite support",
                            "    - drm/msm/a6xx: Switch to GMU AO counter",
                            "    - idpf: link NAPIs to queues",
                            "    - selftests: net: make the dump test less sensitive to mem accounting",
                            "    - PCI: endpoint: pci-epf-test: Limit PCIe BAR size for fixed BARs",
                            "    - wifi: rtw89: Add USB ID 2001:332a for D-Link AX9U rev. A1",
                            "    - wifi: rtw89: Add USB ID 2001:3327 for D-Link AX18U rev. A1",
                            "    - wifi: iwlwifi: fw: Add ASUS to PPAG and TAS list",
                            "    - drm/xe/i2c: Enable bus mastering",
                            "    - media: ov08x40: Fix the horizontal flip control",
                            "    - media: i2c: og01a1b: Specify monochrome media bus format instead of",
                            "      Bayer",
                            "    - media: qcom: camss: csiphy-3ph: Add CSIPHY 2ph DPHY v2.0.1 init sequence",
                            "    - drm/bridge: write full Audio InfoFrame",
                            "    - drm/xe/guc: Always add CT disable action during second init step",
                            "    - f2fs: fix wrong layout information on 16KB page",
                            "    - selftests: mptcp: join: allow more time to send ADD_ADDR",
                            "    - scsi: ufs: host: mediatek: Enhance recovery on resume failure",
                            "    - scsi: ufs: ufs-qcom: Align programming sequence of Shared ICE for UFS",
                            "      controller v5",
                            "    - scsi: ufs: host: mediatek: Fix unbalanced IRQ enable issue",
                            "    - scsi: ufs: host: mediatek: Enhance recovery on hibernation exit failure",
                            "    - net: phy: marvell: Fix 88e1510 downshift counter errata",
                            "    - scsi: ufs: host: mediatek: Correct system PM flow",
                            "    - scsi: ufs: host: mediatek: Disable auto-hibern8 during power mode",
                            "      changes",
                            "    - scsi: ufs: host: mediatek: Fix adapt issue after PA_Init",
                            "    - wifi: cfg80211: update the time stamps in hidden ssid",
                            "    - wifi: mac80211: Fix HE capabilities element check",
                            "    - fbcon: Use screen info to find primary device",
                            "    - phy: cadence: cdns-dphy: Enable lower resolutions in dphy",
                            "    - Fix access to video_is_primary_device() when compiled without",
                            "      CONFIG_VIDEO",
                            "    - phy: renesas: r8a779f0-ether-serdes: add new step added to latest",
                            "      datasheet",
                            "    - phy: rockchip: phy-rockchip-inno-csidphy: allow writes to grf register 0",
                            "    - drm/msm/registers: Generate _HI/LO builders for reg64",
                            "    - net: sh_eth: Disable WoL if system can not suspend",
                            "    - selftests: net: replace sleeps in fcnal-test with waits",
                            "    - media: redrat3: use int type to store negative error codes",
                            "    - platform/x86/amd/pmf: Fix the custom bios input handling mechanism",
                            "    - selftests: traceroute: Use require_command()",
                            "    - selftests: traceroute: Return correct value on failure",
                            "    - openrisc: Add R_OR1K_32_PCREL relocation type module support",
                            "    - netfilter: nf_reject: don't reply to icmp error messages",
                            "    - x86/kvm: Prefer native qspinlock for dedicated vCPUs irrespective of",
                            "      PV_UNHALT",
                            "    - x86/virt/tdx: Use precalculated TDVPR page physical address",
                            "    - selftests: Disable dad for ipv6 in fcnal-test.sh",
                            "    - eth: 8139too: Make 8139TOO_PIO depend on !NO_IOPORT_MAP",
                            "    - [Config] No longer enable `CONFIG_8139TOO_PIO` for armhf",
                            "    - selftests: Replace sleep with slowwait",
                            "    - net: devmem: expose tcp_recvmsg_locked errors",
                            "    - selftests: net: lib.sh: Don't defer failed commands",
                            "    - HID: asus: add Z13 folio to generic group for multitouch to work",
                            "    - watchdog: s3c2410_wdt: Fix max_timeout being calculated larger",
                            "    - crypto: sun8i-ce - remove channel timeout field",
                            "    - PCI: dwc: Verify the single eDMA IRQ in dw_pcie_edma_irq_verify()",
                            "    - crypto: ccp - Fix incorrect payload size calculation in",
                            "      psp_poulate_hsti()",
                            "    - crypto: caam - double the entropy delay interval for retry",
                            "    - can: rcar_canfd: Update bit rate constants for RZ/G3E and R-Car Gen4",
                            "    - net: mana: Reduce waiting time if HWC not responding",
                            "    - ionic: use int type for err in ionic_get_module_eeprom_by_page",
                            "    - net/cls_cgroup: Fix task_get_classid() during qdisc run",
                            "    - wifi: mt76: mt7921: Add 160MHz beamformee capability for mt7922 device",
                            "    - wifi: mt76: mt7925: add pci restore for hibernate",
                            "    - wifi: mt76: mt7996: Fix mt7996_reverse_frag0_hdr_trans for MLO",
                            "    - wifi: mt76: mt7996: Set def_wcid pointer in mt7996_mac_sta_init_link()",
                            "    - wifi: mt76: mt7996: Temporarily disable EPCS",
                            "    - wifi: mt76: mt7996: support writing MAC TXD for AddBA Request",
                            "    - wifi: mt76: mt76_eeprom_override to int",
                            "    - ALSA: serial-generic: remove shared static buffer",
                            "    - wifi: mt76: mt7996: fix memory leak on mt7996_mcu_sta_key_tlv error",
                            "    - wifi: mt76: mt7996: disable promiscuous mode by default",
                            "    - wifi: mt76: use altx queue for offchannel tx on connac+",
                            "    - wifi: mt76: improve phy reset on hw restart",
                            "    - drm/amdgpu: Use memdup_array_user in amdgpu_cs_wait_fences_ioctl",
                            "    - drm/amdgpu: Release hive reference properly",
                            "    - drm/amd/display: Fix DMCUB loading sequence for DCN3.2",
                            "    - drm/amd/display: Set up pixel encoding for YCBCR422",
                            "    - drm/amd/display: fix dml ms order of operations",
                            "    - drm/amd/display: Don't use non-registered VUPDATE on DCE 6",
                            "    - drm/amd/display: Keep PLL0 running on DCE 6.0 and 6.4",
                            "    - drm/amd/display: Fix DVI-D/HDMI adapters",
                            "    - drm/amd/display: Disable VRR on DCE 6",
                            "    - drm/amd/display/dml2: Guard dml21_map_dc_state_into_dml_display_cfg with",
                            "      DC_FP_START",
                            "    - net: phy: clear EEE runtime state in PHY_HALTED/PHY_ERROR",
                            "    - ethernet: Extend device_get_mac_address() to use NVMEM",
                            "    - scsi: ufs: ufs-qcom: Disable lane clocks during phy hibern8",
                            "    - HID: i2c-hid: Resolve touchpad issues on Dell systems during S4",
                            "    - hinic3: Queue pair endianness improvements",
                            "    - hinic3: Fix missing napi->dev in netif_queue_set_napi",
                            "    - tools: ynl-gen: validate nested arrays",
                            "    - drm/xe/guc: Return an error code if the GuC load fails",
                            "    - drm/amdgpu: reject gang submissions under SRIOV",
                            "    - selftests/Makefile: include $(INSTALL_DEP_TARGETS) in clean target to",
                            "      clean net/lib dependency",
                            "    - scsi: ufs: core: Disable timestamp functionality if not supported",
                            "    - scsi: lpfc: Clean up allocated queues when queue setup mbox commands",
                            "      fail",
                            "    - scsi: lpfc: Decrement ndlp kref after FDISC retries exhausted",
                            "    - scsi: lpfc: Check return status of lpfc_reset_flush_io_context during",
                            "      TGT_RESET",
                            "    - scsi: lpfc: Remove ndlp kref decrement clause for F_Port_Ctrl in",
                            "      lpfc_cleanup",
                            "    - scsi: lpfc: Define size of debugfs entry for xri rebalancing",
                            "    - scsi: lpfc: Ensure PLOGI_ACC is sent prior to PRLI in Point to Point",
                            "      topology",
                            "    - allow finish_no_open(file, ERR_PTR(-E...))",
                            "    - usb: mon: Increase BUFF_MAX to 64 MiB to support multi-MB URBs",
                            "    - usb: xhci: plat: Facilitate using autosuspend for xhci plat devices",
                            "    - wifi: rtw89: disable RTW89_PHYSTS_IE09_FTR_0 for ppdu status",
                            "    - wifi: rtw89: obtain RX path from ppdu status IE00",
                            "    - wifi: rtw89: renew a completion for each H2C command waiting C2H event",
                            "    - usb: xhci-pci: add support for hosts with zero USB3 ports",
                            "    - ipv6: np->rxpmtu race annotation",
                            "    - RDMA/irdma: Update Kconfig",
                            "    - IB/ipoib: Ignore L3 master device",
                            "    - bnxt_en: Add fw log trace support for 5731X/5741X chips",
                            "    - mei: make a local copy of client uuid in connect",
                            "    - ASoC: qcom: sc8280xp: explicitly set S16LE format in",
                            "      sc8280xp_be_hw_params_fixup()",
                            "    - net: phy: clear link parameters on admin link down",
                            "    - net: ethernet: microchip: sparx5: make it selectable for ARCH_LAN969X",
                            "    - bus: mhi: core: Improve mhi_sync_power_up handling for SYS_ERR state",
                            "    - iommu/vt-d: Replace snprintf with scnprintf in dmar_latency_snapshot()",
                            "    - wifi: ath10k: Fix connection after GTK rekeying",
                            "    - iommu/vt-d: Remove LPIG from page group response descriptor",
                            "    - wifi: mac80211: Get the correct interface for non-netdev skb status",
                            "    - wifi: mac80211: Track NAN interface start/stop",
                            "    - net: intel: fm10k: Fix parameter idx set but not used",
                            "    - sparc/module: Add R_SPARC_UA64 relocation handling",
                            "    - sparc64: fix prototypes of reads[bwl]()",
                            "    - vfio: return -ENOTTY for unsupported device feature",
                            "    - ptp_ocp: make ptp_ocp driver compatible with PTP_EXTTS_REQUEST2",
                            "    - crypto: hisilicon/qm - invalidate queues in use",
                            "    - crypto: hisilicon/qm - clear all VF configurations in the hardware",
                            "    - ASoC: ops: improve snd_soc_get_volsw",
                            "    - PCI/PM: Skip resuming to D0 if device is disconnected",
                            "    - selftests: forwarding: Reorder (ar)ping arguments to obey POSIX getopt",
                            "    - remoteproc: qcom: q6v5: Avoid handling handover twice",
                            "    - wifi: ath12k: Increase DP_REO_CMD_RING_SIZE to 256",
                            "    - net: dsa: microchip: Set SPI as bus interface during reset for KSZ8463",
                            "    - bng_en: make bnge_alloc_ring() self-unwind on failure",
                            "    - ALSA: usb-audio: don't apply interface quirk to Presonus S1824c",
                            "    - tcp: Update bind bucket state on port release",
                            "    - ovl: make sure that ovl_create_real() returns a hashed dentry",
                            "    - drm/amd/display: Add missing post flip calls",
                            "    - drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream",
                            "    - drm/amd/display: Add fast sync field in ultra sleep more for DMUB",
                            "    - drm/amd/display: Init dispclk from bootup clock for DCN314",
                            "    - drm/amd/display: Fix for test crash due to power gating",
                            "    - drm/amd/display: change dc stream color settings only in atomic commit",
                            "    - NFSv4: handle ERR_GRACE on delegation recalls",
                            "    - NFSv4.1: fix mount hang after CREATE_SESSION failure",
                            "    - net: bridge: Install FDB for bridge MAC on VLAN 0",
                            "    - net: phy: dp83640: improve phydev and driver removal handling",
                            "    - scsi: ufs: core: Change MCQ interrupt enable flow",
                            "    - scsi: libfc: Fix potential buffer overflow in fc_ct_ms_fill()",
                            "    - accel/habanalabs/gaudi2: fix BMON disable configuration",
                            "    - scsi: mpt3sas: Add support for 22.5 Gbps SAS link rate",
                            "    - accel/habanalabs: return ENOMEM if less than requested pages were pinned",
                            "    - accel/habanalabs/gaudi2: read preboot status after recovering from dirty",
                            "      state",
                            "    - ASoC: renesas: msiof: add .symmetric_xxx on snd_soc_dai_driver",
                            "    - ASoC: renesas: msiof: use reset controller",
                            "    - ASoC: renesas: msiof: tidyup DMAC stop timing",
                            "    - ASoC: renesas: msiof: set SIFCTR register",
                            "    - ext4: increase IO priority of fastcommit",
                            "    - drm/amdgpu: Add fallback to pipe reset if KCQ ring reset fails",
                            "    - drm/amdgpu: Fix fence signaling race condition in userqueue",
                            "    - ASoC: stm32: sai: manage context in set_sysclk callback",
                            "    - ASoC: tlv320aic3x: Fix class-D initialization for tlv320aic3007",
                            "    - ACPI: scan: Update honor list for RPMI System MSI",
                            "    - platform/x86: x86-android-tablets: Stop using EPROBE_DEFER",
                            "    - vfio/pci: Fix INTx handling on legacy non-PCI 2.3 devices",
                            "    - vfio/nvgrace-gpu: Add GB300 SKU to the devid table",
                            "    - selftest: net: Fix error message if empty variable",
                            "    - net/mlx5e: Don't query FEC statistics when FEC is disabled",
                            "    - Bluetooth: btintel: Add support for BlazarIW core",
                            "    - net: macb: avoid dealing with endianness in macb_set_hwaddr()",
                            "    - Bluetooth: btusb: Add new VID/PID 13d3/3627 for MT7925",
                            "    - Bluetooth: btintel_pcie: Define hdev->wakeup() callback",
                            "    - Bluetooth: ISO: Don't initiate CIS connections if there are no buffers",
                            "    - Bluetooth: btusb: Check for unexpected bytes when defragmenting HCI",
                            "      frames",
                            "    - Bluetooth: ISO: Use sk_sndtimeo as conn_timeout",
                            "    - Bluetooth: btusb: Add new VID/PID 13d3/3633 for MT7922",
                            "    - net: stmmac: est: Drop frames causing HLBS error",
                            "    - exfat: limit log print for IO error",
                            "    - 6pack: drop redundant locking and refcounting",
                            "    - page_pool: Clamp pool size to max 16K pages",
                            "    - net/mlx5e: Prevent entering switchdev mode with inconsistent netns",
                            "    - ksmbd: use sock_create_kern interface to create kernel socket",
                            "    - smb: client: update cfid->last_access_time in",
                            "      open_cached_dir_by_dentry()",
                            "    - smb: client: transport: avoid reconnects triggered by pending task work",
                            "    - usb: xhci-pci: Fix USB2-only root hub registration",
                            "    - drm/amd/display: Add fallback path for YCBCR422",
                            "    - ACPICA: Update dsmethod.c to get rid of unused variable warning",
                            "    - RDMA/bnxt_re: Fix a potential memory leak in destroy_gsi_sqp",
                            "    - RDMA/irdma: Fix SD index calculation",
                            "    - RDMA/irdma: Remove unused struct irdma_cq fields",
                            "    - RDMA/irdma: Set irdma_cq cq_num field during CQ create",
                            "    - RDMA/uverbs: Fix umem release in UVERBS_METHOD_CQ_CREATE",
                            "    - RDMA/hns: Fix recv CQ and QP cache affinity",
                            "    - RDMA/hns: Fix the modification of max_send_sge",
                            "    - RDMA/hns: Fix wrong WQE data when QP wraps around",
                            "    - btrfs: mark dirty extent range for out of bound prealloc extents",
                            "    - clk: qcom: gcc-ipq6018: rework nss_port5 clock to multiple conf",
                            "    - clk: renesas: rzv2h: Re-assert reset on deassert timeout",
                            "    - clk: samsung: exynos990: Add missing USB clock registers to HSI0",
                            "    - fs/hpfs: Fix error code for new_inode() failure in",
                            "      mkdir/create/mknod/symlink",
                            "    - clocksource: hyper-v: Skip unnecessary checks for the root partition",
                            "    - hyperv: Add missing field to hv_output_map_device_interrupt",
                            "    - um: Fix help message for ssl-non-raw",
                            "    - clk: sunxi-ng: sun6i-rtc: Add A523 specifics",
                            "    - rtc: pcf2127: clear minute/second interrupt",
                            "    - ARM: at91: pm: save and restore ACR during PLL disable/enable",
                            "    - clk: at91: add ACR in all PLL settings",
                            "    - clk: at91: sam9x7: Add peripheral clock id for pmecc",
                            "    - clk: at91: clk-master: Add check for divide by 3",
                            "    - clk: at91: clk-sam9x60-pll: force write to PLL_UPDT register",
                            "    - clk: ti: am33xx: keep WKUP_DEBUGSS_CLKCTRL enabled",
                            "    - clk: scmi: Add duty cycle ops only when duty cycle is supported",
                            "    - clk: clocking-wizard: Fix output clock register offset for Versal",
                            "      platforms",
                            "    - NTB: epf: Allow arbitrary BAR mapping",
                            "    - 9p: fix /sys/fs/9p/caches overwriting itself",
                            "    - cpufreq: tegra186: Initialize all cores to max frequencies",
                            "    - 9p: sysfs_init: don't hardcode error to ENOMEM",
                            "    - scsi: ufs: core: Include UTP error in INT_FATAL_ERRORS",
                            "    - fbdev: core: Fix ubsan warning in pixel_to_pat",
                            "    - ACPI: property: Return present device nodes only on fwnode interface",
                            "    - LoongArch: Handle new atomic instructions for probes",
                            "    - tools bitmap: Add missing asm-generic/bitsperlong.h include",
                            "    - tools: lib: thermal: don't preserve owner in install",
                            "    - tools: lib: thermal: use pkg-config to locate libnl3",
                            "    - ALSA: hda/realtek: Add quirk for ASUS ROG Zephyrus Duo",
                            "    - rtc: zynqmp: Restore alarm functionality after kexec transition",
                            "    - rtc: pcf2127: fix watchdog interrupt mask on pcf2131",
                            "    - net: wwan: t7xx: add support for HP DRMR-H01",
                            "    - kbuild: uapi: Strip comments before size type check",
                            "    - ASoC: meson: aiu-encoder-i2s: fix bit clock polarity",
                            "    - ASoC: rt722: add settings for rt722VB",
                            "    - drm/amdgpu: Report individual reset error",
                            "    - ceph: add checking of wait_for_completion_killable() return value",
                            "    - ceph: fix potential race condition in ceph_ioctl_lazyio()",
                            "    - ceph: refactor wake_up_bit() pattern of calling",
                            "    - x86: uaccess: don't use runtime-const rewriting in modules",
                            "    - rust: condvar: fix broken intra-doc link",
                            "    - rust: devres: fix private intra-doc link",
                            "    - rust: kbuild: workaround `rustdoc` doctests modifier bug",
                            "    - rust: kbuild: treat `build_error` and `rustdoc` as kernel objects",
                            "    - media: uvcvideo: Use heuristic to find stream entity",
                            "    - Revert \"wifi: ath10k: avoid unnecessary wait for service ready message\"",
                            "    - tracing: tprobe-events: Fix to register tracepoint correctly",
                            "    - tracing: tprobe-events: Fix to put tracepoint_user when disable the",
                            "      tprobe",
                            "    - net: libwx: fix device bus LAN ID",
                            "    - scsi: ufs: core: Fix a race condition related to the \"hid\" attribute",
                            "      group",
                            "    - riscv: ptdump: use seq_puts() in pt_dump_seq_puts() macro",
                            "    - Revert \"wifi: ath12k: Fix missing station power save configuration\"",
                            "    - scsi: ufs: core: Revert \"Make HID attributes visible\"",
                            "    - Bluetooth: btrtl: Fix memory leak in rtlbt_parse_firmware_v2()",
                            "    - net: dsa: tag_brcm: legacy: fix untagged rx on unbridged ports for",
                            "      bcm63xx",
                            "    - selftests/net: fix out-of-order delivery of FIN in gro:tcp test",
                            "    - selftests/net: use destination options instead of hop-by-hop",
                            "    - selftests: netdevsim: Fix ethtool-coalesce.sh fail by installing",
                            "      ethtool-common.sh",
                            "    - net: vlan: sync VLAN features with lower device",
                            "    - net: dsa: b53: fix resetting speed and pause on forced link",
                            "    - net: dsa: b53: fix bcm63xx RGMII port link adjustment",
                            "    - net: dsa: b53: fix enabling ip multicast",
                            "    - net: dsa: b53: stop reading ARL entries if search is done",
                            "    - net: dsa: b53: properly bound ARL searches for < 4 ARL bin chips",
                            "    - sctp: Hold RCU read lock while iterating over address list",
                            "    - sctp: Hold sock lock while iterating over address list",
                            "    - net: ionic: add dma_wmb() before ringing TX doorbell",
                            "    - net: ionic: map SKB after pseudo-header checksum prep",
                            "    - octeontx2-pf: Fix devm_kcalloc() error checking",
                            "    - bnxt_en: Fix a possible memory leak in bnxt_ptp_init",
                            "    - bnxt_en: Always provide max entry and entry size in coredump segments",
                            "    - bnxt_en: Fix warning in bnxt_dl_reload_down()",
                            "    - wifi: mac80211_hwsim: Limit destroy_on_close radio removal to netgroup",
                            "    - io_uring: fix types for region size calulation",
                            "    - net/mlx5e: Fix return value in case of module EEPROM read error",
                            "    - net: ti: icssg-prueth: Fix fdb hash size configuration",
                            "    - net/mlx5e: SHAMPO, Fix header mapping for 64K pages",
                            "    - net/mlx5e: SHAMPO, Fix skb size check for 64K pages",
                            "    - net/mlx5e: SHAMPO, Fix header formulas for higher MTUs and 64K pages",
                            "    - net: wan: framer: pef2256: Switch to devm_mfd_add_devices()",
                            "    - net: dsa: microchip: Fix reserved multicast address table programming",
                            "    - net: bridge: fix MST static key usage",
                            "    - selftests/vsock: avoid false-positives when checking dmesg",
                            "    - tracing: Fix memory leaks in create_field_var()",
                            "    - drm/amd/display: Enable mst when it's detected but yet to be initialized",
                            "    - wifi: cfg80211: add an hrtimer based delayed work item",
                            "    - wifi: mac80211: use wiphy_hrtimer_work for ml_reconf_work",
                            "    - wifi: mac80211: use wiphy_hrtimer_work for ttlm_work",
                            "    - wifi: mac80211: use wiphy_hrtimer_work for csa.switch_work",
                            "    - riscv: Fix memory leak in module_frob_arch_sections()",
                            "    - rtc: rx8025: fix incorrect register reference",
                            "    - x86/microcode/AMD: Add more known models to entry sign checking",
                            "    - smb: client: validate change notify buffer before copy",
                            "    - x86/amd_node: Fix AMD root device caching",
                            "    - xfs: fix delalloc write failures in software-provided atomic writes",
                            "    - xfs: fix various problems in xfs_atomic_write_cow_iomap_begin",
                            "    - x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode",
                            "    - drm: define NVIDIA DRM format modifiers for GB20x",
                            "    - drm/nouveau: Advertise correct modifiers on GB20x",
                            "    - drm/amdgpu/smu: Handle S0ix for vangogh",
                            "    - drm/amdkfd: Don't clear PT after process killed",
                            "    - virtio_net: fix alignment for virtio_net_hdr_v1_hash",
                            "    - lib/crypto: curve25519-hacl64: Fix older clang KASAN workaround for GCC",
                            "    - scsi: ufs: ufs-pci: Fix S0ix/S3 for Intel controllers",
                            "    - scsi: ufs: ufs-pci: Set UFSHCD_QUIRK_PERFORM_LINK_STARTUP_ONCE for Intel",
                            "      ADL",
                            "    - scsi: ufs: core: Add a quirk to suppress link_startup_again",
                            "    - drm/amd/display: update color on atomic commit time",
                            "    - extcon: adc-jack: Cleanup wakeup source only if it was enabled",
                            "    - kunit: Extend kconfig help text for KUNIT_UML_PCI",
                            "    - ALSA: hda/tas2781: Enable init_profile_id for device initialization",
                            "    - ACPI: SPCR: Check for table version when using precise baudrate",
                            "    - kbuild: Strip trailing padding bytes from modules.builtin.modinfo",
                            "    - drm/amdgpu: Fix unintended error log in VCN5_0_0",
                            "    - drm/amd/display: Fix vupdate_offload_work doc",
                            "    - drm/amdgpu: Fix function header names in amdgpu_connectors.c",
                            "    - drm/amdgpu/userq: assign an error code for invalid userq va",
                            "    - drm/msm/dpu: Fix adjusted mode clock check for 3d merge",
                            "    - drm/amd/display: Reject modes with too high pixel clock on DCE6-10",
                            "    - drm/amd/display: use GFP_NOWAIT for allocation in interrupt handler",
                            "    - drm/amd/display: Fix black screen with HDMI outputs",
                            "    - selftests: drv-net: Reload pkt pointer after calling filter_udphdr",
                            "    - dt-bindings: eeprom: at25: use \"size\" for FRAMs without device ID",
                            "    - Linux 6.17.8",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68316",
                            "    - scsi: ufs: core: Fix invalid probe error return value",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40292",
                            "    - virtio-net: fix received length check in big packets",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68180",
                            "    - drm/amd/display: Fix NULL deref in debugfs odm_combine_segments",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40327",
                            "    - perf/core: Fix system hang caused by cpu-clock usage",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40328",
                            "    - smb: client: fix potential UAF in smb2_close_cached_fid()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40291",
                            "    - io_uring: fix regbuf vector size truncation",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68322",
                            "    - parisc: Avoid crash due to unaligned access in unwinder",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40293",
                            "    - iommufd: Don't overflow during division for dirty tracking",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40294",
                            "    - Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40329",
                            "    - drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40295",
                            "    - fscrypt: fix left shift underflow when inode->i_blkbits > PAGE_SHIFT",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40296",
                            "    - platform/x86: int3472: Fix double free of GPIO device during unregister",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40297",
                            "    - net: bridge: fix use-after-free due to MST port state bypass",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68320",
                            "    - lan966x: Fix sleeping in atomic context",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68169",
                            "    - netpoll: Fix deadlock in memory allocation under spinlock",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68197",
                            "    - bnxt_en: Fix null pointer dereference in bnxt_bs_trace_check_wrap()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40330",
                            "    - bnxt_en: Shutdown FW DMA in bnxt_shutdown()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68192",
                            "    - net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40331",
                            "    - sctp: Prevent TOCTOU out-of-bounds write",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68187",
                            "    - net: mdio: Check regmap pointer returned by device_node_to_regmap()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68167",
                            "    - gpiolib: fix invalid pointer access in debugfs",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68319",
                            "    - netconsole: Acquire su_mutex before navigating configs hierarchy",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40298",
                            "    - gve: Implement settime64 with -EOPNOTSUPP",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40299",
                            "    - gve: Implement gettimex64 with -EOPNOTSUPP",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40301",
                            "    - Bluetooth: hci_event: validate skb length for unknown CC opcode",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40358",
                            "    - riscv: stacktrace: Disable KASAN checks for non-current tasks",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68186",
                            "    - ring-buffer: Do not warn in ring_buffer_map_get_reader() when reader",
                            "      catches up",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68184",
                            "    - drm/mediatek: Disable AFBC support on Mediatek DRM driver",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40302",
                            "    - media: videobuf2: forbid remove_bufs when legacy fileio is active",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40303",
                            "    - btrfs: ensure no dirty metadata is written back for an fs with errors",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40362",
                            "    - ceph: fix multifs mds auth caps issue",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40332",
                            "    - drm/amdkfd: Fix mmap write lock not release",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40304",
                            "    - fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40305",
                            "    - 9p/trans_fd: p9_fd_request: kick rx thread if EPOLLIN",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68318",
                            "    - clk: thead: th1520-ap: set all AXI clocks to CLK_IS_CRITICAL",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40209",
                            "    - btrfs: fix memory leak of qgroup_list in btrfs_add_qgroup_relation",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68183",
                            "    - ima: don't clear IMA_DIGSIG flag when setting or removing non-IMA xattr",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68173",
                            "    - ftrace: Fix softlockup in ftrace_module_enable",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40306",
                            "    - orangefs: fix xattr related buffer overflow...",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40307",
                            "    - exfat: validate cluster allocation bits of the allocation bitmap",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40308",
                            "    - Bluetooth: bcsp: receive data only if registered",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40309",
                            "    - Bluetooth: SCO: Fix UAF on sco_conn_free",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68174",
                            "    - amd/amdkfd: enhance kfd process check in switch partition",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40310",
                            "    - amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40361",
                            "    - fs: ext4: change GFP_KERNEL to GFP_NOFS to avoid deadlock",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40311",
                            "    - accel/habanalabs: support mapping cb with vmalloc-backed coherent memory",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68185",
                            "    - nfs4_setup_readdir(): insufficient locking for ->d_parent->d_inode",
                            "      dereferencing",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68176",
                            "    - PCI: cadence: Check for the existence of cdns_pcie::ops before using it",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68190",
                            "    - drm/amdgpu/atom: Check kcalloc() for WS buffer in",
                            "      amdgpu_atom_execute_table_locked()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68168",
                            "    - jfs: fix uninitialized waitqueue in transaction manager",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40312",
                            "    - jfs: Verify inode mode when loading from disk",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40333",
                            "    - f2fs: fix infinite loop in __insert_extent_tree()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68321",
                            "    - page_pool: always add GFP_NOWARN for ATOMIC allocations",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40334",
                            "    - drm/amdgpu: validate userq buffer virtual address and size",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68191",
                            "    - udp_tunnel: use netdev_warn() instead of netdev_WARN()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68309",
                            "    - PCI/AER: Fix NULL pointer access by aer_info",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40313",
                            "    - ntfs3: pretend $Extend records as regular files",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40335",
                            "    - drm/amdgpu: validate userq input args",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40314",
                            "    - usb: cdns3: gadget: Use-after-free during failed initialization and exit",
                            "      of cdnsp gadget",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40336",
                            "    - drm/gpusvm: fix hmm_pfn_to_map_order() usage",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68193",
                            "    - drm/xe/guc: Add devm release action to safely tear down CT",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68175",
                            "    - media: nxp: imx8-isi: Fix streaming cleanup on release",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68188",
                            "    - tcp: use dst_dev_rcu() in tcp_fastopen_active_disable_ofo_check()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68315",
                            "    - f2fs: fix to detect potential corrupted nid in free_nid_list",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40337",
                            "    - net: stmmac: Correctly handle Rx checksum offload errors",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40338",
                            "    - ASoC: Intel: avs: Do not share the name pointer between components",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40339",
                            "    - drm/amdgpu: fix nullptr err of vm_handle_moved",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68194",
                            "    - media: imon: make send_packet() more robust",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40363",
                            "    - net: ipv6: fix field-spanning memcpy warning in AH output",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68311",
                            "    - tty: serial: ip22zilog: Use platform device for probing",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40340",
                            "    - drm/xe: Fix oops in xe_gem_fault when running core_hotunplug test.",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68196",
                            "    - drm/amd/display: Cache streams targeting link when performing LT",
                            "      automation",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68178",
                            "    - blk-cgroup: fix possible deadlock while configuring policy",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40341",
                            "    - futex: Don't leak robust_list pointer on exec race",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40342",
                            "    - nvme-fc: use lock accessing port_state and rport state",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40343",
                            "    - nvmet-fc: avoid scheduling association deletion twice",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68177",
                            "    - cpufreq/longhaul: handle NULL policy in longhaul_exit",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68317",
                            "    - io_uring/zctx: check chained notif contexts",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40315",
                            "    - usb: gadget: f_fs: Fix epfile null pointer access after ep enable.",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40316",
                            "    - drm/mediatek: Fix device use-after-free on unbind",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40360",
                            "    - drm/sysfb: Do not dereference NULL pointer in plane reset",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68179",
                            "    - s390: Disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68310",
                            "    - s390/pci: Avoid deadlock between PCI error recovery and mlx5 crdump",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40317",
                            "    - regmap: slimbus: fix bus_context pointer in regmap init calls",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40359",
                            "    - perf/x86/intel: Fix KASAN global-out-of-bounds warning",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68181",
                            "    - drm/radeon: Remove calls to drm_put_dev()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68170",
                            "    - drm/radeon: Do not kfree() devres managed rdev",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40213",
                            "    - Bluetooth: MGMT: fix crash in set_mesh_sync and set_mesh_complete",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40318",
                            "    - Bluetooth: hci_sync: fix race in hci_cmd_sync_dequeue_once",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68312",
                            "    - usbnet: Prevents free active kevent",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40344",
                            "    - ASoC: Intel: avs: Disable periods-elapsed work when closing PCM",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68172",
                            "    - crypto: aspeed - fix double free caused by devm",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40319",
                            "    - bpf: Sync pending IRQ work before freeing ring buffer",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68182",
                            "    - wifi: iwlwifi: fix potential use after free in iwl_mld_remove_link()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68314",
                            "    - drm/msm: make sure last_fence is always updated",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68189",
                            "    - drm/msm: Fix GEM free for imported dma-bufs",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68171",
                            "    - x86/fpu: Ensure XFD state on signal delivery",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68313",
                            "    - x86/CPU/AMD: Add RDSEED fix for Zen5",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40320",
                            "    - smb: client: fix potential cfid UAF in smb2_query_info_compound",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40321",
                            "    - wifi: brcmfmac: fix crash while sending Action Frames in standalone AP",
                            "      Mode",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40322",
                            "    - fbdev: bitblit: bound-check glyph index in bit_putcs*",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40211",
                            "    - ACPI: video: Fix use-after-free in acpi_video_switch_brightness()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40323",
                            "    - fbcon: Set fb_display[i]->mode to NULL when the mode is released",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40210",
                            "    - Revert \"NFSD: Remove the cap on number of operations per NFSv4 COMPOUND\"",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40324",
                            "    - NFSD: Fix crash in nfsd4_read_release()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40326",
                            "    - NFSD: Define actions for the new time_deleg FATTR4 attributes",
                            "  * Questing update: v6.17.7 upstream stable release (LP: #2136813)",
                            "    - sched_ext: Move internal type and accessor definitions to ext_internal.h",
                            "    - sched_ext: Put event_stats_cpu in struct scx_sched_pcpu",
                            "    - sched_ext: Sync error_irq_work before freeing scx_sched",
                            "    - timekeeping: Fix aux clocks sysfs initialization loop bound",
                            "    - x86/bugs: Report correct retbleed mitigation status",
                            "    - x86/bugs: Qualify RETBLEED_INTEL_MSG",
                            "    - genirq/chip: Add buslock back in to irq_set_handler()",
                            "    - genirq/manage: Add buslock back in to __disable_irq_nosync()",
                            "    - genirq/manage: Add buslock back in to enable_irq()",
                            "    - audit: record fanotify event regardless of presence of rules",
                            "    - EDAC/ie31200: Add two more Intel Alder Lake-S SoCs for EDAC support",
                            "    - perf/x86/intel: Add ICL_FIXED_0_ADAPTIVE bit into INTEL_FIXED_BITS_MASK",
                            "    - perf: Use current->flags & PF_KTHREAD|PF_USER_WORKER instead of",
                            "      current->mm == NULL",
                            "    - perf: Have get_perf_callchain() return NULL if crosstask and user are",
                            "      set",
                            "    - perf: Skip user unwind if the task is a kernel thread",
                            "    - EDAC: Fix wrong executable file modes for C source files",
                            "    - seccomp: passthrough uprobe systemcall without filtering",
                            "    - sched_ext: Keep bypass on between enable failure and",
                            "      scx_disable_workfn()",
                            "    - x86/bugs: Add attack vector controls for VMSCAPE",
                            "    - x86/bugs: Fix reporting of LFENCE retpoline",
                            "    - EDAC/mc_sysfs: Increase legacy channel support to 16",
                            "    - cpuset: Use new excpus for nocpu error check when enabling root",
                            "      partition",
                            "    - btrfs: abort transaction on specific error places when walking log tree",
                            "    - btrfs: abort transaction in the process_one_buffer() log tree walk",
                            "      callback",
                            "    - btrfs: zoned: return error from btrfs_zone_finish_endio()",
                            "    - btrfs: zoned: refine extent allocator hint selection",
                            "    - btrfs: scrub: replace max_t()/min_t() with clamp() in",
                            "      scrub_throttle_dev_io()",
                            "    - btrfs: always drop log root tree reference in btrfs_replay_log()",
                            "    - btrfs: use level argument in log tree walk callback replay_one_buffer()",
                            "    - btrfs: abort transaction if we fail to update inode in log replay dir",
                            "      fixup",
                            "    - btrfs: tree-checker: add inode extref checks",
                            "    - btrfs: use smp_mb__after_atomic() when forcing COW in",
                            "      create_pending_snapshot()",
                            "    - sched_ext: Make qmap dump operation non-destructive",
                            "    - arch: Add the macro COMPILE_OFFSETS to all the asm-offsets.c",
                            "    - btrfs: tree-checker: fix bounds check in check_inode_extref()",
                            "    - Linux 6.17.7",
                            "  * [UBUNTU 24.04] KVM: s390: improve interrupt cpu for wakeup (LP: #2132317)",
                            "    - KVM: s390: improve interrupt cpu for wakeup",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982)",
                            "    - sched/fair: Block delayed tasks on throttled hierarchy during dequeue",
                            "    - vfio/cdx: update driver to build without CONFIG_GENERIC_MSI_IRQ",
                            "    - expfs: Fix exportfs_can_encode_fh() for EXPORT_FH_FID",
                            "    - cgroup/misc: fix misc_res_type kernel-doc warning",
                            "    - dlm: move to rinfo for all middle conversion cases",
                            "    - exec: Fix incorrect type for ret",
                            "    - s390/pkey: Forward keygenflags to ep11_unwrapkey",
                            "    - hfs: clear offset and space out of valid records in b-tree node",
                            "    - hfs: make proper initalization of struct hfs_find_data",
                            "    - hfs: validate record offset in hfsplus_bmap_alloc",
                            "    - hfsplus: fix KMSAN uninit-value issue in hfsplus_delete_cat()",
                            "    - dlm: check for defined force value in dlm_lockspace_release",
                            "    - hfsplus: return EIO when type of hidden directory mismatch in",
                            "      hfsplus_fill_super()",
                            "    - PCI: Test for bit underflow in pcie_set_readrq()",
                            "    - lkdtm: fortify: Fix potential NULL dereference on kmalloc failure",
                            "    - arm64: sysreg: Correct sign definitions for EIESB and DoubleLock",
                            "    - m68k: bitops: Fix find_*_bit() signatures",
                            "    - powerpc/32: Remove PAGE_KERNEL_TEXT to fix startup failure",
                            "    - riscv: mm: Return intended SATP mode for noXlvl options",
                            "    - riscv: mm: Use mmu-type from FDT to limit SATP mode",
                            "    - riscv: cpufeature: add validation for zfa, zfh and zfhmin",
                            "    - drivers/perf: hisi: Relax the event ID check in the framework",
                            "    - s390/mm: Use __GFP_ACCOUNT for user page table allocations",
                            "    - smb: client: queue post_recv_credits_work also if the peer raises the",
                            "      credit target",
                            "    - smb: client: limit the range of info->receive_credit_target",
                            "    - smb: client: make use of ib_wc_status_msg() and skip IB_WC_WR_FLUSH_ERR",
                            "      logging",
                            "    - smb: server: let smb_direct_flush_send_list() invalidate a remote key",
                            "      first",
                            "    - Unbreak 'make tools/*' for user-space targets",
                            "    - platform/mellanox: mlxbf-pmc: add sysfs_attr_init() to count_clock init",
                            "    - cpufreq/amd-pstate: Fix a regression leading to EPP 0 after hibernate",
                            "    - net/mlx5e: Return 1 instead of 0 in invalid case in",
                            "      mlx5e_mpwrq_umr_entry_size()",
                            "    - rtnetlink: Allow deleting FDB entries in user namespace",
                            "    - net: enetc: fix the deadlock of enetc_mdio_lock",
                            "    - net: enetc: correct the value of ENETC_RXB_TRUESIZE",
                            "    - dpaa2-eth: fix the pointer passed to PTR_ALIGN on Tx path",
                            "    - net: phy: realtek: fix rtl8221b-vm-cg name",
                            "    - can: bxcan: bxcan_start_xmit(): use can_dev_dropped_skb() instead of",
                            "      can_dropped_invalid_skb()",
                            "    - can: esd: acc_start_xmit(): use can_dev_dropped_skb() instead of",
                            "      can_dropped_invalid_skb()",
                            "    - can: rockchip-canfd: rkcanfd_start_xmit(): use can_dev_dropped_skb()",
                            "      instead of can_dropped_invalid_skb()",
                            "    - selftests: net: fix server bind failure in sctp_vrf.sh",
                            "    - net/mlx5e: RX, Fix generating skb from non-linear xdp_buff for legacy RQ",
                            "    - net/mlx5e: RX, Fix generating skb from non-linear xdp_buff for striding",
                            "      RQ",
                            "    - net/smc: fix general protection fault in __smc_diag_dump",
                            "    - net: ethernet: ti: am65-cpts: fix timestamp loss due to race conditions",
                            "    - arm64, mm: avoid always making PTE dirty in pte_mkwrite()",
                            "    - erofs: avoid infinite loops due to corrupted subpage compact indexes",
                            "    - net: hibmcge: select FIXED_PHY",
                            "    - ptp: ocp: Fix typo using index 1 instead of i in SMA initialization loop",
                            "    - net: hsr: prevent creation of HSR device with slaves from another netns",
                            "    - espintcp: use datagram_poll_queue for socket readiness",
                            "    - net: datagram: introduce datagram_poll_queue for custom receive queues",
                            "    - ovpn: use datagram_poll_queue for socket readiness in TCP",
                            "    - net: bonding: fix possible peer notify event loss or dup issue",
                            "    - hung_task: fix warnings caused by unaligned lock pointers",
                            "    - mm: don't spin in add_stack_record when gfp flags don't allow",
                            "    - dma-debug: don't report false positives with",
                            "      DMA_BOUNCE_UNALIGNED_KMALLOC",
                            "    - arch_topology: Fix incorrect error check in",
                            "      topology_parse_cpu_capacity()",
                            "    - riscv: hwprobe: Fix stale vDSO data for late-initialized keys at boot",
                            "    - io_uring/sqpoll: switch away from getrusage() for CPU accounting",
                            "    - io_uring/sqpoll: be smarter on when to update the stime usage",
                            "    - btrfs: send: fix duplicated rmdir operations when using extrefs",
                            "    - btrfs: ref-verify: fix IS_ERR() vs NULL check in btrfs_build_ref_tree()",
                            "    - gpio: pci-idio-16: Define maximum valid register address offset",
                            "    - gpio: 104-idio-16: Define maximum valid register address offset",
                            "    - xfs: fix locking in xchk_nlinks_collect_dir",
                            "    - platform/x86: alienware-wmi-wmax: Add AWCC support to Dell G15 5530",
                            "    - Revert \"cpuidle: menu: Avoid discarding useful information\"",
                            "    - riscv: cpufeature: avoid uninitialized variable in",
                            "      has_thead_homogeneous_vlenb()",
                            "    - rust: device: fix device context of Device::parent()",
                            "    - slab: Avoid race on slab->obj_exts in alloc_slab_obj_exts",
                            "    - slab: Fix obj_ext mistakenly considered NULL due to race condition",
                            "    - smb: client: get rid of d_drop() in cifs_do_rename()",
                            "    - ACPICA: Work around bogus -Wstringop-overread warning since GCC 11",
                            "    - arm64: mte: Do not warn if the page is already tagged in copy_highpage()",
                            "    - can: netlink: can_changelink(): allow disabling of automatic restart",
                            "    - cifs: Fix TCP_Server_Info::credits to be signed",
                            "    - devcoredump: Fix circular locking dependency with devcd->mutex.",
                            "    - hwmon: (pmbus/max34440) Update adpm12160 coeff due to latest FW",
                            "    - MIPS: Malta: Fix keyboard resource preventing i8042 driver from",
                            "      registering",
                            "    - rv: Make rtapp/pagefault monitor depends on CONFIG_MMU",
                            "    - net: bonding: update the slave array for broadcast mode",
                            "    - net: stmmac: dwmac-rk: Fix disabling set_clock_selection",
                            "    - net: usb: rtl8150: Fix frame padding",
                            "    - net: ravb: Enforce descriptor type ordering",
                            "    - net: ravb: Ensure memory write completes before ringing TX doorbell",
                            "    - mptcp: pm: in-kernel: C-flag: handle late ADD_ADDR",
                            "    - selftests: mptcp: join: mark 'flush re-add' as skipped if not supported",
                            "    - selftests: mptcp: join: mark implicit tests as skipped if not supported",
                            "    - selftests: mptcp: join: mark 'delete re-add signal' as skipped if not",
                            "      supported",
                            "    - mm/mremap: correctly account old mapping after MREMAP_DONTUNMAP remap",
                            "    - drm/xe: Check return value of GGTT workqueue allocation",
                            "    - drm/amd/display: increase max link count and fix link->enc NULL pointer",
                            "      access",
                            "    - mm/damon/core: use damos_commit_quota_goal() for new goal commit",
                            "    - mm/damon/core: fix list_add_tail() call on damon_call()",
                            "    - spi: rockchip-sfc: Fix DMA-API usage",
                            "    - firmware: arm_ffa: Add support for IMPDEF value in the memory access",
                            "      descriptor",
                            "    - spi: spi-nxp-fspi: add the support for sample data from DQS pad",
                            "    - spi: spi-nxp-fspi: re-config the clock rate when operation require new",
                            "      clock rate",
                            "    - spi: spi-nxp-fspi: add extra delay after dll locked",
                            "    - spi: spi-nxp-fspi: limit the clock rate for different sample clock",
                            "      source selection",
                            "    - spi: cadence-quadspi: Fix pm_runtime unbalance on dma EPROBE_DEFER",
                            "    - arm64: dts: broadcom: bcm2712: Add default GIC address cells",
                            "    - arm64: dts: broadcom: bcm2712: Define VGIC interrupt",
                            "    - include: trace: Fix inflight count helper on failed initialization",
                            "    - firmware: arm_scmi: Fix premature SCMI_XFER_FLAG_IS_RAW clearing in raw",
                            "      mode",
                            "    - spi: airoha: return an error for continuous mode dirmap creation cases",
                            "    - spi: airoha: add support of dual/quad wires spi modes to exec_op()",
                            "      handler",
                            "    - spi: airoha: switch back to non-dma mode in the case of error",
                            "    - spi: airoha: fix reading/writing of flashes with more than one plane per",
                            "      lun",
                            "    - sysfs: check visibility before changing group attribute ownership",
                            "    - RISC-V: Define pgprot_dmacoherent() for non-coherent devices",
                            "    - RISC-V: Don't print details of CPUs disabled in DT",
                            "    - riscv: hwprobe: avoid uninitialized variable use in hwprobe_arch_id()",
                            "    - hwmon: (pmbus/isl68137) Fix child node reference leak on early return",
                            "    - hwmon: (sht3x) Fix error handling",
                            "    - io_uring: fix incorrect unlikely() usage in io_waitid_prep()",
                            "    - nbd: override creds to kernel when calling sock_{send,recv}msg()",
                            "    - drm/panic: Fix drawing the logo on a small narrow screen",
                            "    - drm/panic: Fix qr_code, ensure vmargin is positive",
                            "    - drm/panic: Fix 24bit pixel crossing page boundaries",
                            "    - of/irq: Convert of_msi_map_id() callers to of_msi_xlate()",
                            "    - of/irq: Add msi-parent check to of_msi_xlate()",
                            "    - block: require LBA dma_alignment when using PI",
                            "    - gpio: ljca: Fix duplicated IRQ mapping",
                            "    - io_uring: correct __must_hold annotation in io_install_fixed_file",
                            "    - sched: Remove never used code in mm_cid_get()",
                            "    - USB: serial: option: add UNISOC UIS7720",
                            "    - USB: serial: option: add Quectel RG255C",
                            "    - USB: serial: option: add Telit FN920C04 ECM compositions",
                            "    - usb/core/quirks: Add Huawei ME906S to wakeup quirk",
                            "    - usb: raw-gadget: do not limit transfer length",
                            "    - xhci: dbc: enable back DbC in resume if it was enabled before suspend",
                            "    - xhci: dbc: fix bogus 1024 byte prefix if ttyDBC read races with stall",
                            "      event",
                            "    - x86/microcode: Fix Entrysign revision check for Zen1/Naples",
                            "    - binder: remove \"invalid inc weak\" check",
                            "    - mei: me: add wildcat lake P DID",
                            "    - objtool/rust: add one more `noreturn` Rust function",
                            "    - nvmem: rcar-efuse: add missing MODULE_DEVICE_TABLE",
                            "    - misc: fastrpc: Fix dma_buf object leak in fastrpc_map_lookup",
                            "    - most: usb: hdm_probe: Fix calling put_device() before device",
                            "      initialization",
                            "    - tcpm: switch check for role_sw device with fw_node",
                            "    - dt-bindings: serial: sh-sci: Fix r8a78000 interrupts",
                            "    - dt-bindings: usb: dwc3-imx8mp: dma-range is required only for imx8mp",
                            "    - dt-bindings: usb: qcom,snps-dwc3: Fix bindings for X1E80100",
                            "    - serial: 8250_dw: handle reset control deassert error",
                            "    - serial: 8250_exar: add support for Advantech 2 port card with Device ID",
                            "      0x0018",
                            "    - serial: 8250_mtk: Enable baud clock and manage in runtime PM",
                            "    - serial: sc16is7xx: remove useless enable of enhanced features",
                            "    - staging: gpib: Fix device reference leak in fmh_gpib driver",
                            "    - staging: gpib: Fix no EOI on 1 and 2 byte writes",
                            "    - staging: gpib: Return -EINTR on device clear",
                            "    - staging: gpib: Fix sending clear and trigger events",
                            "    - mm/migrate: remove MIGRATEPAGE_UNMAP",
                            "    - treewide: remove MIGRATEPAGE_SUCCESS",
                            "    - vmw_balloon: indicate success when effectively deflating during",
                            "      migration",
                            "    - xfs: always warn about deprecated mount options",
                            "    - gpio: regmap: Allow to allocate regmap-irq device",
                            "    - gpio: regmap: add the .fixed_direction_output configuration parameter",
                            "    - gpio: idio-16: Define fixed direction of the GPIO lines",
                            "    - Linux 6.17.6",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40084",
                            "    - ksmbd: transport_ipc: validate payload size before reading handle",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40222",
                            "    - tty: serial: sh-sci: fix RSCI FIFO overrun handling",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40223",
                            "    - most: usb: Fix use-after-free in hdm_disconnect",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40106",
                            "    - comedi: fix divide-by-zero in comedi_buf_munge()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40224",
                            "    - hwmon: (cgbc-hwmon) Add missing NULL check after devm_kzalloc()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40225",
                            "    - drm/panthor: Fix kernel panic on partial unmap of a GPU VA region",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40226",
                            "    - firmware: arm_scmi: Account for failed debug initialization",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40227",
                            "    - mm/damon/sysfs: dealloc commit test ctx always",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40228",
                            "    - mm/damon/sysfs: catch commit test ctx alloc failure",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40229",
                            "    - mm/damon/core: fix potential memory leak by cleaning ops_filter in",
                            "      damon_destroy_scheme",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40230",
                            "    - mm: prevent poison consumption when splitting THP",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40231",
                            "    - vsock: fix lock inversion in vsock_assign_transport()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40233",
                            "    - ocfs2: clear extent cache after moving/defragmenting extents",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40235",
                            "    - btrfs: directly free partially initialized fs_info in",
                            "      btrfs_check_leaked_roots()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40236",
                            "    - virtio-net: zero unused hash fields",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40237",
                            "    - fs/notify: call exportfs_encode_fid with s_umount",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40238",
                            "    - net/mlx5: Fix IPsec cleanup over MPV device",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40239",
                            "    - net: phy: micrel: always set shared->phydev for LAN8814",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40240",
                            "    - sctp: avoid NULL dereference when chunk data buffer is missing",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40241",
                            "    - erofs: fix crafted invalid cases for encoded extents",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40242",
                            "    - gfs2: Fix unlikely race in gdlm_put_lock",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40243",
                            "    - hfs: fix KMSAN uninit-value issue in hfs_find_set_zero_bits()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40244",
                            "    - hfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40245",
                            "    - nios2: ensure that memblock.current_limit is set when setting pfn limits",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557)",
                            "    - docs: kdoc: handle the obsolescensce of docutils.ErrorString()",
                            "    - Revert \"fs: make vfs_fileattr_[get|set] return -EOPNOTSUPP\"",
                            "    - PCI: vmd: Override irq_startup()/irq_shutdown() in",
                            "      vmd_init_dev_msi_info()",
                            "    - ata: libata-core: relax checks in ata_read_log_directory()",
                            "    - arm64/sysreg: Fix GIC CDEOI instruction encoding",
                            "    - ixgbevf: fix getting link speed data for E610 devices",
                            "    - rust: cfi: only 64-bit arm and x86 support CFI_CLANG",
                            "    - x86/CPU/AMD: Prevent reset reasons from being retained across reboot",
                            "    - slab: reset slab->obj_ext when freeing and it is OBJEXTS_ALLOC_FAIL",
                            "    - Revert \"io_uring/rw: drop -EOPNOTSUPP check in",
                            "      __io_complete_rw_common()\"",
                            "    - io_uring: protect mem region deregistration",
                            "    - Revert \"drm/amd/display: Only restore backlight after amdgpu_dm_init or",
                            "      dm_resume\"",
                            "    - r8152: add error handling in rtl8152_driver_init",
                            "    - net: usb: lan78xx: Fix lost EEPROM write timeout error(-ETIMEDOUT) in",
                            "      lan78xx_write_raw_eeprom",
                            "    - f2fs: fix wrong block mapping for multi-devices",
                            "    - gve: Check valid ts bit on RX descriptor before hw timestamping",
                            "    - jbd2: ensure that all ongoing I/O complete before freeing blocks",
                            "    - ext4: wait for ongoing I/O to complete before freeing blocks",
                            "    - btrfs: fix clearing of BTRFS_FS_RELOC_RUNNING if relocation already",
                            "      running",
                            "    - btrfs: fix memory leak on duplicated memory in the qgroup assign ioctl",
                            "    - btrfs: only set the device specific options after devices are opened",
                            "    - btrfs: fix incorrect readahead expansion length",
                            "    - can: gs_usb: gs_make_candev(): populate net_device->dev_port",
                            "    - can: gs_usb: increase max interface to U8_MAX",
                            "    - cxl/acpi: Fix setup of memory resource in cxl_acpi_set_cache_size()",
                            "    - ALSA: hda/intel: Add MSI X870E Tomahawk to denylist",
                            "    - ALSA: hda/realtek: Add quirk entry for HP ZBook 17 G6",
                            "    - drm/amdgpu: use atomic functions with memory barriers for vm fault info",
                            "    - drm/amdgpu: fix gfx12 mes packet status return check",
                            "    - drm/xe: Increase global invalidation timeout to 1000us",
                            "    - perf/core: Fix address filter match with backing files",
                            "    - perf/core: Fix MMAP event path names with backing files",
                            "    - perf/core: Fix MMAP2 event device with backing files",
                            "    - drm/amd: Check whether secure display TA loaded successfully",
                            "    - PM: hibernate: Add pm_hibernation_mode_is_suspend()",
                            "    - drm/amd: Fix hybrid sleep",
                            "    - usb: gadget: Store endpoint pointer in usb_request",
                            "    - usb: gadget: Introduce free_usb_request helper",
                            "    - HID: multitouch: fix sticky fingers",
                            "    - dax: skip read lock assertion for read-only filesystems",
                            "    - coredump: fix core_pattern input validation",
                            "    - can: m_can: m_can_plat_remove(): add missing pm_runtime_disable()",
                            "    - can: m_can: m_can_handle_state_errors(): fix CAN state transition to",
                            "      Error Active",
                            "    - can: m_can: m_can_chip_config(): bring up interface in correct state",
                            "    - can: m_can: fix CAN state in system PM",
                            "    - net: mtk: wed: add dma mask limitation and GFP_DMA32 for device with",
                            "      more than 4GB DRAM",
                            "    - net: dlink: handle dma_map_single() failure properly",
                            "    - doc: fix seg6_flowlabel path",
                            "    - can: j1939: add missing calls in NETDEV_UNREGISTER notification handler",
                            "    - dpll: zl3073x: Refactor DPLL initialization",
                            "    - dpll: zl3073x: Handle missing or corrupted flash configuration",
                            "    - r8169: fix packet truncation after S4 resume on RTL8168H/RTL8111H",
                            "    - net: phy: bcm54811: Fix GMII/MII/MII-Lite selection",
                            "    - net: phy: realtek: Avoid PHYCR2 access if PHYCR2 not present",
                            "    - amd-xgbe: Avoid spurious link down messages during interface toggle",
                            "    - Octeontx2-af: Fix missing error code in cgx_probe()",
                            "    - tcp: fix tcp_tso_should_defer() vs large RTT",
                            "    - net: airoha: Take into account out-of-order tx completions in",
                            "      airoha_dev_xmit()",
                            "    - selftests: net: check jq command is supported",
                            "    - net: core: fix lockdep splat on device unregister",
                            "    - ksmbd: fix recursive locking in RPC handle list access",
                            "    - tg3: prevent use of uninitialized remote_adv and local_adv variables",
                            "    - tls: trim encrypted message to match the plaintext on short splice",
                            "    - tls: wait for async encrypt in case of error during latter iterations of",
                            "      sendmsg",
                            "    - tls: always set record_type in tls_process_cmsg",
                            "    - tls: don't rely on tx_work during send()",
                            "    - netdevsim: set the carrier when the device goes up",
                            "    - net: usb: lan78xx: fix use of improperly initialized dev->chipid in",
                            "      lan78xx_reset",
                            "    - drm/panthor: Ensure MCU is disabled on suspend",
                            "    - nvme-multipath: Skip nr_active increments in RETRY disposition",
                            "    - riscv: kprobes: Fix probe address validation",
                            "    - drm/bridge: lt9211: Drop check for last nibble of version register",
                            "    - powerpc/fadump: skip parameter area allocation when fadump is disabled",
                            "    - ASoC: codecs: Fix gain setting ranges for Renesas IDT821034 codec",
                            "    - ASoC: nau8821: Cancel jdet_work before handling jack ejection",
                            "    - ASoC: nau8821: Generalize helper to clear IRQ status",
                            "    - ASoC: nau8821: Consistently clear interrupts before unmasking",
                            "    - ASoC: nau8821: Add DMI quirk to bypass jack debounce circuit",
                            "    - drm/i915/guc: Skip communication warning on reset in progress",
                            "    - drm/i915/frontbuffer: Move bo refcounting",
                            "      intel_frontbuffer_{get,release}()",
                            "    - drm/i915/fb: Fix the set_tiling vs. addfb race, again",
                            "    - drm/amdgpu: add ip offset support for cyan skillfish",
                            "    - drm/amdgpu: add support for cyan skillfish without IP discovery",
                            "    - drm/amdgpu: fix handling of harvesting for ip_discovery firmware",
                            "    - drm/amdgpu: handle wrap around in reemit handling",
                            "    - drm/amdgpu: set an error on all fences from a bad context",
                            "    - drm/amdgpu: drop unused structures in amdgpu_drm.h",
                            "    - drm/amd/powerplay: Fix CIK shutdown temperature",
                            "    - drm/xe: Enable media sampler power gating",
                            "    - drm/draw: fix color truncation in drm_draw_fill24",
                            "    - drm/rockchip: vop2: use correct destination rectangle height check",
                            "    - HID: intel-thc-hid: Intel-quickspi: switch first interrupt from level to",
                            "      edge detection",
                            "    - sched/fair: Fix pelt lost idle time detection",
                            "    - ALSA: firewire: amdtp-stream: fix enum kernel-doc warnings",
                            "    - accel/qaic: Synchronize access to DBC request queue head & tail pointer",
                            "    - nvme-auth: update sc_c in host response",
                            "    - cxl/trace: Subtract to find an hpa_alias0 in cxl_poison events",
                            "    - selftests/bpf: make arg_parsing.c more robust to crashes",
                            "    - blk-mq: fix stale tag depth for shared sched tags in",
                            "      blk_mq_update_nr_requests()",
                            "    - block: Remove elevator_lock usage from blkg_conf frozen operations",
                            "    - HID: hid-input: only ignore 0 battery events for digitizers",
                            "    - HID: multitouch: fix name of Stylus input devices",
                            "    - drm/xe/evict: drop bogus assert",
                            "    - selftests: arg_parsing: Ensure data is flushed to disk before reading.",
                            "    - nvme/tcp: handle tls partially sent records in write_space()",
                            "    - rust: cpufreq: fix formatting",
                            "    - arm64: debug: always unmask interrupts in el0_softstp()",
                            "    - arm64: cputype: Add Neoverse-V3AE definitions",
                            "    - arm64: errata: Apply workarounds for Neoverse-V3AE",
                            "    - xfs: rename the old_crc variable in xlog_recover_process",
                            "    - xfs: fix log CRC mismatches between i386 and other architectures",
                            "    - NFSD: Rework encoding and decoding of nfsd4_deviceid",
                            "    - NFSD: Minor cleanup in layoutcommit processing",
                            "    - NFSD: Implement large extent array support in pNFS",
                            "    - NFSD: Fix last write offset handling in layoutcommit",
                            "    - phy: cdns-dphy: Store hs_clk_rate and return it",
                            "    - phy: cadence: cdns-dphy: Fix PLL lock and O_CMN_READY polling",
                            "    - x86/resctrl: Refactor resctrl_arch_rmid_read()",
                            "    - x86/resctrl: Fix miscount of bandwidth event when reactivating",
                            "      previously unavailable RMID",
                            "    - cxl: Fix match_region_by_range() to use region_res_match_cxl_range()",
                            "    - phy: cadence: cdns-dphy: Update calibration wait time for startup state",
                            "      machine",
                            "    - drm/xe: Use devm_ioremap_wc for VRAM mapping and drop manual unmap",
                            "    - drm/xe: Use dynamic allocation for tile and device VRAM region",
                            "      structures",
                            "    - drm/xe: Move struct xe_vram_region to a dedicated header",
                            "    - drm/xe: Unify the initialization of VRAM regions",
                            "    - drm/xe: Move rebar to be done earlier",
                            "    - PM: hibernate: Fix pm_hibernation_mode_is_suspend() build breakage",
                            "    - drm/xe: Fix an IS_ERR() vs NULL bug in xe_tile_alloc_vram()",
                            "    - Linux 6.17.5",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40086",
                            "    - drm/xe: Don't allow evicting of BOs in same VM in array of VM binds",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40087",
                            "    - NFSD: Define a proc_layoutcommit for the FlexFiles layout type",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40088",
                            "    - hfsplus: fix slab-out-of-bounds read in hfsplus_strcasecmp()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40162",
                            "    - ASoC: amd/sdw_utils: avoid NULL deref when devm_kasprintf() fails",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40085",
                            "    - ALSA: usb-audio: Fix NULL pointer deference in try_to_register_card",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40172",
                            "    - accel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40177",
                            "    - accel/qaic: Fix bootlog initialization ordering",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40163",
                            "    - sched/deadline: Stop dl_server before CPU goes offline",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40174",
                            "    - x86/mm: Fix SMP ordering in switch_mm_irqs_off()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40089",
                            "    - cxl/features: Add check for no entries in cxl_feature_info",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40176",
                            "    - tls: wait for pending async decryptions if tls_strp_msg_hold fails",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40164",
                            "    - usbnet: Fix using smp_processor_id() in preemptible code warnings",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40091",
                            "    - ixgbe: fix too early devlink_free() in ixgbe_remove()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40175",
                            "    - idpf: cleanup remaining SKBs in PTP flows",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40173",
                            "    - net/ip6_tunnel: Prevent perpetual tunnel growth",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40092",
                            "    - usb: gadget: f_ncm: Refactor bind path to use __free()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40093",
                            "    - usb: gadget: f_ecm: Refactor bind path to use __free()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40094",
                            "    - usb: gadget: f_acm: Refactor bind path to use __free()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40095",
                            "    - usb: gadget: f_rndis: Refactor bind path to use __free()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40165",
                            "    - media: nxp: imx8-isi: m2m: Fix streaming cleanup on release",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40096",
                            "    - drm/sched: Fix potential double free in",
                            "      drm_sched_job_add_resv_dependencies",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40097",
                            "    - ALSA: hda: Fix missing pointer check in hda_component_manager_init",
                            "      function",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40098",
                            "    - ALSA: hda: cs35l41: Fix NULL pointer dereference in",
                            "      cs35l41_get_acpi_mute_state()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40099",
                            "    - cifs: parse_dfs_referrals: prevent oob on malformed input",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40100",
                            "    - btrfs: do not assert we found block group item when creating free space",
                            "      tree",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40101",
                            "    - btrfs: fix memory leaks when rejecting a non SINGLE data profile without",
                            "      an RST",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40167",
                            "    - ext4: detect invalid INLINE_DATA + EXTENTS flag combination",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40102",
                            "    - KVM: arm64: Prevent access to vCPU events before init",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40103",
                            "    - smb: client: Fix refcount leak for cifs_sb_tlink",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40104",
                            "    - ixgbevf: fix mailbox API compatibility by negotiating supported features",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40166",
                            "    - drm/xe/guc: Check GuC running state before deregistering exec queue",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40105",
                            "    - vfs: Don't leak disconnected dentries on umount",
                            "  * The machine didn’t go into suspend and got stuck (LP: #2132095)",
                            "    - platform/x86: alienware-wmi-wmax: Fix NULL pointer dereference in sleep",
                            "      handlers",
                            "  * CAP_PERFMON insufficient to get perf data (LP: #2131046)",
                            "    - SAUCE: perf/core: Allow CAP_PERFMON for paranoid level 4",
                            "  * Poweroff not working consistently after upgrading kernel 6.14.0-17.17 or",
                            "    later (LP: #2115860)",
                            "    - drm/amd: Unify shutdown() callback behavior",
                            "    - drm/amd: Stop exporting amdgpu_device_ip_suspend() outside amdgpu_device",
                            "    - drm/amd: Remove comment about handling errors in",
                            "      amdgpu_device_ip_suspend_phase1()",
                            "    - drm/amd: Don't always set IP block HW status to false",
                            "    - drm/amd: Pass IP suspend errors up to callers",
                            "    - drm/amd: Avoid evicting resources at S5",
                            "  * Re-enable INTEL_SKL_INT3472 for kernels >= 6.16 for Intel IPU camera",
                            "    (LP: #2128792)",
                            "    - Revert \"UBUNTU: [Config] FTBFS: disable INTEL_SKL_INT3472\"",
                            "    - Revert \"UBUNTU: SAUCE: platform/x86: int3472: Add handshake GPIO",
                            "      function\"",
                            "  * Support Samsung S5K3J1 sensor for Intel MIPI camera (LP: #2121852)",
                            "    - SAUCE: media: ipu-bridge: Support s5k3j1 sensor",
                            "  * Questing update: v6.17.4 upstream stable release (LP: #2131259)",
                            "    - fs: always return zero on success from replace_fd()",
                            "    - fscontext: do not consume log entries when returning -EMSGSIZE",
                            "    - btrfs: fix the incorrect max_bytes value for find_lock_delalloc_range()",
                            "    - arm64: map [_text, _stext) virtual address range non-executable+read-",
                            "      only",
                            "    - rseq: Protect event mask against membarrier IPI",
                            "    - statmount: don't call path_put() under namespace semaphore",
                            "    - listmount: don't call path_put() under namespace semaphore",
                            "    - clocksource/drivers/clps711x: Fix resource leaks in error paths",
                            "    - memcg: skip cgroup_file_notify if spinning is not allowed",
                            "    - page_pool: Fix PP_MAGIC_MASK to avoid crashing on some 32-bit arches",
                            "    - PM: runtime: Update kerneldoc return codes",
                            "    - dma-mapping: fix direction in dma_alloc direction traces",
                            "    - cpufreq: Make drivers using CPUFREQ_ETERNAL specify transition latency",
                            "    - nfsd: unregister with rpcbind when deleting a transport",
                            "    - KVM: x86: Add helper to retrieve current value of user return MSR",
                            "    - KVM: SVM: Emulate PERF_CNTR_GLOBAL_STATUS_SET for PerfMonV2",
                            "    - iio: frequency: adf4350: Fix ADF4350_REG3_12BIT_CLKDIV_MODE",
                            "    - media: v4l2-subdev: Fix alloc failure check in",
                            "      v4l2_subdev_call_state_try()",
                            "    - asm-generic/io.h: Skip trace helpers if rwmmio events are disabled",
                            "    - clk: npcm: select CONFIG_AUXILIARY_BUS",
                            "    - clk: thead: th1520-ap: describe gate clocks with clk_gate",
                            "    - clk: thead: th1520-ap: fix parent of padctrl0 clock",
                            "    - clk: thead: Correct parent for DPU pixel clocks",
                            "    - clk: renesas: r9a08g045: Add MSTOP for GPIO",
                            "    - perf disasm: Avoid undefined behavior in incrementing NULL",
                            "    - perf test trace_btf_enum: Skip if permissions are insufficient",
                            "    - perf evsel: Avoid container_of on a NULL leader",
                            "    - libperf event: Ensure tracing data is multiple of 8 sized",
                            "    - clk: qcom: common: Fix NULL vs IS_ERR() check in qcom_cc_icc_register()",
                            "    - clk: qcom: Select the intended config in QCS_DISPCC_615",
                            "    - perf parse-events: Handle fake PMUs in CPU terms",
                            "    - clk: at91: peripheral: fix return value",
                            "    - clk: renesas: cpg-mssr: Fix memory leak in cpg_mssr_reserved_init()",
                            "    - perf: Completely remove possibility to override MAX_NR_CPUS",
                            "    - perf drm_pmu: Fix fd_dir leaks in for_each_drm_fdinfo_in_dir()",
                            "    - perf util: Fix compression checks returning -1 as bool",
                            "    - rtc: x1205: Fix Xicor X1205 vendor prefix",
                            "    - rtc: optee: fix memory leak on driver removal",
                            "    - perf arm_spe: Correct setting remote access",
                            "    - perf arm_spe: Correct memory level for remote access",
                            "    - perf vendor events arm64 AmpereOneX: Fix typo - should be",
                            "      l1d_cache_access_prefetches",
                            "    - perf test: AMD IBS swfilt skip kernel tests if paranoia is >1",
                            "    - perf test shell lbr: Avoid failures with perf event paranoia",
                            "    - perf trace: Fix IS_ERR() vs NULL check bug",
                            "    - perf session: Fix handling when buffer exceeds 2 GiB",
                            "    - perf test: Don't leak workload gopipe in PERF_RECORD_*",
                            "    - perf evsel: Fix uniquification when PMU given without suffix",
                            "    - perf test: Avoid uncore_imc/clockticks in uniquification test",
                            "    - perf evsel: Ensure the fallback message is always written to",
                            "    - perf build-id: Ensure snprintf string is empty when size is 0",
                            "    - clk: mediatek: mt8195-infra_ao: Fix parent for infra_ao_hdmi_26m",
                            "    - clk: mediatek: clk-mux: Do not pass flags to",
                            "      clk_mux_determine_rate_flags()",
                            "    - clk: nxp: lpc18xx-cgu: convert from round_rate() to determine_rate()",
                            "    - clk: nxp: Fix pll0 rate check condition in LPC18xx CGU driver",
                            "    - clk: tegra: do not overallocate memory for bpmp clocks",
                            "    - nfsd: fix assignment of ia_ctime.tv_nsec on delegated mtime update",
                            "    - nfsd: ignore ATTR_DELEG when checking ia_valid before notify_change()",
                            "    - vfs: add ATTR_CTIME_SET flag",
                            "    - nfsd: use ATTR_CTIME_SET for delegated ctime updates",
                            "    - nfsd: track original timestamps in nfs4_delegation",
                            "    - nfsd: fix SETATTR updates for delegated timestamps",
                            "    - nfsd: fix timestamp updates in CB_GETATTR",
                            "    - tracing: Fix the bug where bpf_get_stackid returns -EFAULT on the ARM64",
                            "    - PM: core: Annotate loops walking device links as _srcu",
                            "    - PM: core: Add two macros for walking device links",
                            "    - PM: sleep: Do not wait on SYNC_STATE_ONLY device links",
                            "    - cpufreq: tegra186: Set target frequency for all cpus in policy",
                            "    - scsi: mvsas: Fix use-after-free bugs in mvs_work_queue",
                            "    - perf bpf-filter: Fix opts declaration on older libbpfs",
                            "    - scsi: ufs: sysfs: Make HID attributes visible",
                            "    - mshv: Handle NEED_RESCHED_LAZY before transferring to guest",
                            "    - perf bpf_counter: Fix handling of cpumap fixing hybrid",
                            "    - ASoC: SOF: ipc4-topology: Correct the minimum host DMA buffer size",
                            "    - ASoC: SOF: ipc4-topology: Account for different ChainDMA host buffer",
                            "      size",
                            "    - ASoC: SOF: Intel: hda-pcm: Place the constraint on period time instead",
                            "      of buffer time",
                            "    - LoongArch: Add cflag -fno-isolate-erroneous-paths-dereference",
                            "    - LoongArch: Fix build error for LTO with LLVM-18",
                            "    - LoongArch: Init acpi_gbl_use_global_lock to false",
                            "    - ASoC: SOF: Intel: Read the LLP via the associated Link DMA channel",
                            "    - net: usb: lan78xx: Fix lost EEPROM read timeout error(-ETIMEDOUT) in",
                            "      lan78xx_read_raw_eeprom",
                            "    - net/mlx4: prevent potential use after free in mlx4_en_do_uc_filter()",
                            "    - drm/xe/hw_engine_group: Fix double write lock release in error path",
                            "    - drm/xe/i2c: Don't rely on d3cold.allowed flag in system PM path",
                            "    - s390/cio: Update purge function to unregister the unused subchannels",
                            "    - drm/vmwgfx: Fix a null-ptr access in the cursor snooper",
                            "    - drm/vmwgfx: Fix Use-after-free in validation",
                            "    - drm/vmwgfx: Fix copy-paste typo in validation",
                            "    - net/sctp: fix a null dereference in sctp_disposition",
                            "      sctp_sf_do_5_1D_ce()",
                            "    - tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request().",
                            "    - net: mscc: ocelot: Fix use-after-free caused by cyclic delayed work",
                            "    - selftest: net: ovpn: Fix uninit return values",
                            "    - ice: ice_adapter: release xa entry on adapter allocation failure",
                            "    - net: fsl_pq_mdio: Fix device node reference leak in fsl_pq_mdio_probe",
                            "    - tools build: Align warning options with perf",
                            "    - perf python: split Clang options when invoking Popen",
                            "    - tcp: take care of zero tp->window_clamp in tcp_set_rcvlowat()",
                            "    - mailbox: zynqmp-ipi: Remove redundant mbox_controller_unregister() call",
                            "    - mailbox: zynqmp-ipi: Remove dev.parent check in zynqmp_ipi_free_mboxes",
                            "    - mailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop",
                            "    - mailbox: zynqmp-ipi: Fix SGI cleanup on unbind",
                            "    - bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}",
                            "    - net: mdio: mdio-i2c: Hold the i2c bus lock during smbus transactions",
                            "    - net: sparx5/lan969x: fix flooding configuration on bridge join/leave",
                            "    - net/mlx5: Prevent tunnel mode conflicts between FDB and NIC IPsec tables",
                            "    - net/mlx5e: Prevent tunnel reformat when tunnel mode not allowed",
                            "    - mailbox: mtk-cmdq: Remove pm_runtime APIs from cmdq_mbox_send_data()",
                            "    - drm/amdgpu: Add additional DCE6 SCL registers",
                            "    - drm/amd/display: Add missing DCE6 SCL_HORZ_FILTER_INIT* SRIs",
                            "    - drm/amd/display: Properly clear SCL_*_FILTER_CONTROL on DCE6",
                            "    - drm/amd/display: Properly disable scaling on DCE6",
                            "    - drm/amd/display: Disable scaling on DCE6 for now",
                            "    - drm/amdkfd: Fix kfd process ref leaking when userptr unmapping",
                            "    - net: pse-pd: tps23881: Fix current measurement scaling",
                            "    - crypto: skcipher - Fix reqsize handling",
                            "    - netfilter: nft_objref: validate objref and objrefmap expressions",
                            "    - bridge: br_vlan_fill_forward_path_pvid: use br_vlan_group_rcu()",
                            "    - selftests: netfilter: nft_fib.sh: fix spurious test failures",
                            "    - selftests: netfilter: query conntrack state to check for port clash",
                            "      resolution",
                            "    - io_uring/zcrx: increment fallback loop src offset",
                            "    - net: airoha: Fix loopback mode configuration for GDM2 port",
                            "    - cifs: Fix copy_to_iter return value check",
                            "    - smb: client: fix missing timestamp updates after utime(2)",
                            "    - rtc: isl12022: Fix initial enable_irq/disable_irq balance",
                            "    - cifs: Query EA $LXMOD in cifs_query_path_info() for WSL reparse points",
                            "    - tpm_tis: Fix incorrect arguments in tpm_tis_probe_irq_single",
                            "    - gpio: wcd934x: mark the GPIO controller as sleeping",
                            "    - bpf: Avoid RCU context warning when unpinning htab with internal structs",
                            "    - kbuild: always create intermediate vmlinux.unstripped",
                            "    - kbuild: keep .modinfo section in vmlinux.unstripped",
                            "    - kbuild: Restore pattern to avoid stripping .rela.dyn from vmlinux",
                            "    - kbuild: Add '.rel.*' strip pattern for vmlinux",
                            "    - s390: vmlinux.lds.S: Reorder sections",
                            "    - s390/vmlinux.lds.S: Move .vmlinux.info to end of allocatable sections",
                            "    - ACPICA: acpidump: drop ACPI_NONSTRING attribute from file_name",
                            "    - ACPI: property: Fix buffer properties extraction for subnodes",
                            "    - ACPI: TAD: Add missing sysfs_remove_group() for ACPI_TAD_RT",
                            "    - ACPICA: Debugger: drop ACPI_NONSTRING attribute from name_seg",
                            "    - ACPI: debug: fix signedness issues in read/write helpers",
                            "    - ACPI: battery: Add synchronization between interface updates",
                            "    - arm64: dts: qcom: msm8916: Add missing MDSS reset",
                            "    - arm64: dts: qcom: msm8939: Add missing MDSS reset",
                            "    - arm64: dts: qcom: sdm845: Fix slimbam num-channels/ees",
                            "    - Revert \"UBUNTU: SAUCE: arm64: dts: qcom: x1e80100-pmics: Disable pm8010",
                            "      by default\"",
                            "    - arm64: dts: qcom: x1e80100-pmics: Disable pm8010 by default",
                            "    - arm64: dts: ti: k3-am62a-main: Fix main padcfg length",
                            "    - arm64: dts: ti: k3-am62p: Fix supported hardware for 1GHz OPP",
                            "    - arm64: kprobes: call set_memory_rox() for kprobe page",
                            "    - arm64: mte: Do not flag the zero page as PG_mte_tagged",
                            "    - ARM: AM33xx: Implement TI advisory 1.0.36 (EMU0/EMU1 pins state on",
                            "      reset)",
                            "    - ARM: OMAP2+: pm33xx-core: ix device node reference leaks in",
                            "      amx3_idle_init",
                            "    - firmware: arm_scmi: quirk: Prevent writes to string constants",
                            "    - perf/arm-cmn: Fix CMN S3 DTM offset",
                            "    - KVM: s390: Fix to clear PTE when discarding a swapped page",
                            "    - KVM: arm64: Fix debug checking for np-guests using huge mappings",
                            "    - KVM: arm64: Fix page leak in user_mem_abort()",
                            "    - x86/kvm: Force legacy PCI hole to UC when overriding MTRRs for TDX/SNP",
                            "    - KVM: SVM: Re-load current, not host, TSC_AUX on #VMEXIT from SEV-ES",
                            "      guest",
                            "    - KVM: TDX: Fix uninitialized error code for __tdx_bringup()",
                            "    - dt-bindings: phy: rockchip-inno-csi-dphy: make power-domains non-",
                            "      required",
                            "    - xen: take system_transition_mutex on suspend",
                            "    - xen/events: Cleanup find_virq() return codes",
                            "    - xen/manage: Fix suspend error path",
                            "    - xen/events: Return -EEXIST for bound VIRQs",
                            "    - xen/events: Update virq_to_irq on migration",
                            "    - firmware: exynos-acpm: fix PMIC returned errno",
                            "    - firmware: meson_sm: fix device leak at probe",
                            "    - media: cec: extron-da-hd-4k-plus: drop external-module make commands",
                            "    - media: cx18: Add missing check after DMA map",
                            "    - media: i2c: mt9p031: fix mbus code initialization",
                            "    - media: i2c: mt9v111: fix incorrect type for ret",
                            "    - media: mc: Fix MUST_CONNECT handling for pads with no links",
                            "    - media: pci: ivtv: Add missing check after DMA map",
                            "    - media: pci: mg4b: fix uninitialized iio scan data",
                            "    - media: platform: mtk-mdp3: Add missing MT8188 compatible to comp_dt_ids",
                            "    - media: s5p-mfc: remove an unused/uninitialized variable",
                            "    - media: staging/ipu7: fix isys device runtime PM usage in firmware",
                            "      closing",
                            "    - media: uvcvideo: Avoid variable shadowing in uvc_ctrl_cleanup_fh",
                            "    - media: venus: firmware: Use correct reset sequence for IRIS2",
                            "    - media: venus: pm_helpers: add fallback for the opp-table",
                            "    - media: vivid: fix disappearing <Vendor Command With ID> messages",
                            "    - media: vsp1: Export missing vsp1_isp_free_buffer symbol",
                            "    - media: ti: j721e-csi2rx: Use devm_of_platform_populate",
                            "    - media: ti: j721e-csi2rx: Fix source subdev link creation",
                            "    - media: lirc: Fix error handling in lirc_register()",
                            "    - drm/exynos: exynos7_drm_decon: remove ctx->suspended",
                            "    - drm/panthor: Fix memory leak in panthor_ioctl_group_create()",
                            "    - drm/msm/a6xx: Fix PDC sleep sequence",
                            "    - drm/rcar-du: dsi: Fix 1/2/3 lane support",
                            "    - drm/nouveau: fix bad ret code in nouveau_bo_move_prep",
                            "    - drm/xe/uapi: loosen used tracking restriction",
                            "    - drm/amd/display: Incorrect Mirror Cositing",
                            "    - drm/amd/display: Enable Dynamic DTBCLK Switch",
                            "    - drm/amd/display: Fix unsafe uses of kernel mode FPU",
                            "    - blk-crypto: fix missing blktrace bio split events",
                            "    - btrfs: avoid potential out-of-bounds in btrfs_encode_fh()",
                            "    - bus: mhi: ep: Fix chained transfer handling in read path",
                            "    - bus: mhi: host: Do not use uninitialized 'dev' pointer in",
                            "      mhi_init_irq_setup()",
                            "    - cdx: Fix device node reference leak in cdx_msi_domain_init",
                            "    - clk: qcom: tcsrcc-x1e80100: Set the bi_tcxo as parent to eDP refclk",
                            "    - clk: samsung: exynos990: Use PLL_CON0 for PLL parent muxes",
                            "    - clk: samsung: exynos990: Fix CMU_TOP mux/div bit widths",
                            "    - clk: samsung: exynos990: Replace bogus divs with fixed-factor clocks",
                            "    - copy_sighand: Handle architectures where sizeof(unsigned long) <",
                            "      sizeof(u64)",
                            "    - cpufreq: CPPC: Avoid using CPUFREQ_ETERNAL as transition delay",
                            "    - cpufreq: intel_pstate: Fix object lifecycle issue in",
                            "      update_qos_request()",
                            "    - crypto: aspeed - Fix dma_unmap_sg() direction",
                            "    - crypto: atmel - Fix dma_unmap_sg() direction",
                            "    - crypto: rockchip - Fix dma_unmap_sg() nents value",
                            "    - eventpoll: Replace rwlock with spinlock",
                            "    - fbdev: Fix logic error in \"offb\" name match",
                            "    - fs/ntfs3: Fix a resource leak bug in wnd_extend()",
                            "    - fs: quota: create dedicated workqueue for quota_release_work",
                            "    - fsnotify: pass correct offset to fsnotify_mmap_perm()",
                            "    - fuse: fix possibly missing fuse_copy_finish() call in fuse_notify()",
                            "    - fuse: fix livelock in synchronous file put from fuseblk workers",
                            "    - gpio: mpfs: fix setting gpio direction to output",
                            "    - i3c: Fix default I2C adapter timeout value",
                            "    - iio/adc/pac1934: fix channel disable configuration",
                            "    - iio: dac: ad5360: use int type to store negative error codes",
                            "    - iio: dac: ad5421: use int type to store negative error codes",
                            "    - iio: frequency: adf4350: Fix prescaler usage.",
                            "    - iio: xilinx-ams: Fix AMS_ALARM_THR_DIRECT_MASK",
                            "    - iio: xilinx-ams: Unmask interrupts after updating alarms",
                            "    - init: handle bootloader identifier in kernel parameters",
                            "    - iio: imu: inv_icm42600: Simplify pm_runtime setup",
                            "    - iio: imu: inv_icm42600: Drop redundant pm_runtime reinitialization in",
                            "      resume",
                            "    - iio: imu: inv_icm42600: Avoid configuring if already pm_runtime",
                            "      suspended",
                            "    - iommu/vt-d: PRS isn't usable if PDS isn't supported",
                            "    - ipmi: Rework user message limit handling",
                            "    - ipmi:msghandler:Change seq_lock to a mutex",
                            "    - kernel/sys.c: fix the racy usage of task_lock(tsk->group_leader) in",
                            "      sys_prlimit64() paths",
                            "    - KEYS: trusted_tpm1: Compare HMAC values in constant time",
                            "    - kho: only fill kimage if KHO is finalized",
                            "    - lib/genalloc: fix device leak in of_gen_pool_get()",
                            "    - loop: fix backing file reference leak on validation error",
                            "    - md: fix mssing blktrace bio split events",
                            "    - of: unittest: Fix device reference count leak in",
                            "      of_unittest_pci_node_verify",
                            "    - openat2: don't trigger automounts with RESOLVE_NO_XDEV",
                            "    - padata: Reset next CPU when reorder sequence wraps around",
                            "    - parisc: don't reference obsolete termio struct for TC* constants",
                            "    - parisc: Remove spurious if statement from raw_copy_from_user()",
                            "    - nvme-pci: Add TUXEDO IBS Gen8 to Samsung sleep quirk",
                            "    - pinctrl: samsung: Drop unused S3C24xx driver data",
                            "    - PM: EM: Fix late boot with holes in CPU topology",
                            "    - PM: hibernate: Fix hybrid-sleep",
                            "    - PM: hibernate: Restrict GFP mask in power_down()",
                            "    - power: supply: max77976_charger: fix constant current reporting",
                            "    - powerpc/powernv/pci: Fix underflow and leak issue",
                            "    - powerpc/pseries/msi: Fix potential underflow and leak issue",
                            "    - pwm: berlin: Fix wrong register in suspend/resume",
                            "    - pwm: Fix incorrect variable used in error message",
                            "    - Revert \"ipmi: fix msg stack when IPMI is disconnected\"",
                            "    - sched/deadline: Fix race in push_dl_task()",
                            "    - scsi: hpsa: Fix potential memory leak in hpsa_big_passthru_ioctl()",
                            "    - scsi: sd: Fix build warning in sd_revalidate_disk()",
                            "    - sctp: Fix MAC comparison to be constant-time",
                            "    - smb client: fix bug with newly created file in cached dir",
                            "    - sparc64: fix hugetlb for sun4u",
                            "    - sparc: fix error handling in scan_one_device()",
                            "    - xtensa: simdisk: add input size check in proc_write_simdisk",
                            "    - xsk: Harden userspace-supplied xdp_desc validation",
                            "    - mtd: rawnand: fsmc: Default to autodetect buswidth",
                            "    - mtd: nand: raw: gpmi: fix clocks when CONFIG_PM=N",
                            "    - mmc: core: SPI mode remove cmd7",
                            "    - mmc: mmc_spi: multiple block read remove read crc ack",
                            "    - memory: samsung: exynos-srom: Fix of_iomap leak in exynos_srom_probe",
                            "    - memory: stm32_omm: Fix req2ack update test",
                            "    - rtc: interface: Ensure alarm irq is enabled when UIE is enabled",
                            "    - rtc: interface: Fix long-standing race when setting alarm",
                            "    - rseq/selftests: Use weak symbol reference, not definition, to link with",
                            "      glibc",
                            "    - PCI: xilinx-nwl: Fix ECAM programming",
                            "    - PCI: tegra: Convert struct tegra_msi mask_lock into raw spinlock",
                            "    - PCI/sysfs: Ensure devices are powered for config reads",
                            "    - PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV",
                            "    - PCI/ERR: Fix uevent on failure to recover",
                            "    - PCI/AER: Fix missing uevent on recovery when a reset is requested",
                            "    - PCI/AER: Support errors introduced by PCIe r6.0",
                            "    - PCI: Ensure relaxed tail alignment does not increase min_align",
                            "    - PCI: Fix failure detection during resource resize",
                            "    - PCI: j721e: Fix module autoloading",
                            "    - PCI: j721e: Fix programming sequence of \"strap\" settings",
                            "    - PCI: keystone: Use devm_request_irq() to free \"ks-pcie-error-irq\" on",
                            "      exit",
                            "    - PCI: rcar-gen4: Fix PHY initialization",
                            "    - PCI: rcar-host: Drop PMSR spinlock",
                            "    - PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock",
                            "    - PCI: tegra194: Fix broken tegra_pcie_ep_raise_msi_irq()",
                            "    - PCI: tegra194: Handle errors in BPMP response",
                            "    - PCI: tegra194: Reset BARs when running in PCIe endpoint mode",
                            "    - PCI/pwrctrl: Fix device leak at registration",
                            "    - PCI/pwrctrl: Fix device and OF node leak at bus scan",
                            "    - PCI/pwrctrl: Fix device leak at device stop",
                            "    - spi: cadence-quadspi: Flush posted register writes before INDAC access",
                            "    - spi: cadence-quadspi: Flush posted register writes before DAC access",
                            "    - spi: cadence-quadspi: Fix cqspi_setup_flash()",
                            "    - xfs: use deferred intent items for reaping crosslinked blocks",
                            "    - x86/fred: Remove ENDBR64 from FRED entry points",
                            "    - x86/umip: Check that the instruction opcode is at least two bytes",
                            "    - x86/umip: Fix decoding of register forms of 0F 01 (SGDT and SIDT",
                            "      aliases)",
                            "    - mptcp: pm: in-kernel: usable client side with C-flag",
                            "    - mptcp: reset blackhole on success with non-loopback ifaces",
                            "    - selftests: mptcp: join: validate C-flag + def limit",
                            "    - s390/cio/ioasm: Fix __xsch() condition code handling",
                            "    - s390/dasd: enforce dma_alignment to ensure proper buffer validation",
                            "    - s390/dasd: Return BLK_STS_INVAL for EINVAL from do_dasd_request",
                            "    - s390: Add -Wno-pointer-sign to KBUILD_CFLAGS_DECOMPRESSOR",
                            "    - slab: prevent warnings when slab obj_exts vector allocation fails",
                            "    - slab: mark slab->obj_exts allocation failures unconditionally",
                            "    - wifi: ath11k: HAL SRNG: don't deinitialize and re-initialize again",
                            "    - wifi: iwlwifi: Fix dentry reference leak in iwl_mld_add_link_debugfs",
                            "    - wifi: rtw89: avoid possible TX wait initialization race",
                            "    - wifi: mt76: mt7925u: Add VID/PID for Netgear A9000",
                            "    - wifi: mt76: mt7921u: Add VID/PID for Netgear A7500",
                            "    - mm/thp: fix MTE tag mismatch when replacing zero-filled subpages",
                            "    - mm/rmap: fix soft-dirty and uffd-wp bit loss when remapping zero-filled",
                            "      mTHP subpage to shared zeropage",
                            "    - mm/page_alloc: only set ALLOC_HIGHATOMIC for __GPF_HIGH allocations",
                            "    - mm/hugetlb: early exit from hugetlb_pages_alloc_boot() when",
                            "      max_huge_pages=0",
                            "    - mm/damon/vaddr: do not repeat pte_offset_map_lock() until success",
                            "    - mm/damon/lru_sort: use param_ctx for damon_attrs staging",
                            "    - nfsd: decouple the xprtsec policy check from check_nfsd_access()",
                            "    - NFSD: Fix destination buffer size in nfsd4_ssc_setup_dul()",
                            "    - nfsd: nfserr_jukebox in nlm_fopen should lead to a retry",
                            "    - media: iris: Call correct power off callback in cleanup path",
                            "    - media: iris: Fix firmware reference leak and unmap memory after load",
                            "    - media: iris: fix module removal if firmware download failed",
                            "    - media: iris: vpu3x: Add MNoC low power handshake during hardware power-",
                            "      off",
                            "    - media: iris: Fix port streaming handling",
                            "    - media: iris: Fix buffer count reporting in internal buffer check",
                            "    - media: iris: Allow substate transition to load resources during output",
                            "      streaming",
                            "    - media: iris: Always destroy internal buffers on firmware release",
                            "      response",
                            "    - media: iris: Simplify session stop logic by relying on vb2 checks",
                            "    - media: iris: Update vbuf flags before v4l2_m2m_buf_done",
                            "    - media: iris: Send dummy buffer address for all codecs during drain",
                            "    - media: iris: Fix missing LAST flag handling during drain",
                            "    - media: iris: Fix format check for CAPTURE plane in try_fmt",
                            "    - media: iris: Allow stop on firmware only if start was issued.",
                            "    - ext4: add ext4_sb_bread_nofail() helper function for",
                            "      ext4_free_branches()",
                            "    - ext4: fail unaligned direct IO write with EINVAL",
                            "    - ext4: verify orphan file size is not too big",
                            "    - ext4: increase i_disksize to offset + len in",
                            "      ext4_update_disksize_before_punch()",
                            "    - ext4: correctly handle queries for metadata mappings",
                            "    - ext4: avoid potential buffer over-read in parse_apply_sb_mount_options()",
                            "    - ext4: fix an off-by-one issue during moving extents",
                            "    - ext4: guard against EA inode refcount underflow in xattr update",
                            "    - ext4: validate ea_ino and size in check_xattrs",
                            "    - ACPICA: Allow to skip Global Lock initialization",
                            "    - ext4: free orphan info with kvfree",
                            "    - ipmi: Fix handling of messages with provided receive message pointer",
                            "    - Squashfs: add additional inode sanity checking",
                            "    - Squashfs: reject negative file sizes in squashfs_read_inode()",
                            "    - mm/ksm: fix incorrect KSM counter handling in mm_struct during fork",
                            "    - media: mc: Clear minor number before put device",
                            "    - arm64: dts: qcom: qcs615: add missing dt property in QUP SEs",
                            "    - ACPI: property: Disregard references in data-only subnode lists",
                            "    - ACPI: property: Add code comments explaining what is going on",
                            "    - ACPI: property: Do not pass NULL handles to acpi_attach_data()",
                            "    - irqchip/sifive-plic: Avoid interrupt ID 0 handling during suspend/resume",
                            "    - copy_file_range: limit size if in compat mode",
                            "    - minixfs: Verify inode mode when loading from disk",
                            "    - pid: Add a judgment for ns null in pid_nr_ns",
                            "    - fs: Add 'initramfs_options' to set initramfs mount options",
                            "    - cramfs: Verify inode mode when loading from disk",
                            "    - nsfs: validate extensible ioctls",
                            "    - mnt_ns_tree_remove(): DTRT if mnt_ns had never been added to mnt_ns_list",
                            "    - writeback: Avoid softlockup when switching many inodes",
                            "    - writeback: Avoid excessively long inode switching times",
                            "    - iomap: error out on file IO when there is no inline_data buffer",
                            "    - pidfs: validate extensible ioctls",
                            "    - mount: handle NULL values in mnt_ns_release()",
                            "    - Linux 6.17.4",
                            "  * Questing update: v6.17.4 upstream stable release (LP: #2131259) // Race",
                            "    condition in perf build causes build failure due to missing unistd_64.h",
                            "    header on arm64 (LP: #2131702)",
                            "    - perf tools: Fix arm64 libjvmti build by generating unistd_64.h",
                            "  * Questing update: v6.17.3 upstream stable release (LP: #2129610)",
                            "    - arch: copy_thread: pass clone_flags as u64",
                            "    - filelock: add FL_RECLAIM to show_fl_flags() macro",
                            "    - init: INITRAMFS_PRESERVE_MTIME should depend on BLK_DEV_INITRD",
                            "    - pid: use ns_capable_noaudit() when determining net sysctl permissions",
                            "    - Fix CC_HAS_ASM_GOTO_OUTPUT on non-x86 architectures",
                            "    - [Config]: Update CC configs for v6.17.3",
                            "    - seccomp: Fix a race with WAIT_KILLABLE_RECV if the tracer replies too",
                            "      fast",
                            "    - kbuild: Add missing $(objtree) prefix to powerpc crtsavres.o artifact",
                            "    - selftests: arm64: Check fread return value in exec_target",
                            "    - selftests: arm64: Fix -Waddress warning in tpidr2 test",
                            "    - kselftest/arm64/gcs: Correctly check return value when disabling GCS",
                            "    - hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()",
                            "    - gfs2: Fix GLF_INVALIDATE_IN_PROGRESS flag clearing in do_xmote",
                            "    - gfs2: Remove space before newline",
                            "    - gfs2: Further sanitize lock_dlm.c",
                            "    - gfs2: Fix LM_FLAG_TRY* logic in add_to_queue",
                            "    - gfs2: Remove duplicate check in do_xmote",
                            "    - gfs2: Get rid of GLF_INVALIDATE_IN_PROGRESS",
                            "    - gfs2: do_xmote cleanup",
                            "    - gfs2: Add proper lockspace locking",
                            "    - powerpc/8xx: Remove left-over instruction and comments in",
                            "      DataStoreTLBMiss handler",
                            "    - powerpc/603: Really copy kernel PGD entries into all PGDIRs",
                            "    - powerpc/ftrace: ensure ftrace record ops are always set for NOPs",
                            "    - powerpc64/modules: correctly iterate over stubs in",
                            "      setup_ftrace_ool_stubs",
                            "    - uprobes: uprobe_warn should use passed task",
                            "    - raid6: riscv: Clean up unused header file inclusion",
                            "    - coresight: trbe: Prevent overflow in PERF_IDX2OFF()",
                            "    - perf: arm_spe: Prevent overflow in PERF_IDX2OFF()",
                            "    - erofs: avoid reading more for fragment maps",
                            "    - smb: client: fix sending the iwrap custom IRD/ORD negotiation messages",
                            "    - smb: server: fix IRD/ORD negotiation with the client",
                            "    - perf/x86/intel: Use early_initcall() to hook bts_init()",
                            "    - perf/x86/intel: Fix IA32_PMC_x_CFG_B MSRs access error",
                            "    - x86/vdso: Fix output operand size of RDPID",
                            "    - selftests: cgroup: Make test_pids backwards compatible",
                            "    - sched/fair: Get rid of sched_domains_curr_level hack for tl->cpumask()",
                            "    - [Config]: Update CONFIG_SCHED_MC for v6.17.3",
                            "    - lsm: CONFIG_LSM can depend on CONFIG_SECURITY",
                            "    - cpuset: fix failure to enable isolated partition when containing",
                            "      isolcpus",
                            "    - btrfs: return any hit error from extent_writepage_io()",
                            "    - btrfs: fix symbolic link reading when bs > ps",
                            "    - pinctrl: renesas: rzg2l: Fix invalid unsigned return in rzg3s_oen_read()",
                            "    - arm64: dts: renesas: rzg2lc-smarc: Disable CAN-FD channel0",
                            "    - bpf: Tidy verifier bug message",
                            "    - regmap: Remove superfluous check for !config in __regmap_init()",
                            "    - selftests/bpf: Copy test_kmods when installing selftest",
                            "    - rust: cpumask: Mark CpumaskVar as transparent",
                            "    - bpf/selftests: Fix test_tcpnotify_user",
                            "    - bpf: Remove migrate_disable in kprobe_multi_link_prog_run",
                            "    - libbpf: Fix reuse of DEVMAP",
                            "    - tools/nolibc: fix error return value of clock_nanosleep()",
                            "    - ARM: dts: renesas: porter: Fix CAN pin group",
                            "    - leds: max77705: Function return instead of variable assignment",
                            "    - leds: flash: leds-qcom-flash: Update torch current clamp setting",
                            "    - s390/bpf: Do not write tail call counter into helper and kfunc frames",
                            "    - s390/bpf: Write back tail call counter for BPF_PSEUDO_CALL",
                            "    - s390/bpf: Write back tail call counter for BPF_TRAMP_F_CALL_ORIG",
                            "    - cpufreq: scmi: Account for malformed DT in scmi_dev_used_by_cpus()",
                            "    - arm64: dts: renesas: sparrow-hawk: Invert microSD voltage selector on",
                            "      EVTB1",
                            "    - arm64: dts: renesas: sparrow-hawk: Set VDDQ18_25_AVB voltage on EVTB1",
                            "    - libbpf: Export bpf_object__prepare symbol",
                            "    - firmware: arm_scmi: Mark VirtIO ready before registering",
                            "      scmi_virtio_driver",
                            "    - arm64: dts: imx93-kontron: Fix GPIO for panel regulator",
                            "    - arm64: dts: imx93-kontron: Fix USB port assignment",
                            "    - arm64: dts: imx95: Correct the lpuart7 and lpuart8 srcid",
                            "    - bpf: Remove preempt_disable in bpf_try_get_buffers",
                            "    - ACPI: processor: idle: Fix memory leak when register cpuidle device",
                            "      failed",
                            "    - genirq: Add irq_chip_(startup/shutdown)_parent()",
                            "    - PCI/MSI: Add startup/shutdown for per device domains",
                            "    - irqchip/sg2042-msi: Fix broken affinity setting",
                            "    - scripts/misc-check: update export checks for EXPORT_SYMBOL_FOR_MODULES()",
                            "    - soc: qcom: rpmh-rsc: Unconditionally clear _TRIGGER bit for TCS",
                            "    - pinctrl: meson-gxl: add missing i2c_d pinmux",
                            "    - blk-mq: check kobject state_in_sysfs before deleting in",
                            "      blk_mq_unregister_hctx",
                            "    - selftests/futex: Remove the -g parameter from futex_priv_hash",
                            "    - ARM: at91: pm: fix MCKx restore routine",
                            "    - arm64: dts: apple: t8103-j457: Fix PCIe ethernet iommu-map",
                            "    - regulator: scmi: Use int type to store negative error codes",
                            "    - selftests/futex: Fix some futex_numa_mpol subtests",
                            "    - tools/nolibc: avoid error in dup2() if old fd equals new fd",
                            "    - selftests/nolibc: fix EXPECT_NZ macro",
                            "    - leds: leds-lp55xx: Use correct address for memory programming",
                            "    - PCI/MSI: Check MSI_FLAG_PCI_MSI_MASK_PARENT in",
                            "      cond_[startup|shutdown]_parent()",
                            "    - block: use int to store blk_stack_limits() return value",
                            "    - ARM: dts: stm32: stm32mp151c-plyaqm: Use correct dai-format property",
                            "    - dt-bindings: vendor-prefixes: Add undocumented vendor prefixes",
                            "    - genirq/test: Fix depth tests on architectures with NOREQUEST by default.",
                            "    - genirq/test: Select IRQ_DOMAIN",
                            "    - genirq/test: Depend on SPARSE_IRQ",
                            "    - genirq/test: Drop CONFIG_GENERIC_IRQ_MIGRATION assumptions",
                            "    - genirq/test: Ensure CPU 1 is online for hotplug test",
                            "    - selftests/bpf: Fix count write in testapp_xdp_metadata_copy()",
                            "    - vdso/datastore: Gate time data behind CONFIG_GENERIC_GETTIMEOFDAY",
                            "    - PM: sleep: core: Clear power.must_resume in noirq suspend error path",
                            "    - blk-mq: fix elevator depth_updated method",
                            "    - vdso: Add struct __kernel_old_timeval forward declaration to gettime.h",
                            "    - ARM: dts: ti: omap: am335x-baltos: Fix ti,en-ck32k-xtal property in DTS",
                            "      to use correct boolean syntax",
                            "    - ARM: dts: ti: omap: omap3-devkit8000-lcd: Fix ti,keep-vref-on property",
                            "      to use correct boolean syntax in DTS",
                            "    - ARM: dts: omap: am335x-cm-t335: Remove unused mcasp num-serializer",
                            "      property",
                            "    - PM / devfreq: mtk-cci: Fix potential error pointer dereference in",
                            "      probe()",
                            "    - power: supply: cw2015: Fix a alignment coding style issue",
                            "    - hwmon: (asus-ec-sensors) Narrow lock for X870E-CREATOR WIFI",
                            "    - pinctrl: renesas: Use int type to store negative error codes",
                            "    - pinctrl: eswin: Fix regulator error check and Kconfig dependency",
                            "    - null_blk: Fix the description of the cache_size module argument",
                            "    - blk-throttle: fix access race during throttle policy activation",
                            "    - selftests: vDSO: Fix -Wunitialized in powerpc VDSO_CALL() wrapper",
                            "    - selftests: vDSO: vdso_test_abi: Correctly skip whole test with missing",
                            "      vDSO",
                            "    - irqchip/gic-v5: Fix loop in gicv5_its_create_itt_two_level() cleanup",
                            "      path",
                            "    - irqchip/gic-v5: Fix error handling in gicv5_its_irq_domain_alloc()",
                            "    - tick: Do not set device to detached state in tick_shutdown()",
                            "    - arm64: dts: mediatek: mt8195: Remove suspend-breaking reset from pcie0",
                            "    - arm64: dts: mediatek: mt8183: Fix out of range pull values",
                            "    - nbd: restrict sockets to TCP and UDP",
                            "    - PM / devfreq: rockchip-dfi: double count on RK3588",
                            "    - firmware: firmware: meson-sm: fix compile-test default",
                            "    - dts: arm: amlogic: fix pwm node for c3",
                            "    - soc: mediatek: mtk-svs: fix device leaks on mt8183 probe failure",
                            "    - soc: mediatek: mtk-svs: fix device leaks on mt8192 probe failure",
                            "    - cpuidle: qcom-spm: fix device and OF node leaks at probe",
                            "    - block: cleanup bio_issue",
                            "    - block: initialize bio issue time in blk_mq_submit_bio()",
                            "    - block: factor out a helper bio_submit_split_bioset()",
                            "    - block: skip unnecessary checks for split bio",
                            "    - block: fix ordering of recursive split IO",
                            "    - blk-mq: remove useless checkings in blk_mq_update_nr_requests()",
                            "    - blk-mq: check invalid nr_requests in queue_requests_store()",
                            "    - blk-mq: convert to serialize updating nr_requests with",
                            "      update_nr_hwq_lock",
                            "    - blk-mq: cleanup shared tags case in blk_mq_update_nr_requests()",
                            "    - blk-mq: split bitmap grow and resize case in blk_mq_update_nr_requests()",
                            "    - blk-mq-sched: add new parameter nr_requests in blk_mq_alloc_sched_tags()",
                            "    - blk-mq: fix potential deadlock while nr_requests grown",
                            "    - arm64: dts: allwinner: a527: cubie-a5e: Add ethernet PHY reset setting",
                            "    - arm64: dts: allwinner: t527: avaota-a1: Add ethernet PHY reset setting",
                            "    - arm64: dts: rockchip: Add RTC on rk3576-evb1-v10",
                            "    - arm64: dts: rockchip: Add WiFi on rk3576-evb1-v10",
                            "    - arm64: dts: rockchip: Fix network on rk3576 evb1 board",
                            "    - arm64: dts: ti: k3-j742s2-mcu-wakeup: Override firmware-name for MCU R5F",
                            "      cores",
                            "    - arm64: dts: ti: k3: Rename rproc reserved-mem nodes to 'memory@addr'",
                            "    - Revert \"arm64: dts: ti: k3-j721e-sk: Fix reversed C6x carveout",
                            "      locations\"",
                            "    - Revert \"arm64: dts: ti: k3-j721e-beagleboneai64: Fix reversed C6x",
                            "      carveout locations\"",
                            "    - arm64: dts: mediatek: mt8188: Change efuse fallback compatible to mt8186",
                            "    - arm64: dts: mediatek: mt8186-tentacruel: Fix touchscreen model",
                            "    - arm64: dts: ti: k3-pinctrl: Fix the bug in existing macros",
                            "    - arm64: dts: renesas: r9a09g047e57-smarc: Fix gpio key's pin control node",
                            "    - arm64: dts: mediatek: mt6331: Fix pmic, regulators, rtc, keys node names",
                            "    - mmc: core: Fix variable shadowing in mmc_route_rpmb_frames()",
                            "    - arm64: dts: mediatek: mt6795-xperia-m5: Fix mmc0 latch-ck value",
                            "    - arm64: dts: mediatek: mt7986a: Fix PCI-Express T-PHY node address",
                            "    - arm64: dts: mediatek: mt8395-kontron-i1200: Fix MT6360 regulator nodes",
                            "    - arm64: dts: mediatek: mt8516-pumpkin: Fix machine compatible",
                            "    - arm64: dts: allwinner: a527: cubie-a5e: Add LEDs",
                            "    - arm64: dts: allwinner: a527: cubie-a5e: Drop external 32.768 KHz crystal",
                            "    - arm64: dts: allwinner: t527: avaota-a1: hook up external 32k crystal",
                            "    - arm64: dts: allwinner: t527: orangepi-4a: hook up external 32k crystal",
                            "    - pwm: tiehrpwm: Don't drop runtime PM reference in .free()",
                            "    - pwm: tiehrpwm: Make code comment in .free() more useful",
                            "    - pwm: tiehrpwm: Fix various off-by-one errors in duty-cycle calculation",
                            "    - pwm: tiehrpwm: Fix corner case in clock divisor calculation",
                            "    - ACPICA: Apply ACPI_NONSTRING",
                            "    - ACPICA: Fix largest possible resource descriptor index",
                            "    - riscv, bpf: Sign extend struct ops return values properly",
                            "    - nvme-auth: update bi_directional flag",
                            "    - nvmet-fc: move lsop put work to nvmet_fc_ls_req_op",
                            "    - nvmet-fcloop: call done callback even when remote port is gone",
                            "    - nvme-tcp: send only permitted commands for secure concat",
                            "    - i3c: master: svc: Use manual response for IBI events",
                            "    - i3c: master: svc: Recycle unused IBI slot",
                            "    - block: update validation of atomic writes boundary for stacked devices",
                            "    - block: fix stacking of atomic writes when atomics are not supported",
                            "    - selftests: watchdog: skip ping loop if WDIOF_KEEPALIVEPING not supported",
                            "    - selftests/kselftest_harness: Add harness-selftest.expected to TEST_FILES",
                            "    - blk-throttle: fix throtl_data leak during disk release",
                            "    - bpf: Explicitly check accesses to bpf_sock_addr",
                            "    - mmc: select REGMAP_MMIO with MMC_LOONGSON2",
                            "    - selftests/futex: Fix futex_wait() for 32bit ARM",
                            "    - selftest/futex: Make the error check more precise for futex_numa_mpol",
                            "    - selftest/futex: Compile also with libnuma < 2.0.16",
                            "    - bpf: dont report verifier bug for missing bpf_scc_visit on speculative",
                            "      path",
                            "    - bpf, arm64: Call bpf_jit_binary_pack_finalize() in bpf_jit_free()",
                            "    - arm64: dts: apple: t600x: Add missing WiFi properties",
                            "    - arm64: dts: apple: t600x: Add bluetooth device nodes",
                            "    - arm64: dts: apple: Add ethernet0 alias for J375 template",
                            "    - selftests: always install UAPI headers to the correct directory",
                            "    - smp: Fix up and expand the smp_call_function_many() kerneldoc",
                            "    - mfd: max77705: max77705_charger: move active discharge setting to mfd",
                            "      parent",
                            "    - power: supply: max77705_charger: refactoring: rename charger to chg",
                            "    - power: supply: max77705_charger: use regfields for config registers",
                            "    - power: supply: max77705_charger: rework interrupts",
                            "    - tools/nolibc: make time_t robust if __kernel_old_time_t is missing in",
                            "      host headers",
                            "    - spi: fix return code when spi device has too many chipselects",
                            "    - clocksource/drivers/timer-tegra186: Avoid 64-bit divide operation",
                            "    - clocksource/drivers/tegra186: Avoid 64-bit division",
                            "    - bpf: Mark kfuncs as __noclone",
                            "    - once: fix race by moving DO_ONCE to separate section",
                            "    - hwmon: (mlxreg-fan) Separate methods of fan setting coming from",
                            "      different subsystems",
                            "    - tools/nolibc: add stdbool.h to nolibc includes",
                            "    - thermal/drivers/qcom: Make LMH select QCOM_SCM",
                            "    - thermal/drivers/qcom/lmh: Add missing IRQ includes",
                            "    - i2c: mediatek: fix potential incorrect use of I2C_MASTER_WRRD",
                            "    - i2c: spacemit: ensure bus release check runs when wait_bus_idle() fails",
                            "    - i2c: spacemit: remove stop function to avoid bus error",
                            "    - i2c: spacemit: disable SDA glitch fix to avoid restart delay",
                            "    - i2c: spacemit: check SDA instead of SCL after bus reset",
                            "    - i2c: spacemit: ensure SDA is released after bus reset",
                            "    - i2c: designware: Fix clock issue when PM is disabled",
                            "    - i2c: designware: Add disabling clocks when probe fails",
                            "    - libbpf: Fix error when st-prefix_ops and ops from differ btf",
                            "    - bpf: Enforce expected_attach_type for tailcall compatibility",
                            "    - i3c: fix big-endian FIFO transfers",
                            "    - mfd: max77705: Setup the core driver as an interrupt controller",
                            "    - drm/sched: Fix a race in DRM_GPU_SCHED_STAT_NO_HANG test",
                            "    - drm/panel-edp: Add disable to 100ms for MNB601LS1-4",
                            "    - drm/display: bridge-connector: correct CEC bridge pointers in",
                            "      drm_bridge_connector_init",
                            "    - drm/panel-edp: Add 50ms disable delay for four panels",
                            "    - drm/vmwgfx: fix missing assignment to ts",
                            "    - drm/amd/display: Reduce Stack Usage by moving 'audio_output' into",
                            "      'stream_res' v4",
                            "    - drm/panel: novatek-nt35560: Fix invalid return value",
                            "    - drm/amdgpu: fix link error for !PM_SLEEP",
                            "    - drm/amdgpu: Fix jpeg v4.0.3 poison irq call trace on sriov guest",
                            "    - drm/amdgpu: Fix vcn v4.0.3 poison irq call trace on sriov guest",
                            "    - PCI: endpoint: pci-ep-msi: Fix NULL vs IS_ERR() check in",
                            "      pci_epf_write_msi_msg()",
                            "    - PCI: xgene-msi: Return negative -EINVAL in xgene_msi_handler_setup()",
                            "    - drm/radeon/r600_cs: clean up of dead code in r600_cs",
                            "    - f2fs: fix condition in __allow_reserved_blocks()",
                            "    - f2fs: fix to avoid overflow while left shift operation",
                            "    - f2fs: fix to zero data after EOF for compressed file correctly",
                            "    - drm/bridge: it6505: select REGMAP_I2C",
                            "    - wifi: rtw88: Lock rtwdev->mutex before setting the LED",
                            "    - HID: steelseries: refactor probe() and remove()",
                            "    - media: zoran: Remove zoran_fh structure",
                            "    - phy: rockchip: naneng-combphy: Enable U3 OTG port for RK3568",
                            "    - drm/bridge: cdns-dsi: Fix the _atomic_check()",
                            "    - usb: host: max3421-hcd: Fix error pointer dereference in probe cleanup",
                            "    - usb: misc: qcom_eud: Access EUD_MODE_MANAGER2 through secure calls",
                            "    - PCI/pwrctrl: Fix double cleanup on devm_add_action_or_reset() failure",
                            "    - misc: pci_endpoint_test: Fix array underflow in",
                            "      pci_endpoint_test_ioctl()",
                            "    - serial: max310x: Add error checking in probe()",
                            "    - drm/amd/display: Remove redundant semicolons",
                            "    - drm/amd/display: Add NULL pointer checks in dc_stream cursor attribute",
                            "      functions",
                            "    - crypto: keembay - Add missing check after sg_nents_for_len()",
                            "    - hwrng: nomadik - add ARM_AMBA dependency",
                            "    - docs: iio: ad3552r: Fix malformed code-block directive",
                            "    - fwctl/mlx5: Fix memory alloc/free in mlx5ctl_fw_rpc()",
                            "    - scsi: pm80xx: Restore support for expanders",
                            "    - scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod",
                            "    - scsi: libsas: Add dev_parent_is_expander() helper",
                            "    - scsi: pm80xx: Use dev_parent_is_expander() helper",
                            "    - scsi: pm80xx: Add helper function to get the local phy id",
                            "    - scsi: pm80xx: Fix pm8001_abort_task() for chip_8006 when using an",
                            "      expander",
                            "    - mptcp: Fix up subflow's memcg when CONFIG_SOCK_CGROUP_DATA=n.",
                            "    - scsi: myrs: Fix dma_alloc_coherent() error check",
                            "    - f2fs: fix to clear unusable_cap for checkpoint=enable",
                            "    - f2fs: fix to avoid NULL pointer dereference in",
                            "      f2fs_check_quota_consistency()",
                            "    - f2fs: fix to allow removing qf_name",
                            "    - Revert \"UBUNTU: SAUCE: drm/dp: drm_edp_backlight_set_level: do not",
                            "      always send 3-byte commands\"",
                            "    - drm/dp: drm_edp_backlight_set_level: do not always send 3-byte commands",
                            "    - crypto: octeontx2 - Call strscpy() with correct size argument",
                            "    - drm: re-allow no-op changes on non-primary planes in async flips",
                            "    - media: rj54n1cb0c: Fix memleak in rj54n1_probe()",
                            "    - media: staging/ipu7: convert to use pci_alloc_irq_vectors() API",
                            "    - media: staging/ipu7: Don't set name for IPU7 PCI device",
                            "    - media: staging/ipu7: cleanup the MMU correctly in IPU7 driver release",
                            "    - media: i2c: vd55g1: Fix duster register address",
                            "    - drm/panel: Allow powering on panel follower after panel is enabled",
                            "    - HID: i2c-hid: Make elan touch controllers power on after panel is",
                            "      enabled",
                            "    - RDMA/mlx5: Better estimate max_qp_wr to reflect WQE count",
                            "    - RDMA/mlx5: Fix vport loopback forcing for MPV device",
                            "    - wifi: rtw88: Use led->brightness_set_blocking for PCI too",
                            "    - net: phy: introduce phy_id_compare_vendor() PHY ID helper",
                            "    - net: phy: as21xxx: better handle PHY HW reset on soft-reboot",
                            "    - PCI: rcar-host: Pass proper IRQ domain to generic_handle_domain_irq()",
                            "    - fuse: remove unneeded offset assignment when filling write pages",
                            "    - PCI: qcom: Restrict port parsing only to PCIe bridge child nodes",
                            "    - cdx: don't select CONFIG_GENERIC_MSI_IRQ",
                            "    - PCI/ACPI: Fix pci_acpi_preserve_config() memory leak",
                            "    - HID: i2c-hid: Fix test in i2c_hid_core_register_panel_follower()",
                            "    - ALSA: lx_core: use int type to store negative error codes",
                            "    - media: st-delta: avoid excessive stack usage",
                            "    - drm/amdgpu/vcn: Add regdump helper functions",
                            "    - drm/amdgpu/vcn: Hold pg_lock before vcn power off",
                            "    - drm/amdgpu: Check vcn state before profile switch",
                            "    - accel/amdxdna: Use int instead of u32 to store error codes",
                            "    - efi: Explain OVMF acronym in OVMF_DEBUG_LOG help text",
                            "    - net: dst: introduce dst->dev_rcu",
                            "    - ipv6: mcast: Add ip6_mc_find_idev() helper",
                            "    - ipv6: start using dst_dev_rcu()",
                            "    - ipv6: use RCU in ip6_xmit()",
                            "    - ipv6: use RCU in ip6_output()",
                            "    - net: use dst_dev_rcu() in sk_setup_caps()",
                            "    - tcp_metrics: use dst_dev_net_rcu()",
                            "    - ipv4: start using dst_dev_rcu()",
                            "    - crypto: hisilicon/zip - remove unnecessary validation for high-",
                            "      performance mode configurations",
                            "    - crypto: hisilicon - re-enable address prefetch after device resuming",
                            "    - crypto: hisilicon - check the sva module status while enabling or",
                            "      disabling address prefetch",
                            "    - crypto: hisilicon/qm - check whether the input function and PF are on",
                            "      the same device",
                            "    - crypto: hisilicon/qm - request reserved interrupt for virtual function",
                            "    - inet: ping: check sock_net() in ping_get_port() and ping_lookup()",
                            "    - dmaengine: Fix dma_async_tx_descriptor->tx_submit documentation",
                            "    - coresight: trbe: Add ISB after TRBLIMITR write",
                            "    - coresight: Fix missing include for FIELD_GET",
                            "    - coresight: Only register perf symlink for sinks with alloc_buffer",
                            "    - drm/amdgpu: Power up UVD 3 for FW validation (v2)",
                            "    - drm/amd/pm: Disable ULV even if unsupported (v3)",
                            "    - drm/amd/pm: Fix si_upload_smc_data (v3)",
                            "    - drm/amd/pm: Adjust si_upload_smc_data register programming (v3)",
                            "    - drm/amd/pm: Treat zero vblank time as too short in si_dpm (v3)",
                            "    - drm/amd/pm: Disable MCLK switching with non-DC at 120 Hz+ (v2)",
                            "    - drm/amd/pm: Disable SCLK switching on Oland with high pixel clocks (v3)",
                            "    - wifi: mac80211: Make CONNECTION_MONITOR optional for MLO sta",
                            "    - wifi: mwifiex: send world regulatory domain to driver",
                            "    - wifi: brcmfmac: fix 43752 SDIO FWVID incorrectly labelled as Cypress",
                            "      (CYW)",
                            "    - drm/msm: Do not validate SSPP when it is not ready",
                            "    - PCI: tegra: Fix devm_kcalloc() argument order for port->phys allocation",
                            "    - wifi: mac80211: consider links for validating SCAN_FLAG_AP in scan",
                            "      request during MLO",
                            "    - PCI: qcom: Add equalization settings for 8.0 GT/s and 32.0 GT/s",
                            "    - tcp: fix __tcp_close() to only send RST when required",
                            "    - fanotify: Validate the return value of mnt_ns_from_dentry() before",
                            "      dereferencing",
                            "    - drm/amdkfd: Fix error code sign for EINVAL in svm_ioctl()",
                            "    - usb: phy: twl6030: Fix incorrect type for ret",
                            "    - usb: gadget: configfs: Correctly set use_os_string at bind",
                            "    - tty: n_gsm: Don't block input queue by waiting MSC",
                            "    - misc: genwqe: Fix incorrect cmd field being reported in error",
                            "    - pps: fix warning in pps_register_cdev when register device fail",
                            "    - drm/msm: Fix obj leak in VM_BIND error path",
                            "    - drm/msm: Fix missing VM_BIND offset/range validation",
                            "    - wifi: iwlwifi: Remove redundant header files",
                            "    - drm/msm/mdp4: stop supporting no-IOMMU configuration",
                            "    - drm/msm: stop supporting no-IOMMU configuration",
                            "    - idpf: fix Rx descriptor ready check barrier in splitq",
                            "    - ASoC: Intel: bytcht_es8316: Fix invalid quirk input mapping",
                            "    - ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping",
                            "    - ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping",
                            "    - ipv6: snmp: do not use SNMP_MIB_SENTINEL anymore",
                            "    - ipv6: snmp: do not track per idev ICMP6_MIB_RATELIMITHOST",
                            "    - drm/msm: Fix bootup splat with separate_gpu_drm modparam",
                            "    - drm/msm/dpu: fix incorrect type for ret",
                            "    - wifi: mac80211: fix reporting of all valid links in sta_set_sinfo()",
                            "    - fs: ntfs3: Fix integer overflow in run_unpack()",
                            "    - fs/ntfs3: reject index allocation if $BITMAP is empty but blocks exist",
                            "    - iio: consumers: Fix handling of negative channel scale in",
                            "      iio_convert_raw_to_processed()",
                            "    - iio: consumers: Fix offset handling in iio_convert_raw_to_processed()",
                            "    - mm/slub: Fix cmp_loc_by_count() to return 0 when counts are equal",
                            "    - tools: ynl: fix undefined variable name",
                            "    - RDMA/mlx5: Fix page size bitmap calculation for KSM mode",
                            "    - netfilter: ipset: Remove unused htable_bits in macro ahash_region",
                            "    - ipvs: Use READ_ONCE/WRITE_ONCE for ipvs->enable",
                            "    - HID: steelseries: Fix STEELSERIES_SRWS1 handling in steelseries_remove()",
                            "    - watchdog: intel_oc_wdt: Do not try to write into const memory",
                            "    - watchdog: mpc8xxx_wdt: Reload the watchdog timer when enabling the",
                            "      watchdog",
                            "    - PCI: endpoint: pci-epf-test: Fix doorbell test support",
                            "    - drivers/base/node: handle error properly in register_one_node()",
                            "    - RDMA/cm: Rate limit destroy CM ID timeout error message",
                            "    - wifi: mt76: mt7996: Fix mt7996_mcu_sta_ba wcid configuration",
                            "    - wifi: mt76: mt7996: Fix mt7996_mcu_bss_mld_tlv routine",
                            "    - wifi: mt76: fix potential memory leak in mt76_wmac_probe()",
                            "    - wifi: mt76: mt7996: Use proper link_id in link_sta_rc_update callback",
                            "    - wifi: mt76: mt7996: Check phy before init msta_link in",
                            "      mt7996_mac_sta_add_links()",
                            "    - wifi: mt76: mt7996: Fix tx-queues initialization for second phy on",
                            "      mt7996",
                            "    - wifi: mt76: mt7996: Fix RX packets configuration for primary WED device",
                            "    - wifi: mt76: mt7996: Convert mt7996_wed_rro_addr to LE",
                            "    - wifi: mt76: mt7915: fix mt7981 pre-calibration",
                            "    - wifi: mt76: mt7996: remove redundant per-phy mac80211 calls during",
                            "      restart",
                            "    - ASoC: Intel: hda-sdw-bpt: set persistent_buffer false",
                            "    - srcu/tiny: Remove preempt_disable/enable() in srcu_gp_start_if_needed()",
                            "    - drm/amdgpu: Fix allocating extra dwords for rings (v2)",
                            "    - f2fs: fix to update map->m_next_extent correctly in f2fs_map_blocks()",
                            "    - f2fs: fix to truncate first page in error path of f2fs_truncate()",
                            "    - f2fs: fix to avoid migrating empty section",
                            "    - f2fs: fix to mitigate overhead of f2fs_zero_post_eof_page()",
                            "    - RISC-V: KVM: Write hgatp register with valid mode bits",
                            "    - ALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on",
                            "      PREEMPT_RT",
                            "    - ACPI: NFIT: Fix incorrect ndr_desc being reportedin dev_err message",
                            "    - scsi: qla2xxx: edif: Fix incorrect sign of error code",
                            "    - scsi: qla2xxx: Fix incorrect sign of error code in START_SP_W_RETRIES()",
                            "    - scsi: qla2xxx: Fix incorrect sign of error code in qla_nvme_xmt_ls_rsp()",
                            "    - HID: hidraw: tighten ioctl command parsing",
                            "    - f2fs: fix zero-sized extent for precache extents",
                            "    - smc: Fix use-after-free in __pnet_find_base_ndev().",
                            "    - smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().",
                            "    - smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().",
                            "    - smc: Use __sk_dst_get() and dst_dev_rcu() in smc_vlan_by_tcpsk().",
                            "    - tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().",
                            "    - mptcp: Call dst_release() in mptcp_active_enable().",
                            "    - mptcp: Use __sk_dst_get() and dst_dev_rcu() in mptcp_active_enable().",
                            "    - Revert \"usb: xhci: Avoid Stop Endpoint retry loop if the endpoint seems",
                            "      Running\"",
                            "    - RDMA/core: Resolve MAC of next-hop device without ARP support",
                            "    - IB/sa: Fix sa_local_svc_timeout_ms read race",
                            "    - Documentation: trace: historgram-design: Separate sched_waking histogram",
                            "      section heading and the following diagram",
                            "    - ASoC: SOF: ipc4-pcm: Fix incorrect comparison with number of tdm_slots",
                            "    - wifi: ath12k: initialize eirp_power before use",
                            "    - wifi: ath12k: fix overflow warning on num_pwr_levels",
                            "    - wifi: ath12k: fix signal in radiotap for WCN7850",
                            "    - wifi: ath12k: fix HAL_PHYRX_COMMON_USER_INFO handling in monitor mode",
                            "    - wifi: ath12k: fix the fetching of combined rssi",
                            "    - wifi: ath12k: Add fallback for invalid channel number in PHY metadata",
                            "    - wifi: ath12k: fix wrong logging ID used for CE",
                            "    - wifi: ath10k: avoid unnecessary wait for service ready message",
                            "    - iommu/vt-d: debugfs: Fix legacy mode page table dump logic",
                            "    - wifi: mac80211: fix Rx packet handling when pubsta information is not",
                            "      available",
                            "    - ASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback",
                            "    - sparc: fix accurate exception reporting in copy_{from_to}_user for",
                            "      UltraSPARC",
                            "    - sparc: fix accurate exception reporting in copy_{from_to}_user for",
                            "      UltraSPARC III",
                            "    - sparc: fix accurate exception reporting in copy_{from_to}_user for",
                            "      Niagara",
                            "    - sparc: fix accurate exception reporting in copy_to_user for Niagara 4",
                            "    - sparc: fix accurate exception reporting in copy_{from,to}_user for M7",
                            "    - vfio/pds: replace bitmap_free with vfree",
                            "    - crypto: comp - Use same definition of context alloc and free ops",
                            "    - crypto: hisilicon/qm - set NULL to qm->debug.qm_diff_regs",
                            "    - wifi: ath12k: Fix peer lookup in ath12k_dp_mon_rx_deliver_msdu()",
                            "    - rpmsg: qcom_smd: Fix fallback to qcom,ipc parse",
                            "    - remoteproc: qcom_q6v5_mss: support loading MBN file on msm8974",
                            "    - RDMA/rxe: Fix race in do_task() when draining",
                            "    - selftests/mm: fix va_high_addr_switch.sh failure on x86_64",
                            "    - wifi: rtw89: fix leak in rtw89_core_send_nullfunc()",
                            "    - wifi: rtw89: avoid circular locking dependency in ser_state_run()",
                            "    - PCI: tegra194: Fix duplicate PLL disable in",
                            "      pex_ep_event_pex_rst_assert()",
                            "    - remoteproc: qcom: q6v5: Avoid disabling handover IRQ twice",
                            "    - remoteproc: qcom: pas: Shutdown lite ADSP DTB on X1E",
                            "    - wifi: ath12k: Refactor RX TID deletion handling into helper function",
                            "    - wifi: ath12k: Fix flush cache failure during RX queue update",
                            "    - wifi: cfg80211: fix width unit in cfg80211_radio_chandef_valid()",
                            "    - dm vdo: return error on corrupted metadata in start_restoring_volume",
                            "      functions",
                            "    - coresight: fix indentation error in cscfg_remove_owned_csdev_configs()",
                            "    - coresight-etm4x: Conditionally access register TRCEXTINSELR",
                            "    - coresight: tmc: Support atclk",
                            "    - coresight: catu: Support atclk",
                            "    - coresight: etm4x: Support atclk",
                            "    - coresight: Appropriately disable programming clocks",
                            "    - coresight: Appropriately disable trace bus clocks",
                            "    - coresight: Avoid enable programming clock duplicately",
                            "    - coresight: trbe: Return NULL pointer for allocation failures",
                            "    - coresight: tpda: fix the logic to setup the element size",
                            "    - coresight: Fix incorrect handling for return value of devm_kzalloc",
                            "    - NFSv4.1: fix backchannel max_resp_sz verification check",
                            "    - net: ethtool: tsconfig: set command must provide a reply",
                            "    - netfilter: nfnetlink: reset nlh pointer during batch replay",
                            "    - netfilter: nf_conntrack: do not skip entries in /proc/net/nf_conntrack",
                            "    - scsi: ufs: core: Fix data race in CPU latency PM QoS request handling",
                            "    - scsi: mpt3sas: Fix crash in transport port remove by using ioc_info()",
                            "    - usb: vhci-hcd: Prevent suspending virtually attached devices",
                            "    - PCI: rcar-gen4: Add missing 1ms delay after PWR reset assertion",
                            "    - PCI: rcar-gen4: Assure reset occurs before DBI access",
                            "    - PCI: rcar-gen4: Fix inverted break condition in PHY initialization",
                            "    - ASoC: qcom: sc8280xp: use sa8775p/ subdir for QCS9100 / QCS9075",
                            "    - iommu/vt-d: Disallow dirty tracking if incoherent page walk",
                            "    - iommu/selftest: prevent use of uninitialized variable",
                            "    - RDMA/siw: Always report immediate post SQ errors",
                            "    - net: enetc: Fix probing error message typo for the ENETCv4 PF driver",
                            "    - net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast",
                            "    - ptp: Add a upper bound on max_vclocks",
                            "    - vhost: vringh: Fix copy_to_iter return value check",
                            "    - net: macb: remove illusion about TBQPH/RBQPH being per-queue",
                            "    - net: macb: move ring size computation to functions",
                            "    - net: macb: single dma_alloc_coherent() for DMA descriptors",
                            "    - Bluetooth: btintel_pcie: Refactor Device Coredump",
                            "    - Bluetooth: MGMT: Fix not exposing debug UUID on",
                            "      MGMT_OP_READ_EXP_FEATURES_INFO",
                            "    - Bluetooth: ISO: Fix possible UAF on iso_conn_free",
                            "    - Bluetooth: ISO: free rx_skb if not consumed",
                            "    - Bluetooth: ISO: don't leak skb in ISO_CONT RX",
                            "    - Bluetooth: hci_sync: Fix using random address for BIG/PA advertisements",
                            "    - KEYS: X.509: Fix Basic Constraints CA flag parsing",
                            "    - hwrng: ks-sa - fix division by zero in ks_sa_rng_init",
                            "    - cramfs: fix incorrect physical page address calculation",
                            "    - ocfs2: fix double free in user_cluster_connect()",
                            "    - drivers/base/node: fix double free in register_one_node()",
                            "    - f2fs: fix UAF issue in f2fs_merge_page_bio()",
                            "    - mtd: rawnand: atmel: Fix error handling path in",
                            "      atmel_nand_controller_add_nands",
                            "    - PCI: j721e: Fix incorrect error message in probe()",
                            "    - idpf: fix mismatched free function for dma_alloc_coherent",
                            "    - tcp: use skb->len instead of skb->truesize in tcp_can_ingest()",
                            "    - nfp: fix RSS hash key size when RSS is not supported",
                            "    - net: ena: return 0 in ena_get_rxfh_key_size() when RSS hash key is not",
                            "      configurable",
                            "    - net: dlink: handle copy_thresh allocation failure",
                            "    - net/mlx5: Stop polling for command response if interface goes down",
                            "    - net/mlx5: pagealloc: Fix reclaim race during command interface teardown",
                            "    - net/mlx5: fw reset, add reset timeout work",
                            "    - smb: client: fix crypto buffers in non-linear memory",
                            "    - bonding: fix xfrm offload feature setup on active-backup mode",
                            "    - net: enetc: initialize SW PIR and CIR based HW PIR and CIR values",
                            "    - iommufd: Register iommufd mock devices with fwspec",
                            "    - Revert \"net/mlx5e: Update and set Xon/Xoff upon MTU set\"",
                            "    - NFSD: filecache: add STATX_DIOALIGN and STATX_DIO_READ_ALIGN support",
                            "    - nfs/localio: avoid issuing misaligned IO using O_DIRECT",
                            "    - octeontx2-vf: fix bitmap leak",
                            "    - octeontx2-pf: fix bitmap leak",
                            "    - vhost: vringh: Modify the return value check",
                            "    - selftests/bpf: Fix typos and grammar in test sources",
                            "    - selftests/bpf: move get_ksyms and get_addrs to trace_helpers.c",
                            "    - selftests/bpf: Fix realloc size in bpf_get_addrs",
                            "    - bpf: Skip scalar adjustment for BPF_NEG if dst is a pointer",
                            "    - bpf: Reject negative offsets for ALU ops",
                            "    - tpm: Disable TPM2_TCG_HMAC by default",
                            "    - ALSA: hda/hdmi: Add pin fix for HP ProDesk model",
                            "    - ALSA: hda/realtek: Add quirk for HP Spectre 14t-ea100",
                            "    - Squashfs: fix uninit-value in squashfs_get_parent",
                            "    - uio_hv_generic: Let userspace take care of interrupt mask",
                            "    - hisi_acc_vfio_pci: Fix reference leak in hisi_acc_vfio_debug_init",
                            "    - io_uring/waitid: always prune wait queue entry in io_waitid_wait()",
                            "    - io_uring/zcrx: fix overshooting recv limit",
                            "    - ASoC: wcd934x: fix error handling in wcd934x_codec_parse_data()",
                            "    - ASoC: SOF: ipc3-topology: Fix multi-core and static pipelines tear down",
                            "    - ASoC: codecs: wcd937x: set the comp soundwire port correctly",
                            "    - ASoC: codecs: wcd937x: make stub functions inline",
                            "    - ASoC: SOF: ipc4-pcm: fix delay calculation when DSP resamples",
                            "    - ASoC: SOF: ipc4-pcm: fix start offset calculation for chain DMA",
                            "    - fs: udf: fix OOB read in lengthAllocDescs handling",
                            "    - net: nfc: nci: Add parameter validation for packet data",
                            "    - mfd: rz-mtu3: Fix MTU5 NFCR register offset",
                            "    - mfd: intel_soc_pmic_chtdc_ti: Set use_single_read regmap_config flag",
                            "    - mfd: vexpress-sysreg: Check the return value of devm_gpiochip_add_data()",
                            "    - tracing: Fix lock imbalance in s_start() memory allocation failure path",
                            "    - tracing: Fix race condition in kprobe initialization causing NULL",
                            "      pointer dereference",
                            "    - tracing: Fix wakeup tracers on failure of acquiring calltime",
                            "    - tracing: Fix irqoff tracers on failure of acquiring calltime",
                            "    - tracing: Have trace_marker use per-cpu data to read user space",
                            "    - tracing: Fix tracing_mark_raw_write() to use buf and not ubuf",
                            "    - tracing: Stop fortify-string from warning in tracing_mark_raw_write()",
                            "    - dm: fix queue start/stop imbalance under suspend/load/resume races",
                            "    - dm: fix NULL pointer dereference in __dm_suspend()",
                            "    - LoongArch: Automatically disable kaslr if boot from kexec_file",
                            "    - pwm: loongson: Fix LOONGSON_PWM_FREQ_DEFAULT",
                            "    - LoongArch: BPF: Sign-extend struct ops return values properly",
                            "    - LoongArch: BPF: No support of struct argument in trampoline programs",
                            "    - LoongArch: BPF: Don't align trampoline size",
                            "    - LoongArch: BPF: Make trampoline size stable",
                            "    - LoongArch: BPF: Make error handling robust in",
                            "      arch_prepare_bpf_trampoline()",
                            "    - LoongArch: BPF: Remove duplicated bpf_flush_icache()",
                            "    - LoongArch: BPF: No text_poke() for kernel text",
                            "    - LoongArch: BPF: Remove duplicated flags check",
                            "    - LoongArch: BPF: Fix uninitialized symbol 'retval_off'",
                            "    - mm/ksm: fix flag-dropping behavior in ksm_madvise",
                            "    - ksmbd: Fix race condition in RPC handle list access",
                            "    - ksmbd: fix error code overwriting in smb2_get_info_filesystem()",
                            "    - ksmbd: add max ip connections parameter",
                            "    - ext4: fix potential null deref in ext4_mb_init()",
                            "    - ext4: fix checks for orphan inodes",
                            "    - KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn't valid",
                            "    - fbdev: simplefb: Fix use after free in simplefb_detach_genpds()",
                            "    - mm: hugetlb: avoid soft lockup when mprotect to large memory area",
                            "    - selftests/mm: skip soft-dirty tests when CONFIG_MEM_SOFT_DIRTY is",
                            "      disabled",
                            "    - nvdimm: ndtest: Return -ENOMEM if devm_kcalloc() fails in ndtest_probe()",
                            "    - misc: fastrpc: Save actual DMA size in fastrpc_map structure",
                            "    - misc: fastrpc: Fix fastrpc_map_lookup operation",
                            "    - misc: fastrpc: fix possible map leak in fastrpc_put_args",
                            "    - misc: fastrpc: Skip reference for DMA handles",
                            "    - Input: atmel_mxt_ts - allow reset GPIO to sleep",
                            "    - Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info",
                            "      leak",
                            "    - sunrpc: fix null pointer dereference on zero-length checksum",
                            "    - PCI/AER: Avoid NULL pointer dereference in aer_ratelimit()",
                            "    - remoteproc: pru: Fix potential NULL pointer dereference in",
                            "      pru_rproc_set_ctable()",
                            "    - PCI: endpoint: pci-epf-test: Add NULL check for DMA channels before",
                            "      release",
                            "    - thunderbolt: Fix use-after-free in tb_dp_dprx_work",
                            "    - tee: fix register_shm_helper()",
                            "    - pinctrl: check the return value of pinmux_ops::get_function_name()",
                            "    - bus: fsl-mc: Check return value of platform_get_resource()",
                            "    - net/9p: Fix buffer overflow in USB transport layer",
                            "    - net: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock",
                            "    - usb: typec: tipd: Clear interrupts first",
                            "    - arm64: dts: qcom: qcm2290: Disable USB SS bus instances in park mode",
                            "    - usb: cdns3: cdnsp-pci: remove redundant pci_disable_device() call",
                            "    - scsi: ufs: core: Fix PM QoS mutex initialization",
                            "    - drm/amdgpu/vcn: Fix double-free of vcn dump buffer",
                            "    - Linux 6.17.3",
                            "  * CVE-2025-40019",
                            "    - crypto: essiv - Check ssize for decryption and in-place encryption",
                            "  * CVE-2025-40214",
                            "    - af_unix: Initialise scc_index in unix_add_edge().",
                            "  * Miscellaneous Ubuntu changes",
                            "    - [SAUCE] Fix selftest/net/rtnetlink.sh for Big Endian",
                            "",
                            "  [ Ubuntu-riscv: 6.17.0-12.12.1 ]",
                            "",
                            "  * questing/linux-riscv: 6.17.0-12.12.1 -proposed tracker (LP: #2138113)",
                            "  [ Ubuntu: 6.17.0-12.12 ]",
                            "  * questing/linux: 6.17.0-12.12 -proposed tracker (LP: #2138115)",
                            "  * CVE-2025-40019",
                            "    - crypto: essiv - Check ssize for decryption and in-place encryption",
                            "  * CVE-2025-40214",
                            "    - af_unix: Initialise scc_index in unix_add_edge().",
                            ""
                        ],
                        "package": "linux-riscv-6.17",
                        "version": "6.17.0-14.14.1~24.04.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2137844,
                            2013232,
                            2074082,
                            2137845,
                            1786013,
                            2137849,
                            1786013,
                            2136820,
                            2137698,
                            2129812,
                            2125022,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136813,
                            2132317,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2132095,
                            2131046,
                            2115860,
                            2128792,
                            2121852,
                            2131259,
                            2131259,
                            2131702,
                            2129610,
                            2138113,
                            2138115
                        ],
                        "author": "Emil Renner Berthing <emil.renner.berthing@canonical.com>",
                        "date": "Tue, 27 Jan 2026 20:04:21 +0100"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * noble/linux-riscv-6.17: 6.17.0-9.9.1~24.04.1 -proposed tracker (LP: #2133507)",
                            "",
                            "  * Enable Nezha board (LP: #1975592)",
                            "    - SAUCE: mmc: pwrseq_simple: always fall back to GPIO based reset control",
                            "    - SAUCE: nvmem: core: update cell->bytes after shifting bits",
                            "    - SAUCE: dt-bindings: pwm: Add binding for Allwinner D1/T113-S3/R329 PWM",
                            "      controller",
                            "    - SAUCE: pwm: Add Allwinner's D1/T113-S3/R329 SoCs PWM support",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add pwm node",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add PWM pins",
                            "    - SAUCE: mmc: sunxi-mmc: Correct the maximum segment size",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add misc nodes",
                            "    - SAUCE: riscv: dts: allwinner: Keep aldo regulator on",
                            "    - SAUCE: riscv: dts: allwinner: Add button on the Nezha board",
                            "    - SAUCE: riscv: dts: allwinner: Add button on the Lichee RV Dock",
                            "    - SAUCE: regulator: dt-bindings: Add Allwinner D1 LDOs",
                            "    - SAUCE: regulator: sun20i: Add support for Allwinner D1 analog LDOs",
                            "    - SAUCE: regulator: sun20i: Use device_node_to_regmap()",
                            "    - SAUCE: dt-bindings: thermal: sun8i: Add compatible for D1",
                            "    - SAUCE: thermal: sun8i: Set the event type for new samples",
                            "    - SAUCE: thermal: sun8i: Ensure vref is powered",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add thermal sensor and zone",
                            "    - SAUCE: riscv: dts: allwinner: d1: Hook up PWM-controlled CPU voltage",
                            "      regulators",
                            "    - SAUCE: drm/sun4i: dsi: Allow panel attach before card registration",
                            "    - SAUCE: drm/sun4i: mixer: Remove unused CMA headers",
                            "    - SAUCE: drm/sun4i: tcon: Always protect the LCD dotclock rate",
                            "    - SAUCE: drm/sun4i: tcon_top: Register reset, clock gates in probe",
                            "    - SAUCE: riscv: dts: allwinner: lichee-rv-86-panel-480p: Add panel",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add HDMI pipeline",
                            "    - SAUCE: riscv: dts: allwinner: d1: Enable HDMI on supported boards",
                            "    - SAUCE: dt-bindings: display: sun4i-tcon: Add external LVDS PHY",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add LVDS0 PHY",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add LED controller node",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add RGB LEDs to boards",
                            "    - SAUCE: ASoC: sun20i-codec: New driver for D1 internal codec",
                            "    - SAUCE: [WIP] ASoC: sun20i-codec: What is this ramp thing?",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add sound cards to boards",
                            "    - SAUCE: dt-bindings: display: sun8i-a83t-dw-hdmi: Remove #phy-cells",
                            "    - SAUCE: dt-bindings: display: Add D1 HDMI compatibles",
                            "    - SAUCE: drm/sun4i: Add support for D1 HDMI",
                            "    - SAUCE: drm/sun4i: sun8i-hdmi-phy: Add support for D1 PHY",
                            "    - SAUCE: [HACK] drm/sun4i: Copy in BSP code for D1 HDMI PHY",
                            "    - SAUCE: riscv: dts: allwinner: Add Nezha and Lichee RV SPI nodes",
                            "    - SAUCE: dt-bindings: display: Add Sitronix ST7701s panel binding",
                            "    - SAUCE: drm/panel: Add driver for ST7701s DPI LCD panel",
                            "    - [Config] riscv: updateconfigs for D1 support",
                            "",
                            "  * Enable StarFive VisionFive 2 board (LP: #2013232)",
                            "    - SAUCE: PCI: starfive: Offload the NVMe timeout workaround to host",
                            "      drivers.",
                            "    - SAUCE: pwm: opencores: Add PWM driver support",
                            "    - riscv: dts: starfive: jh7110-common: drop no-sdio property from mmc1",
                            "    - dt-bindings: memory-controllers: add StarFive JH7110 SoC DMC",
                            "    - riscv: dts: starfive: jh7110: add DMC memory controller",
                            "    - riscv: dts: starfive: jh7110: bootph-pre-ram hinting needed by boot",
                            "      loader",
                            "    - riscv: dts: starfive: jh7110-common: drop no-mmc property from mmc1",
                            "    - riscv: dts: starfive: jh7110-common: drop mmc post-power-on-delay-ms",
                            "    - riscv: dts: starfive: add common board dtsi for Milk-V Mars CM variants",
                            "    - dt-bindings: riscv: starfive: add milkv,marscm-emmc",
                            "    - riscv: dts: starfive: add Milk-V Mars CM system-on-module",
                            "    - dt-bindings: riscv: starfive: add milkv,marscm-lite",
                            "    - riscv: dts: starfive: add Milk-V Mars CM Lite system-on-module",
                            "    - SAUCE: dts: starfive: jh7110-common: split out mmc0 reset pins from",
                            "      common into boards",
                            "    - SAUCE: dt-bindings: riscv: Add StarFive JH7110S SoC and VisionFive 2",
                            "      Lite board",
                            "    - SAUCE: riscv: dts: starfive: jh7110-common: Move out some nodes to the",
                            "      board dts",
                            "    - SAUCE: riscv: dts: starfive: Add common board dtsi for VisionFive 2 Lite",
                            "      variants",
                            "    - SAUCE: riscv: dts: starfive: Add VisionFive 2 Lite board device tree",
                            "    - SAUCE: riscv: dts: starfive: Add VisionFive 2 Lite eMMC board device",
                            "      tree",
                            "    - SAUCE: dt-bindings: riscv: starfive: add xunlong,orangepi-rv",
                            "    - SAUCE: riscv: dts: starfive: add Orange Pi RV",
                            "    - [Config] riscv: updateconfigs for JH7110 support",
                            "",
                            "  * Miscellaneous Ubuntu changes",
                            "    - SAUCE: tools/lib/perf: Fix -Werror=alloc-size-larger-than in cpumap.c",
                            "    - [Config] Enable pre-RVA23 hardware",
                            ""
                        ],
                        "package": "linux-riscv-6.17",
                        "version": "6.17.0-9.9.1~24.04.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2133507,
                            1975592,
                            2013232
                        ],
                        "author": "Emil Renner Berthing <emil.renner.berthing@canonical.com>",
                        "date": "Thu, 18 Dec 2025 14:49:05 +0100"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Create Noble backport",
                            "",
                            "  [ Ubuntu: 6.17.0-9.9.1 ]",
                            ""
                        ],
                        "package": "linux-riscv-6.17",
                        "version": "6.17.0-9.9.1~24.04.0",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [],
                        "author": "Emil Renner Berthing <emil.renner.berthing@canonical.com>",
                        "date": "Thu, 18 Dec 2025 14:06:20 +0100"
                    }
                ],
                "notes": "For a newly added package only the three most recent changelog entries are shown.",
                "is_version_downgrade": false
            },
            {
                "name": "linux-riscv-6.17-tools-6.17.0-14",
                "from_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "to_version": {
                    "source_package_name": "linux-riscv-6.17",
                    "source_package_version": "6.17.0-14.14.1~24.04.1",
                    "version": "6.17.0-14.14.1~24.04.1"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-40256",
                        "url": "https://ubuntu.com/security/CVE-2025-40256",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68204",
                        "url": "https://ubuntu.com/security/CVE-2025-68204",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68203",
                        "url": "https://ubuntu.com/security/CVE-2025-68203",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40267",
                        "url": "https://ubuntu.com/security/CVE-2025-40267",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68198",
                        "url": "https://ubuntu.com/security/CVE-2025-68198",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68199",
                        "url": "https://ubuntu.com/security/CVE-2025-68199",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40268",
                        "url": "https://ubuntu.com/security/CVE-2025-40268",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40269",
                        "url": "https://ubuntu.com/security/CVE-2025-40269",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68205",
                        "url": "https://ubuntu.com/security/CVE-2025-68205",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40270",
                        "url": "https://ubuntu.com/security/CVE-2025-40270",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40271",
                        "url": "https://ubuntu.com/security/CVE-2025-40271",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40272",
                        "url": "https://ubuntu.com/security/CVE-2025-40272",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68245",
                        "url": "https://ubuntu.com/security/CVE-2025-68245",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68240",
                        "url": "https://ubuntu.com/security/CVE-2025-68240",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68241",
                        "url": "https://ubuntu.com/security/CVE-2025-68241",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68211",
                        "url": "https://ubuntu.com/security/CVE-2025-68211",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68246",
                        "url": "https://ubuntu.com/security/CVE-2025-68246",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40273",
                        "url": "https://ubuntu.com/security/CVE-2025-40273",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40212",
                        "url": "https://ubuntu.com/security/CVE-2025-40212",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40274",
                        "url": "https://ubuntu.com/security/CVE-2025-40274",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68202",
                        "url": "https://ubuntu.com/security/CVE-2025-68202",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68239",
                        "url": "https://ubuntu.com/security/CVE-2025-68239",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68247",
                        "url": "https://ubuntu.com/security/CVE-2025-68247",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68208",
                        "url": "https://ubuntu.com/security/CVE-2025-68208",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68200",
                        "url": "https://ubuntu.com/security/CVE-2025-68200",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40275",
                        "url": "https://ubuntu.com/security/CVE-2025-40275",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68242",
                        "url": "https://ubuntu.com/security/CVE-2025-68242",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68243",
                        "url": "https://ubuntu.com/security/CVE-2025-68243",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40276",
                        "url": "https://ubuntu.com/security/CVE-2025-40276",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40277",
                        "url": "https://ubuntu.com/security/CVE-2025-40277",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68206",
                        "url": "https://ubuntu.com/security/CVE-2025-68206",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68209",
                        "url": "https://ubuntu.com/security/CVE-2025-68209",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40278",
                        "url": "https://ubuntu.com/security/CVE-2025-40278",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40279",
                        "url": "https://ubuntu.com/security/CVE-2025-40279",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40280",
                        "url": "https://ubuntu.com/security/CVE-2025-40280",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40281",
                        "url": "https://ubuntu.com/security/CVE-2025-40281",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40282",
                        "url": "https://ubuntu.com/security/CVE-2025-40282",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40283",
                        "url": "https://ubuntu.com/security/CVE-2025-40283",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40284",
                        "url": "https://ubuntu.com/security/CVE-2025-40284",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68210",
                        "url": "https://ubuntu.com/security/CVE-2025-68210",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40285",
                        "url": "https://ubuntu.com/security/CVE-2025-40285",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40286",
                        "url": "https://ubuntu.com/security/CVE-2025-40286",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40287",
                        "url": "https://ubuntu.com/security/CVE-2025-40287",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40288",
                        "url": "https://ubuntu.com/security/CVE-2025-40288",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40289",
                        "url": "https://ubuntu.com/security/CVE-2025-40289",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68201",
                        "url": "https://ubuntu.com/security/CVE-2025-68201",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68207",
                        "url": "https://ubuntu.com/security/CVE-2025-68207",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68244",
                        "url": "https://ubuntu.com/security/CVE-2025-68244",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68316",
                        "url": "https://ubuntu.com/security/CVE-2025-68316",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40292",
                        "url": "https://ubuntu.com/security/CVE-2025-40292",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68180",
                        "url": "https://ubuntu.com/security/CVE-2025-68180",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40327",
                        "url": "https://ubuntu.com/security/CVE-2025-40327",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40328",
                        "url": "https://ubuntu.com/security/CVE-2025-40328",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40291",
                        "url": "https://ubuntu.com/security/CVE-2025-40291",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68322",
                        "url": "https://ubuntu.com/security/CVE-2025-68322",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40293",
                        "url": "https://ubuntu.com/security/CVE-2025-40293",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40294",
                        "url": "https://ubuntu.com/security/CVE-2025-40294",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40329",
                        "url": "https://ubuntu.com/security/CVE-2025-40329",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40295",
                        "url": "https://ubuntu.com/security/CVE-2025-40295",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40296",
                        "url": "https://ubuntu.com/security/CVE-2025-40296",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40297",
                        "url": "https://ubuntu.com/security/CVE-2025-40297",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68320",
                        "url": "https://ubuntu.com/security/CVE-2025-68320",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68169",
                        "url": "https://ubuntu.com/security/CVE-2025-68169",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68197",
                        "url": "https://ubuntu.com/security/CVE-2025-68197",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40330",
                        "url": "https://ubuntu.com/security/CVE-2025-40330",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68192",
                        "url": "https://ubuntu.com/security/CVE-2025-68192",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40331",
                        "url": "https://ubuntu.com/security/CVE-2025-40331",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68187",
                        "url": "https://ubuntu.com/security/CVE-2025-68187",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68167",
                        "url": "https://ubuntu.com/security/CVE-2025-68167",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68319",
                        "url": "https://ubuntu.com/security/CVE-2025-68319",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40298",
                        "url": "https://ubuntu.com/security/CVE-2025-40298",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40299",
                        "url": "https://ubuntu.com/security/CVE-2025-40299",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40301",
                        "url": "https://ubuntu.com/security/CVE-2025-40301",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40358",
                        "url": "https://ubuntu.com/security/CVE-2025-40358",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68186",
                        "url": "https://ubuntu.com/security/CVE-2025-68186",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68184",
                        "url": "https://ubuntu.com/security/CVE-2025-68184",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40302",
                        "url": "https://ubuntu.com/security/CVE-2025-40302",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40303",
                        "url": "https://ubuntu.com/security/CVE-2025-40303",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40362",
                        "url": "https://ubuntu.com/security/CVE-2025-40362",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40332",
                        "url": "https://ubuntu.com/security/CVE-2025-40332",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40304",
                        "url": "https://ubuntu.com/security/CVE-2025-40304",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40305",
                        "url": "https://ubuntu.com/security/CVE-2025-40305",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68318",
                        "url": "https://ubuntu.com/security/CVE-2025-68318",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40209",
                        "url": "https://ubuntu.com/security/CVE-2025-40209",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68183",
                        "url": "https://ubuntu.com/security/CVE-2025-68183",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68173",
                        "url": "https://ubuntu.com/security/CVE-2025-68173",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40306",
                        "url": "https://ubuntu.com/security/CVE-2025-40306",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40307",
                        "url": "https://ubuntu.com/security/CVE-2025-40307",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40308",
                        "url": "https://ubuntu.com/security/CVE-2025-40308",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40309",
                        "url": "https://ubuntu.com/security/CVE-2025-40309",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68174",
                        "url": "https://ubuntu.com/security/CVE-2025-68174",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40310",
                        "url": "https://ubuntu.com/security/CVE-2025-40310",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40361",
                        "url": "https://ubuntu.com/security/CVE-2025-40361",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40311",
                        "url": "https://ubuntu.com/security/CVE-2025-40311",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68185",
                        "url": "https://ubuntu.com/security/CVE-2025-68185",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68176",
                        "url": "https://ubuntu.com/security/CVE-2025-68176",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68190",
                        "url": "https://ubuntu.com/security/CVE-2025-68190",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68168",
                        "url": "https://ubuntu.com/security/CVE-2025-68168",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40312",
                        "url": "https://ubuntu.com/security/CVE-2025-40312",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40333",
                        "url": "https://ubuntu.com/security/CVE-2025-40333",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68321",
                        "url": "https://ubuntu.com/security/CVE-2025-68321",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40334",
                        "url": "https://ubuntu.com/security/CVE-2025-40334",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68191",
                        "url": "https://ubuntu.com/security/CVE-2025-68191",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68309",
                        "url": "https://ubuntu.com/security/CVE-2025-68309",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40313",
                        "url": "https://ubuntu.com/security/CVE-2025-40313",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40335",
                        "url": "https://ubuntu.com/security/CVE-2025-40335",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40314",
                        "url": "https://ubuntu.com/security/CVE-2025-40314",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40336",
                        "url": "https://ubuntu.com/security/CVE-2025-40336",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68193",
                        "url": "https://ubuntu.com/security/CVE-2025-68193",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68175",
                        "url": "https://ubuntu.com/security/CVE-2025-68175",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68188",
                        "url": "https://ubuntu.com/security/CVE-2025-68188",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68315",
                        "url": "https://ubuntu.com/security/CVE-2025-68315",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40337",
                        "url": "https://ubuntu.com/security/CVE-2025-40337",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40338",
                        "url": "https://ubuntu.com/security/CVE-2025-40338",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40339",
                        "url": "https://ubuntu.com/security/CVE-2025-40339",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68194",
                        "url": "https://ubuntu.com/security/CVE-2025-68194",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40363",
                        "url": "https://ubuntu.com/security/CVE-2025-40363",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68311",
                        "url": "https://ubuntu.com/security/CVE-2025-68311",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40340",
                        "url": "https://ubuntu.com/security/CVE-2025-40340",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68196",
                        "url": "https://ubuntu.com/security/CVE-2025-68196",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68178",
                        "url": "https://ubuntu.com/security/CVE-2025-68178",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40341",
                        "url": "https://ubuntu.com/security/CVE-2025-40341",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40342",
                        "url": "https://ubuntu.com/security/CVE-2025-40342",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40343",
                        "url": "https://ubuntu.com/security/CVE-2025-40343",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68177",
                        "url": "https://ubuntu.com/security/CVE-2025-68177",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68317",
                        "url": "https://ubuntu.com/security/CVE-2025-68317",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40315",
                        "url": "https://ubuntu.com/security/CVE-2025-40315",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40316",
                        "url": "https://ubuntu.com/security/CVE-2025-40316",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40360",
                        "url": "https://ubuntu.com/security/CVE-2025-40360",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68179",
                        "url": "https://ubuntu.com/security/CVE-2025-68179",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68310",
                        "url": "https://ubuntu.com/security/CVE-2025-68310",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40317",
                        "url": "https://ubuntu.com/security/CVE-2025-40317",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40359",
                        "url": "https://ubuntu.com/security/CVE-2025-40359",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68181",
                        "url": "https://ubuntu.com/security/CVE-2025-68181",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68170",
                        "url": "https://ubuntu.com/security/CVE-2025-68170",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40213",
                        "url": "https://ubuntu.com/security/CVE-2025-40213",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40318",
                        "url": "https://ubuntu.com/security/CVE-2025-40318",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68312",
                        "url": "https://ubuntu.com/security/CVE-2025-68312",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40344",
                        "url": "https://ubuntu.com/security/CVE-2025-40344",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68172",
                        "url": "https://ubuntu.com/security/CVE-2025-68172",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40319",
                        "url": "https://ubuntu.com/security/CVE-2025-40319",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68182",
                        "url": "https://ubuntu.com/security/CVE-2025-68182",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68314",
                        "url": "https://ubuntu.com/security/CVE-2025-68314",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68189",
                        "url": "https://ubuntu.com/security/CVE-2025-68189",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68171",
                        "url": "https://ubuntu.com/security/CVE-2025-68171",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68313",
                        "url": "https://ubuntu.com/security/CVE-2025-68313",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40320",
                        "url": "https://ubuntu.com/security/CVE-2025-40320",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40321",
                        "url": "https://ubuntu.com/security/CVE-2025-40321",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40322",
                        "url": "https://ubuntu.com/security/CVE-2025-40322",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40211",
                        "url": "https://ubuntu.com/security/CVE-2025-40211",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40323",
                        "url": "https://ubuntu.com/security/CVE-2025-40323",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40210",
                        "url": "https://ubuntu.com/security/CVE-2025-40210",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40324",
                        "url": "https://ubuntu.com/security/CVE-2025-40324",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40326",
                        "url": "https://ubuntu.com/security/CVE-2025-40326",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40084",
                        "url": "https://ubuntu.com/security/CVE-2025-40084",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40222",
                        "url": "https://ubuntu.com/security/CVE-2025-40222",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40223",
                        "url": "https://ubuntu.com/security/CVE-2025-40223",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40106",
                        "url": "https://ubuntu.com/security/CVE-2025-40106",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40224",
                        "url": "https://ubuntu.com/security/CVE-2025-40224",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40225",
                        "url": "https://ubuntu.com/security/CVE-2025-40225",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40226",
                        "url": "https://ubuntu.com/security/CVE-2025-40226",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40227",
                        "url": "https://ubuntu.com/security/CVE-2025-40227",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40228",
                        "url": "https://ubuntu.com/security/CVE-2025-40228",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40229",
                        "url": "https://ubuntu.com/security/CVE-2025-40229",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40230",
                        "url": "https://ubuntu.com/security/CVE-2025-40230",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40231",
                        "url": "https://ubuntu.com/security/CVE-2025-40231",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40233",
                        "url": "https://ubuntu.com/security/CVE-2025-40233",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40235",
                        "url": "https://ubuntu.com/security/CVE-2025-40235",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40236",
                        "url": "https://ubuntu.com/security/CVE-2025-40236",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40237",
                        "url": "https://ubuntu.com/security/CVE-2025-40237",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40238",
                        "url": "https://ubuntu.com/security/CVE-2025-40238",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40239",
                        "url": "https://ubuntu.com/security/CVE-2025-40239",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40240",
                        "url": "https://ubuntu.com/security/CVE-2025-40240",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40241",
                        "url": "https://ubuntu.com/security/CVE-2025-40241",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40242",
                        "url": "https://ubuntu.com/security/CVE-2025-40242",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40243",
                        "url": "https://ubuntu.com/security/CVE-2025-40243",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40244",
                        "url": "https://ubuntu.com/security/CVE-2025-40244",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40245",
                        "url": "https://ubuntu.com/security/CVE-2025-40245",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40086",
                        "url": "https://ubuntu.com/security/CVE-2025-40086",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40087",
                        "url": "https://ubuntu.com/security/CVE-2025-40087",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40088",
                        "url": "https://ubuntu.com/security/CVE-2025-40088",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40162",
                        "url": "https://ubuntu.com/security/CVE-2025-40162",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40085",
                        "url": "https://ubuntu.com/security/CVE-2025-40085",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40172",
                        "url": "https://ubuntu.com/security/CVE-2025-40172",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40177",
                        "url": "https://ubuntu.com/security/CVE-2025-40177",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40163",
                        "url": "https://ubuntu.com/security/CVE-2025-40163",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40174",
                        "url": "https://ubuntu.com/security/CVE-2025-40174",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40089",
                        "url": "https://ubuntu.com/security/CVE-2025-40089",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40176",
                        "url": "https://ubuntu.com/security/CVE-2025-40176",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40164",
                        "url": "https://ubuntu.com/security/CVE-2025-40164",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40091",
                        "url": "https://ubuntu.com/security/CVE-2025-40091",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40175",
                        "url": "https://ubuntu.com/security/CVE-2025-40175",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40173",
                        "url": "https://ubuntu.com/security/CVE-2025-40173",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40092",
                        "url": "https://ubuntu.com/security/CVE-2025-40092",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40093",
                        "url": "https://ubuntu.com/security/CVE-2025-40093",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40094",
                        "url": "https://ubuntu.com/security/CVE-2025-40094",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40095",
                        "url": "https://ubuntu.com/security/CVE-2025-40095",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40165",
                        "url": "https://ubuntu.com/security/CVE-2025-40165",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40096",
                        "url": "https://ubuntu.com/security/CVE-2025-40096",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40097",
                        "url": "https://ubuntu.com/security/CVE-2025-40097",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40098",
                        "url": "https://ubuntu.com/security/CVE-2025-40098",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40099",
                        "url": "https://ubuntu.com/security/CVE-2025-40099",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40100",
                        "url": "https://ubuntu.com/security/CVE-2025-40100",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40101",
                        "url": "https://ubuntu.com/security/CVE-2025-40101",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40167",
                        "url": "https://ubuntu.com/security/CVE-2025-40167",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40102",
                        "url": "https://ubuntu.com/security/CVE-2025-40102",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40103",
                        "url": "https://ubuntu.com/security/CVE-2025-40103",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40104",
                        "url": "https://ubuntu.com/security/CVE-2025-40104",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40166",
                        "url": "https://ubuntu.com/security/CVE-2025-40166",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40105",
                        "url": "https://ubuntu.com/security/CVE-2025-40105",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40019",
                        "url": "https://ubuntu.com/security/CVE-2025-40019",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40214",
                        "url": "https://ubuntu.com/security/CVE-2025-40214",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [
                    2137844,
                    2013232,
                    2074082,
                    2137845,
                    1786013,
                    2137849,
                    1786013,
                    2136820,
                    2137698,
                    2129812,
                    2125022,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136813,
                    2132317,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2132095,
                    2131046,
                    2115860,
                    2128792,
                    2121852,
                    2131259,
                    2131259,
                    2131702,
                    2129610,
                    2138113,
                    2138115,
                    2133507,
                    1975592,
                    2013232
                ],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-40256",
                                "url": "https://ubuntu.com/security/CVE-2025-40256",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68204",
                                "url": "https://ubuntu.com/security/CVE-2025-68204",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68203",
                                "url": "https://ubuntu.com/security/CVE-2025-68203",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40267",
                                "url": "https://ubuntu.com/security/CVE-2025-40267",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68198",
                                "url": "https://ubuntu.com/security/CVE-2025-68198",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68199",
                                "url": "https://ubuntu.com/security/CVE-2025-68199",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40268",
                                "url": "https://ubuntu.com/security/CVE-2025-40268",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40269",
                                "url": "https://ubuntu.com/security/CVE-2025-40269",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68205",
                                "url": "https://ubuntu.com/security/CVE-2025-68205",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40270",
                                "url": "https://ubuntu.com/security/CVE-2025-40270",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40271",
                                "url": "https://ubuntu.com/security/CVE-2025-40271",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40272",
                                "url": "https://ubuntu.com/security/CVE-2025-40272",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68245",
                                "url": "https://ubuntu.com/security/CVE-2025-68245",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68240",
                                "url": "https://ubuntu.com/security/CVE-2025-68240",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68241",
                                "url": "https://ubuntu.com/security/CVE-2025-68241",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68211",
                                "url": "https://ubuntu.com/security/CVE-2025-68211",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68246",
                                "url": "https://ubuntu.com/security/CVE-2025-68246",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40273",
                                "url": "https://ubuntu.com/security/CVE-2025-40273",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40212",
                                "url": "https://ubuntu.com/security/CVE-2025-40212",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40274",
                                "url": "https://ubuntu.com/security/CVE-2025-40274",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68202",
                                "url": "https://ubuntu.com/security/CVE-2025-68202",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68239",
                                "url": "https://ubuntu.com/security/CVE-2025-68239",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68247",
                                "url": "https://ubuntu.com/security/CVE-2025-68247",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68208",
                                "url": "https://ubuntu.com/security/CVE-2025-68208",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68200",
                                "url": "https://ubuntu.com/security/CVE-2025-68200",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40275",
                                "url": "https://ubuntu.com/security/CVE-2025-40275",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68242",
                                "url": "https://ubuntu.com/security/CVE-2025-68242",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68243",
                                "url": "https://ubuntu.com/security/CVE-2025-68243",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40276",
                                "url": "https://ubuntu.com/security/CVE-2025-40276",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40277",
                                "url": "https://ubuntu.com/security/CVE-2025-40277",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68206",
                                "url": "https://ubuntu.com/security/CVE-2025-68206",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68209",
                                "url": "https://ubuntu.com/security/CVE-2025-68209",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40278",
                                "url": "https://ubuntu.com/security/CVE-2025-40278",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40279",
                                "url": "https://ubuntu.com/security/CVE-2025-40279",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40280",
                                "url": "https://ubuntu.com/security/CVE-2025-40280",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40281",
                                "url": "https://ubuntu.com/security/CVE-2025-40281",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40282",
                                "url": "https://ubuntu.com/security/CVE-2025-40282",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40283",
                                "url": "https://ubuntu.com/security/CVE-2025-40283",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40284",
                                "url": "https://ubuntu.com/security/CVE-2025-40284",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68210",
                                "url": "https://ubuntu.com/security/CVE-2025-68210",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40285",
                                "url": "https://ubuntu.com/security/CVE-2025-40285",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40286",
                                "url": "https://ubuntu.com/security/CVE-2025-40286",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40287",
                                "url": "https://ubuntu.com/security/CVE-2025-40287",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40288",
                                "url": "https://ubuntu.com/security/CVE-2025-40288",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40289",
                                "url": "https://ubuntu.com/security/CVE-2025-40289",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68201",
                                "url": "https://ubuntu.com/security/CVE-2025-68201",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68207",
                                "url": "https://ubuntu.com/security/CVE-2025-68207",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68244",
                                "url": "https://ubuntu.com/security/CVE-2025-68244",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68316",
                                "url": "https://ubuntu.com/security/CVE-2025-68316",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40292",
                                "url": "https://ubuntu.com/security/CVE-2025-40292",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68180",
                                "url": "https://ubuntu.com/security/CVE-2025-68180",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40327",
                                "url": "https://ubuntu.com/security/CVE-2025-40327",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40328",
                                "url": "https://ubuntu.com/security/CVE-2025-40328",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40291",
                                "url": "https://ubuntu.com/security/CVE-2025-40291",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68322",
                                "url": "https://ubuntu.com/security/CVE-2025-68322",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40293",
                                "url": "https://ubuntu.com/security/CVE-2025-40293",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40294",
                                "url": "https://ubuntu.com/security/CVE-2025-40294",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40329",
                                "url": "https://ubuntu.com/security/CVE-2025-40329",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40295",
                                "url": "https://ubuntu.com/security/CVE-2025-40295",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40296",
                                "url": "https://ubuntu.com/security/CVE-2025-40296",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40297",
                                "url": "https://ubuntu.com/security/CVE-2025-40297",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68320",
                                "url": "https://ubuntu.com/security/CVE-2025-68320",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68169",
                                "url": "https://ubuntu.com/security/CVE-2025-68169",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68197",
                                "url": "https://ubuntu.com/security/CVE-2025-68197",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40330",
                                "url": "https://ubuntu.com/security/CVE-2025-40330",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68192",
                                "url": "https://ubuntu.com/security/CVE-2025-68192",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40331",
                                "url": "https://ubuntu.com/security/CVE-2025-40331",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68187",
                                "url": "https://ubuntu.com/security/CVE-2025-68187",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68167",
                                "url": "https://ubuntu.com/security/CVE-2025-68167",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68319",
                                "url": "https://ubuntu.com/security/CVE-2025-68319",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40298",
                                "url": "https://ubuntu.com/security/CVE-2025-40298",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40299",
                                "url": "https://ubuntu.com/security/CVE-2025-40299",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40301",
                                "url": "https://ubuntu.com/security/CVE-2025-40301",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40358",
                                "url": "https://ubuntu.com/security/CVE-2025-40358",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68186",
                                "url": "https://ubuntu.com/security/CVE-2025-68186",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68184",
                                "url": "https://ubuntu.com/security/CVE-2025-68184",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40302",
                                "url": "https://ubuntu.com/security/CVE-2025-40302",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40303",
                                "url": "https://ubuntu.com/security/CVE-2025-40303",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40362",
                                "url": "https://ubuntu.com/security/CVE-2025-40362",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40332",
                                "url": "https://ubuntu.com/security/CVE-2025-40332",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40304",
                                "url": "https://ubuntu.com/security/CVE-2025-40304",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40305",
                                "url": "https://ubuntu.com/security/CVE-2025-40305",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68318",
                                "url": "https://ubuntu.com/security/CVE-2025-68318",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40209",
                                "url": "https://ubuntu.com/security/CVE-2025-40209",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68183",
                                "url": "https://ubuntu.com/security/CVE-2025-68183",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68173",
                                "url": "https://ubuntu.com/security/CVE-2025-68173",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40306",
                                "url": "https://ubuntu.com/security/CVE-2025-40306",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40307",
                                "url": "https://ubuntu.com/security/CVE-2025-40307",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40308",
                                "url": "https://ubuntu.com/security/CVE-2025-40308",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40309",
                                "url": "https://ubuntu.com/security/CVE-2025-40309",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68174",
                                "url": "https://ubuntu.com/security/CVE-2025-68174",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40310",
                                "url": "https://ubuntu.com/security/CVE-2025-40310",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40361",
                                "url": "https://ubuntu.com/security/CVE-2025-40361",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40311",
                                "url": "https://ubuntu.com/security/CVE-2025-40311",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68185",
                                "url": "https://ubuntu.com/security/CVE-2025-68185",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68176",
                                "url": "https://ubuntu.com/security/CVE-2025-68176",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68190",
                                "url": "https://ubuntu.com/security/CVE-2025-68190",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68168",
                                "url": "https://ubuntu.com/security/CVE-2025-68168",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40312",
                                "url": "https://ubuntu.com/security/CVE-2025-40312",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40333",
                                "url": "https://ubuntu.com/security/CVE-2025-40333",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68321",
                                "url": "https://ubuntu.com/security/CVE-2025-68321",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40334",
                                "url": "https://ubuntu.com/security/CVE-2025-40334",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68191",
                                "url": "https://ubuntu.com/security/CVE-2025-68191",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68309",
                                "url": "https://ubuntu.com/security/CVE-2025-68309",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40313",
                                "url": "https://ubuntu.com/security/CVE-2025-40313",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40335",
                                "url": "https://ubuntu.com/security/CVE-2025-40335",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40314",
                                "url": "https://ubuntu.com/security/CVE-2025-40314",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40336",
                                "url": "https://ubuntu.com/security/CVE-2025-40336",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68193",
                                "url": "https://ubuntu.com/security/CVE-2025-68193",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68175",
                                "url": "https://ubuntu.com/security/CVE-2025-68175",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68188",
                                "url": "https://ubuntu.com/security/CVE-2025-68188",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68315",
                                "url": "https://ubuntu.com/security/CVE-2025-68315",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40337",
                                "url": "https://ubuntu.com/security/CVE-2025-40337",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40338",
                                "url": "https://ubuntu.com/security/CVE-2025-40338",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40339",
                                "url": "https://ubuntu.com/security/CVE-2025-40339",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68194",
                                "url": "https://ubuntu.com/security/CVE-2025-68194",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40363",
                                "url": "https://ubuntu.com/security/CVE-2025-40363",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68311",
                                "url": "https://ubuntu.com/security/CVE-2025-68311",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40340",
                                "url": "https://ubuntu.com/security/CVE-2025-40340",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68196",
                                "url": "https://ubuntu.com/security/CVE-2025-68196",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68178",
                                "url": "https://ubuntu.com/security/CVE-2025-68178",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40341",
                                "url": "https://ubuntu.com/security/CVE-2025-40341",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40342",
                                "url": "https://ubuntu.com/security/CVE-2025-40342",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40343",
                                "url": "https://ubuntu.com/security/CVE-2025-40343",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68177",
                                "url": "https://ubuntu.com/security/CVE-2025-68177",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68317",
                                "url": "https://ubuntu.com/security/CVE-2025-68317",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40315",
                                "url": "https://ubuntu.com/security/CVE-2025-40315",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40316",
                                "url": "https://ubuntu.com/security/CVE-2025-40316",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40360",
                                "url": "https://ubuntu.com/security/CVE-2025-40360",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68179",
                                "url": "https://ubuntu.com/security/CVE-2025-68179",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68310",
                                "url": "https://ubuntu.com/security/CVE-2025-68310",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40317",
                                "url": "https://ubuntu.com/security/CVE-2025-40317",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40359",
                                "url": "https://ubuntu.com/security/CVE-2025-40359",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68181",
                                "url": "https://ubuntu.com/security/CVE-2025-68181",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68170",
                                "url": "https://ubuntu.com/security/CVE-2025-68170",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40213",
                                "url": "https://ubuntu.com/security/CVE-2025-40213",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40318",
                                "url": "https://ubuntu.com/security/CVE-2025-40318",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68312",
                                "url": "https://ubuntu.com/security/CVE-2025-68312",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40344",
                                "url": "https://ubuntu.com/security/CVE-2025-40344",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68172",
                                "url": "https://ubuntu.com/security/CVE-2025-68172",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40319",
                                "url": "https://ubuntu.com/security/CVE-2025-40319",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68182",
                                "url": "https://ubuntu.com/security/CVE-2025-68182",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68314",
                                "url": "https://ubuntu.com/security/CVE-2025-68314",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68189",
                                "url": "https://ubuntu.com/security/CVE-2025-68189",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68171",
                                "url": "https://ubuntu.com/security/CVE-2025-68171",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68313",
                                "url": "https://ubuntu.com/security/CVE-2025-68313",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40320",
                                "url": "https://ubuntu.com/security/CVE-2025-40320",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40321",
                                "url": "https://ubuntu.com/security/CVE-2025-40321",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40322",
                                "url": "https://ubuntu.com/security/CVE-2025-40322",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40211",
                                "url": "https://ubuntu.com/security/CVE-2025-40211",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40323",
                                "url": "https://ubuntu.com/security/CVE-2025-40323",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40210",
                                "url": "https://ubuntu.com/security/CVE-2025-40210",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40324",
                                "url": "https://ubuntu.com/security/CVE-2025-40324",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40326",
                                "url": "https://ubuntu.com/security/CVE-2025-40326",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40084",
                                "url": "https://ubuntu.com/security/CVE-2025-40084",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40222",
                                "url": "https://ubuntu.com/security/CVE-2025-40222",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40223",
                                "url": "https://ubuntu.com/security/CVE-2025-40223",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40106",
                                "url": "https://ubuntu.com/security/CVE-2025-40106",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40224",
                                "url": "https://ubuntu.com/security/CVE-2025-40224",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40225",
                                "url": "https://ubuntu.com/security/CVE-2025-40225",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40226",
                                "url": "https://ubuntu.com/security/CVE-2025-40226",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40227",
                                "url": "https://ubuntu.com/security/CVE-2025-40227",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40228",
                                "url": "https://ubuntu.com/security/CVE-2025-40228",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40229",
                                "url": "https://ubuntu.com/security/CVE-2025-40229",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40230",
                                "url": "https://ubuntu.com/security/CVE-2025-40230",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40231",
                                "url": "https://ubuntu.com/security/CVE-2025-40231",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40233",
                                "url": "https://ubuntu.com/security/CVE-2025-40233",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40235",
                                "url": "https://ubuntu.com/security/CVE-2025-40235",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40236",
                                "url": "https://ubuntu.com/security/CVE-2025-40236",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40237",
                                "url": "https://ubuntu.com/security/CVE-2025-40237",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40238",
                                "url": "https://ubuntu.com/security/CVE-2025-40238",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40239",
                                "url": "https://ubuntu.com/security/CVE-2025-40239",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40240",
                                "url": "https://ubuntu.com/security/CVE-2025-40240",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40241",
                                "url": "https://ubuntu.com/security/CVE-2025-40241",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40242",
                                "url": "https://ubuntu.com/security/CVE-2025-40242",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40243",
                                "url": "https://ubuntu.com/security/CVE-2025-40243",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40244",
                                "url": "https://ubuntu.com/security/CVE-2025-40244",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40245",
                                "url": "https://ubuntu.com/security/CVE-2025-40245",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40086",
                                "url": "https://ubuntu.com/security/CVE-2025-40086",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40087",
                                "url": "https://ubuntu.com/security/CVE-2025-40087",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40088",
                                "url": "https://ubuntu.com/security/CVE-2025-40088",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40162",
                                "url": "https://ubuntu.com/security/CVE-2025-40162",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40085",
                                "url": "https://ubuntu.com/security/CVE-2025-40085",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40172",
                                "url": "https://ubuntu.com/security/CVE-2025-40172",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40177",
                                "url": "https://ubuntu.com/security/CVE-2025-40177",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40163",
                                "url": "https://ubuntu.com/security/CVE-2025-40163",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40174",
                                "url": "https://ubuntu.com/security/CVE-2025-40174",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40089",
                                "url": "https://ubuntu.com/security/CVE-2025-40089",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40176",
                                "url": "https://ubuntu.com/security/CVE-2025-40176",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40164",
                                "url": "https://ubuntu.com/security/CVE-2025-40164",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40091",
                                "url": "https://ubuntu.com/security/CVE-2025-40091",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40175",
                                "url": "https://ubuntu.com/security/CVE-2025-40175",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40173",
                                "url": "https://ubuntu.com/security/CVE-2025-40173",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40092",
                                "url": "https://ubuntu.com/security/CVE-2025-40092",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40093",
                                "url": "https://ubuntu.com/security/CVE-2025-40093",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40094",
                                "url": "https://ubuntu.com/security/CVE-2025-40094",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40095",
                                "url": "https://ubuntu.com/security/CVE-2025-40095",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40165",
                                "url": "https://ubuntu.com/security/CVE-2025-40165",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40096",
                                "url": "https://ubuntu.com/security/CVE-2025-40096",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40097",
                                "url": "https://ubuntu.com/security/CVE-2025-40097",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40098",
                                "url": "https://ubuntu.com/security/CVE-2025-40098",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40099",
                                "url": "https://ubuntu.com/security/CVE-2025-40099",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40100",
                                "url": "https://ubuntu.com/security/CVE-2025-40100",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40101",
                                "url": "https://ubuntu.com/security/CVE-2025-40101",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40167",
                                "url": "https://ubuntu.com/security/CVE-2025-40167",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40102",
                                "url": "https://ubuntu.com/security/CVE-2025-40102",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40103",
                                "url": "https://ubuntu.com/security/CVE-2025-40103",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40104",
                                "url": "https://ubuntu.com/security/CVE-2025-40104",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40166",
                                "url": "https://ubuntu.com/security/CVE-2025-40166",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40105",
                                "url": "https://ubuntu.com/security/CVE-2025-40105",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40019",
                                "url": "https://ubuntu.com/security/CVE-2025-40019",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40214",
                                "url": "https://ubuntu.com/security/CVE-2025-40214",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * noble/linux-riscv-6.17: 6.17.0-14.14.1~24.04.1 -proposed tracker (LP: #2137844)",
                            "",
                            "  * Enable StarFive VisionFive 2 board (LP: #2013232)",
                            "    - SAUCE: PCI: starfive: Use regulator APIs instead of GPIO APIs to control",
                            "      the 3V3 power supply of PCIe slots",
                            "",
                            "  * Enable Microchip PIC64GX Curiosity Kit (LP: #2074082)",
                            "    - dt-bindings: cache: sifive,ccache0: add a pic64gx compatible",
                            "    - dt-bindings: interrupt-controller: sifive,plic: Add pic64gx",
                            "      compatibility",
                            "    - dt-bindings: gpio: mpfs-gpio: Add pic64gx GPIO compatibility",
                            "    - dt-bindings: net: cdns,macb: Add pic64gx compatibility",
                            "    - riscv: dts: microchip: Minor whitespace cleanup",
                            "    - riscv: dts: microchip: add common board dtsi for icicle kit variants",
                            "    - dt-bindings: riscv: microchip: document icicle kit with production",
                            "      device",
                            "    - riscv: dts: microchip: add icicle kit with production device",
                            "    - riscv: dts: microchip: rename icicle kit ccc clock and other minor fixes",
                            "    - dt-bindings: riscv: microchip: document Discovery Kit",
                            "    - riscv: dts: microchip: add a device tree for Discovery Kit",
                            "    - dt-bindings: soc: microchip: document the simple-mfd syscon on PolarFire",
                            "      SoC",
                            "    - soc: microchip: add mfd drivers for two syscon regions on PolarFire SoC",
                            "    - MAINTAINERS: add new soc drivers to Microchip RISC-V entry",
                            "    - MAINTAINERS: rename Microchip RISC-V entry",
                            "    - dt-bindings: pinctrl: document pic64gx \"gpio2\" pinmux",
                            "    - pinctrl: add pic64gx \"gpio2\" pinmux driver",
                            "    - dt-bindings: pinctrl: document polarfire soc iomux0 pinmux",
                            "    - pinctrl: add polarfire soc iomux0 pinmux driver",
                            "    - MAINTAINERS: add Microchip RISC-V pinctrl drivers/bindings to entry",
                            "    - dt-bindings: clk: microchip: mpfs: remove first reg region",
                            "    - clk: microchip: mpfs: use regmap for clocks",
                            "    - reset: mpfs: add non-auxiliary bus probing",
                            "    - pinctrl: pic64gx-gpio2: Add REGMAP_MMIO dependency",
                            "    - pinctrl: add CONFIG_OF dependencies for microchip drivers",
                            "    - SAUCE: pinctrl: move microchip riscv pinctrl drivers to a folder",
                            "    - SAUCE: pinctrl: add generic functions + pins mapper",
                            "    - SAUCE: dt-bindings: pinctrl: document polarfire soc mssio pin controller",
                            "    - SAUCE: pinctrl: add polarfire soc mssio pinctrl driver",
                            "    - SAUCE: MAINTAINERS: add Microchip mpfs mssio driver/bindings to entry",
                            "    - SAUCE: dt-bindings: soc: microchip: add compatible for the mss-top-",
                            "      sysreg on pic64gx",
                            "    - SAUCE: dt-bindings: soc: microchip: mpfs-sys-controller: Add pic64gx",
                            "      compatibility",
                            "    - SAUCE: soc: microchip: mpfs-sys-controller: add support for pic64gx",
                            "    - SAUCE: dt-bindings: timer: sifive,clint: add pic64gx compatibility",
                            "    - SAUCE: clk: microchip: drop POLARFIRE from ARCH_MICROCHIP_POLARFIRE",
                            "    - SAUCE: dt-bindings: clock: mpfs-ccc: Add pic64gx compatibility",
                            "    - SAUCE: dt-bindings: clock: mpfs-clkcfg: Add pic64gx compatibility",
                            "    - SAUCE: dt-bindings: mbox: add pic64gx mailbox compatibility to mpfs",
                            "      mailbox",
                            "    - SAUCE: mailbox: mpfs: drop POLARFIRE from ARCH_MICROCHIP_POLARFIRE",
                            "    - SAUCE: dt-bindings: riscv: microchip: document the PIC64GX curiosity kit",
                            "    - SAUCE: riscv: dts: microchip: add pic64gx and its curiosity kit",
                            "    - SAUCE: riscv: dts: microchip: remove POLARFIRE mention in Makefile",
                            "    - [Config] riscv: updateconfigs for PIC64GX support",
                            "",
                            "  [ Ubuntu-riscv: 6.17.0-14.14.1 ]",
                            "",
                            "  * questing/linux-riscv: 6.17.0-14.14.1 -proposed tracker (LP: #2137845)",
                            "  * Packaging resync (LP: #1786013)",
                            "    - [Packaging] debian.riscv/dkms-versions -- update from kernel-versions",
                            "      (main/2026.01.12)",
                            "  [ Ubuntu: 6.17.0-14.14 ]",
                            "  * questing/linux: 6.17.0-14.14 -proposed tracker (LP: #2137849)",
                            "  * Packaging resync (LP: #1786013)",
                            "    - [Packaging] debian.master/dkms-versions -- update from kernel-versions",
                            "      (main/2026.01.12)",
                            "  * ubuntu_kselftests:_net/net:gre_gso.sh failing (LP: #2136820)",
                            "    - SAUCE increase socat timeout in gre_gso.sh",
                            "  * ubuntu_blktrace_smoke_test fails on questing with rust coreutils",
                            "    (LP: #2137698)",
                            "    - SAUCE: Revert \"ext4: fail unaligned direct IO write with EINVAL\"",
                            "  * bareudp.sh in ubuntu_kselftests_net fails because of dash default shell",
                            "    (LP: #2129812)",
                            "    - selftests: net: use BASH for bareudp testing",
                            "  * CVE-2025-40256",
                            "    - xfrm: also call xfrm_state_delete_tunnel at destroy time for states that",
                            "      were never added",
                            "  * Enable PMF on AMD HPT/STX/KRK (LP: #2125022)",
                            "    - platform/x86/amd/pmf: Add support for adjusting PMF PPT and PPT APU",
                            "      thresholds",
                            "    - platform/x86/amd/pmf: Extend custom BIOS inputs for more policies",
                            "    - platform/x86/amd/pmf: Update ta_pmf_action structure member",
                            "    - platform/x86/amd/pmf: Add helper to verify BIOS input notifications are",
                            "      enable/disable",
                            "    - platform/x86/amd/pmf: Add custom BIOS input support for AMD_CPU_ID_PS",
                            "    - platform/x86/amd/pmf: Preserve custom BIOS inputs for evaluating the",
                            "      policies",
                            "    - platform/x86/amd/pmf: Call enact function sooner to process early",
                            "      pending requests",
                            "    - platform/x86/amd/pmf: Add debug logs for pending requests and custom",
                            "      BIOS inputs",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850)",
                            "    - iommufd/selftest: Fix ioctl return value in _test_cmd_trigger_vevents()",
                            "    - drm/mediatek: Add pm_runtime support for GCE power control",
                            "    - drm/i915: Fix conversion between clock ticks and nanoseconds",
                            "    - drm/amdgpu: set default gfx reset masks for gfx6-8",
                            "    - drm/amd/display: Don't stretch non-native images by default in eDP",
                            "    - smb: client: fix refcount leak in smb2_set_path_attr",
                            "    - iommufd: Make vfio_compat's unmap succeed if the range is already empty",
                            "    - futex: Optimize per-cpu reference counting",
                            "    - drm/amd: Fix suspend failure with secure display TA",
                            "    - drm/xe: Move declarations under conditional branch",
                            "    - drm/xe: Do clean shutdown also when using flr",
                            "    - drm/amd/display: Add pixel_clock to amd_pp_display_configuration",
                            "    - drm/amd/pm: Use pm_display_cfg in legacy DPM (v2)",
                            "    - drm/amd/display: Disable fastboot on DCE 6 too",
                            "    - drm/amd/pm: Disable MCLK switching on SI at high pixel clocks",
                            "    - drm/amd: Disable ASPM on SI",
                            "    - arm64: kprobes: check the return value of set_memory_rox()",
                            "    - compiler_types: Move unused static inline functions warning to W=2",
                            "    - riscv: Build loader.bin exclusively for Canaan K210",
                            "    - RISC-V: clear hot-unplugged cores from all task mm_cpumasks to avoid",
                            "      rfence errors",
                            "    - riscv: acpi: avoid errors caused by probing DT devices when ACPI is used",
                            "    - fs: return EOPNOTSUPP from file_setattr/file_getattr syscalls",
                            "    - ASoC: nau8821: Avoid unnecessary blocking in IRQ handler",
                            "    - NFS4: Fix state renewals missing after boot",
                            "    - drm/amdkfd: fix suspend/resume all calls in mes based eviction path",
                            "    - NFS4: Apply delay_retrans to async operations",
                            "    - HID: intel-thc-hid: intel-quickspi: Add ARL PCI Device Id's",
                            "    - HID: quirks: avoid Cooler Master MM712 dongle wakeup bug",
                            "    - ixgbe: handle IXGBE_VF_GET_PF_LINK_STATE mailbox operation",
                            "    - HID: nintendo: Wait longer for initial probe",
                            "    - NFS: check if suid/sgid was cleared after a write as needed",
                            "    - HID: quirks: Add ALWAYS_POLL quirk for VRS R295 steering wheel",
                            "    - io_uring: fix unexpected placement on same size resizing",
                            "    - HID: logitech-hidpp: Add HIDPP_QUIRK_RESET_HI_RES_SCROLL",
                            "    - ASoC: max98090/91: fixed max98091 ALSA widget powering up/down",
                            "    - ALSA: hda/realtek: Fix mute led for HP Omen 17-cb0xxx",
                            "    - ixgbe: handle IXGBE_VF_FEATURES_NEGOTIATE mbox cmd",
                            "    - wifi: ath11k: zero init info->status in wmi_process_mgmt_tx_comp()",
                            "    - selftests: net: local_termination: Wait for interfaces to come up",
                            "    - net: fec: correct rx_bytes statistic for the case SHIFT16 is set",
                            "    - net: phy: micrel: Introduce lanphy_modify_page_reg",
                            "    - net: phy: micrel: Replace hardcoded pages with defines",
                            "    - net: phy: micrel: lan8814 fix reset of the QSGMII interface",
                            "    - rust: Add -fno-isolate-erroneous-paths-dereference to",
                            "      bindgen_skip_c_flags",
                            "    - NFSD: Skip close replay processing if XDR encoding fails",
                            "    - Bluetooth: 6lowpan: fix BDADDR_LE vs ADDR_LE_DEV address type confusion",
                            "    - Bluetooth: 6lowpan: Don't hold spin lock over sleeping functions",
                            "    - Bluetooth: hci_conn: Fix not cleaning up PA_LINK connections",
                            "    - net: dsa: tag_brcm: do not mark link local traffic as offloaded",
                            "    - net/smc: fix mismatch between CLC header and proposal",
                            "    - net/handshake: Fix memory leak in tls_handshake_accept()",
                            "    - net: ethernet: ti: am65-cpsw-qos: fix IET verify/response timeout",
                            "    - net: ethernet: ti: am65-cpsw-qos: fix IET verify retry mechanism",
                            "    - net: mdio: fix resource leak in mdiobus_register_device()",
                            "    - wifi: mac80211: skip rate verification for not captured PSDUs",
                            "    - Bluetooth: hci_event: Fix not handling PA Sync Lost event",
                            "    - net/mlx5e: Fix missing error assignment in mlx5e_xfrm_add_state()",
                            "    - net/mlx5e: Fix maxrate wraparound in threshold between units",
                            "    - net/mlx5e: Fix wraparound in rate limiting for values above 255 Gbps",
                            "    - net/mlx5e: Fix potentially misleading debug message",
                            "    - net/mlx5: Fix typo of MLX5_EQ_DOORBEL_OFFSET",
                            "    - net/mlx5: Store the global doorbell in mlx5_priv",
                            "    - net/mlx5e: Prepare for using different CQ doorbells",
                            "    - net_sched: limit try_bulk_dequeue_skb() batches",
                            "    - wifi: iwlwifi: mvm: fix beacon template/fixed rate",
                            "    - wifi: iwlwifi: mld: always take beacon ies in link grading",
                            "    - virtio-net: fix incorrect flags recording in big mode",
                            "    - hsr: Fix supervision frame sending on HSRv0",
                            "    - hsr: Follow standard for HSRv0 supervision frames",
                            "    - ACPI: CPPC: Detect preferred core availability on online CPUs",
                            "    - ACPI: CPPC: Check _CPC validity for only the online CPUs",
                            "    - ACPI: CPPC: Perform fast check switch only for online CPUs",
                            "    - ACPI: CPPC: Limit perf ctrs in PCC check only to online CPUs",
                            "    - cpufreq: intel_pstate: Check IDA only before MSR_IA32_PERF_CTL writes",
                            "    - Bluetooth: L2CAP: export l2cap_chan_hold for modules",
                            "    - io_uring/rsrc: don't use blk_rq_nr_phys_segments() as number of bvecs",
                            "    - acpi,srat: Fix incorrect device handle check for Generic Initiator",
                            "    - regulator: fixed: fix GPIO descriptor leak on register failure",
                            "    - ASoC: cs4271: Fix regulator leak on probe failure",
                            "    - ASoC: codecs: va-macro: fix resource leak in probe error path",
                            "    - drm/vmwgfx: Restore Guest-Backed only cursor plane support",
                            "    - ASoC: tas2781: fix getting the wrong device number",
                            "    - pnfs: Fix TLS logic in _nfs4_pnfs_v3_ds_connect()",
                            "    - pnfs: Fix TLS logic in _nfs4_pnfs_v4_ds_connect()",
                            "    - pnfs: Set transport security policy to RPC_XPRTSEC_NONE unless using TLS",
                            "    - simplify nfs_atomic_open_v23()",
                            "    - NFSv2/v3: Fix error handling in nfs_atomic_open_v23()",
                            "    - NFS: sysfs: fix leak when nfs_client kobject add fails",
                            "    - NFSv4: Fix an incorrect parameter when calling nfs4_call_sync()",
                            "    - drm/amd/amdgpu: Ensure isp_kernel_buffer_alloc() creates a new BO",
                            "    - acpi/hmat: Fix lockdep warning for hmem_register_resource()",
                            "    - ASoC: rsnd: fix OF node reference leak in rsnd_ssiu_probe()",
                            "    - drm/client: fix MODULE_PARM_DESC string for \"active\"",
                            "    - irqchip/riscv-intc: Add missing free() callback in riscv_intc_domain_ops",
                            "    - lib/crypto: arm/curve25519: Disable on CPU_BIG_ENDIAN",
                            "    - hostfs: Fix only passing host root in boot stage with new mount",
                            "    - afs: Fix dynamic lookup to fail on cell lookup failure",
                            "    - mtd: onenand: Pass correct pointer to IRQ handler",
                            "    - virtio-fs: fix incorrect check for fsvq->kobj",
                            "    - fs/namespace: correctly handle errors returned by grab_requested_mnt_ns",
                            "    - perf header: Write bpf_prog (infos|btfs)_cnt to data file",
                            "    - perf build: Don't fail fast path feature detection when binutils-devel",
                            "      is not available",
                            "    - perf lock: Fix segfault due to missing kernel map",
                            "    - perf test shell lock_contention: Extra debug diagnostics",
                            "    - perf test: Fix lock contention test",
                            "    - arm64: dts: rockchip: Set correct pinctrl for I2S1 8ch TX on odroid-m1",
                            "    - arm64: dts: rockchip: Fix PCIe power enable pin for BigTreeTech CB2 and",
                            "      Pi2",
                            "    - arm64: dts: rockchip: Make RK3588 GPU OPP table naming less generic",
                            "    - ARM: dts: imx6ull-engicam-microgea-rmm: fix report-rate-hz value",
                            "    - ARM: dts: imx51-zii-rdu1: Fix audmux node names",
                            "    - arm64: dts: imx8-ss-img: Avoid gpio0_mipi_csi GPIOs being deferred",
                            "    - arm64: dts: imx8mp-kontron: Fix USB OTG role switching",
                            "    - HID: hid-ntrig: Prevent memory leak in ntrig_report_version()",
                            "    - ARM: dts: BCM53573: Fix address of Luxul XAP-1440's Ethernet PHY",
                            "    - arm64: dts: rockchip: Fix USB power enable pin for BTT CB2 and Pi2",
                            "    - arm64: dts: rockchip: drop reset from rk3576 i2c9 node",
                            "    - pwm: adp5585: Correct mismatched pwm chip info",
                            "    - HID: playstation: Fix memory leak in dualshock4_get_calibration_data()",
                            "    - HID: uclogic: Fix potential memory leak in error path",
                            "    - LoongArch: KVM: Restore guest PMU if it is enabled",
                            "    - LoongArch: KVM: Add delay until timer interrupt injected",
                            "    - LoongArch: KVM: Fix max supported vCPUs set with EIOINTC",
                            "    - KVM: arm64: Make all 32bit ID registers fully writable",
                            "    - KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated",
                            "    - KVM: nSVM: Always recalculate LBR MSR intercepts in svm_update_lbrv()",
                            "    - KVM: nSVM: Fix and simplify LBR virtualization handling with nested",
                            "    - KVM: VMX: Fix check for valid GVA on an EPT violation",
                            "    - nfsd: add missing FATTR4_WORD2_CLONE_BLKSIZE from supported attributes",
                            "    - gcov: add support for GCC 15",
                            "    - kho: warn and exit when unpreserved page wasn't preserved",
                            "    - strparser: Fix signed/unsigned mismatch bug",
                            "    - dma-mapping: benchmark: Restore padding to ensure uABI remained",
                            "      consistent",
                            "    - maple_tree: fix tracepoint string pointers",
                            "    - LoongArch: Consolidate early_ioremap()/ioremap_prot()",
                            "    - LoongArch: Use correct accessor to read FWPC/MWPC",
                            "    - LoongArch: Let {pte,pmd}_modify() record the status of _PAGE_DIRTY",
                            "    - mm/damon/sysfs: change next_update_jiffies to a global variable",
                            "    - selftests/tracing: Run sample events to clear page cache events",
                            "    - wifi: mac80211: reject address change while connecting",
                            "    - mm/huge_memory: preserve PG_has_hwpoisoned if a folio is split to >0",
                            "      order",
                            "    - mm/mm_init: fix hash table order logging in alloc_large_system_hash()",
                            "    - mm/damon/stat: change last_refresh_jiffies to a global variable",
                            "    - mm/kmsan: fix kmsan kmalloc hook when no stack depots are allocated yet",
                            "    - mm/shmem: fix THP allocation and fallback loop",
                            "    - mm/mremap: honour writable bit in mremap pte batching",
                            "    - mm/huge_memory: fix folio split check for anon folios in swapcache",
                            "    - mmc: sdhci-of-dwcmshc: Change DLL_STRBIN_TAPNUM_DEFAULT to 0x4",
                            "    - mmc: pxamci: Simplify pxamci_probe() error handling using devm APIs",
                            "    - mmc: dw_mmc-rockchip: Fix wrong internal phase calculate",
                            "    - ASoC: sdw_utils: fix device reference leak in is_sdca_endpoint_present()",
                            "    - crypto: hisilicon/qm - Fix device reference leak in qm_get_qos_value",
                            "    - smb: client: fix cifs_pick_channel when channel needs reconnect",
                            "    - spi: Try to get ACPI GPIO IRQ earlier",
                            "    - x86/microcode/AMD: Add Zen5 model 0x44, stepping 0x1 minrev",
                            "    - x86/CPU/AMD: Add additional fixed RDSEED microcode revisions",
                            "    - selftests/user_events: fix type cast for write_index packed member in",
                            "      perf_test",
                            "    - gendwarfksyms: Skip files with no exports",
                            "    - ftrace: Fix BPF fexit with livepatch",
                            "    - LoongArch: Consolidate max_pfn & max_low_pfn calculation",
                            "    - LoongArch: Use physical addresses for CSR_MERRENTRY/CSR_TLBRENTRY",
                            "    - EDAC/altera: Handle OCRAM ECC enable after warm reset",
                            "    - EDAC/altera: Use INTTEST register for Ethernet and USB SBE injection",
                            "    - PM: hibernate: Emit an error when image writing fails",
                            "    - PM: hibernate: Use atomic64_t for compressed_size variable",
                            "    - btrfs: zoned: fix conventional zone capacity calculation",
                            "    - btrfs: zoned: fix stripe width calculation",
                            "    - btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe()",
                            "    - btrfs: do not update last_log_commit when logging inode due to a new",
                            "      name",
                            "    - btrfs: release root after error in data_reloc_print_warning_inode()",
                            "    - drm/amdkfd: relax checks for over allocation of save area",
                            "    - drm/amdgpu: disable peer-to-peer access for DCC-enabled GC12 VRAM",
                            "      surfaces",
                            "    - drm/i915/psr: fix pipe to vblank conversion",
                            "    - drm/xe/xe3lpg: Extend Wa_15016589081 for xe3lpg",
                            "    - drm/xe/xe3: Extend wa_14023061436",
                            "    - drm/xe/xe3: Add WA_14024681466 for Xe3_LPG",
                            "    - pmdomain: imx: Fix reference count leak in imx_gpc_remove",
                            "    - pmdomain: samsung: plug potential memleak during probe",
                            "    - pmdomain: samsung: Rework legacy splash-screen handover workaround",
                            "    - selftests: mptcp: connect: fix fallback note due to OoO",
                            "    - selftests: mptcp: join: rm: set backup flag",
                            "    - selftests: mptcp: join: endpoints: longer transfer",
                            "    - selftests: mptcp: connect: trunc: read all recv data",
                            "    - selftests: mptcp: join: userspace: longer transfer",
                            "    - selftests: mptcp: join: properly kill background tasks",
                            "    - mm/huge_memory: do not change split_huge_page*() target order silently",
                            "    - mm/memory: do not populate page table entries beyond i_size",
                            "    - scripts/decode_stacktrace.sh: symbol: avoid trailing whitespaces",
                            "    - scripts/decode_stacktrace.sh: symbol: preserve alignment",
                            "    - scripts/decode_stacktrace.sh: fix build ID and PC source parsing",
                            "    - ASoC: da7213: Convert to DEFINE_RUNTIME_DEV_PM_OPS()",
                            "    - ASoC: da7213: Use component driver suspend/resume",
                            "    - KVM: x86: Rename local \"ecx\" variables to \"msr\" and \"pmc\" as appropriate",
                            "    - KVM: x86: Add support for RDMSR/WRMSRNS w/ immediate on Intel",
                            "    - KVM: VMX: Inject #UD if guest tries to execute SEAMCALL or TDCALL",
                            "    - isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe()",
                            "    - net: phy: micrel: Fix lan8814_config_init",
                            "    - Linux 6.17.9",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68204",
                            "    - pmdomain: arm: scmi: Fix genpd leak on provider registration failure",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68203",
                            "    - drm/amdgpu: fix lock warning in amdgpu_userq_fence_driver_process",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40267",
                            "    - io_uring/rw: ensure allocated iovec gets cleared for early failure",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68198",
                            "    - crash: fix crashkernel resource shrink",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68199",
                            "    - codetag: debug: handle existing CODETAG_EMPTY in mark_objexts_empty for",
                            "      slabobj_ext",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40268",
                            "    - cifs: client: fix memory leak in smb3_fs_context_parse_param",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40269",
                            "    - ALSA: usb-audio: Fix potential overflow of PCM transfer buffer",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68205",
                            "    - ALSA: hda/hdmi: Fix breakage at probing nvhdmi-mcp driver",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40270",
                            "    - mm, swap: fix potential UAF issue for VMA readahead",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40271",
                            "    - fs/proc: fix uaf in proc_readdir_de()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40272",
                            "    - mm/secretmem: fix use-after-free race in fault handler",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68245",
                            "    - net: netpoll: fix incorrect refcount handling causing incorrect cleanup",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68240",
                            "    - nilfs2: avoid having an active sc_timer before freeing sci",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68241",
                            "    - ipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68211",
                            "    - ksm: use range-walk function to jump over holes in",
                            "      scan_get_next_rmap_item",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68246",
                            "    - ksmbd: close accepted socket when per-IP limit rejects connection",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40273",
                            "    - NFSD: free copynotify stateid in nfs4_free_ol_stateid()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40212",
                            "    - nfsd: fix refcount leak in nfsd_set_fh_dentry()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40274",
                            "    - KVM: guest_memfd: Remove bindings on memslot deletion when gmem is dying",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68202",
                            "    - sched_ext: Fix unsafe locking in the scx_dump_state()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68239",
                            "    - binfmt_misc: restore write access before closing files opened by",
                            "      open_exec()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68247",
                            "    - posix-timers: Plug potential memory leak in do_timer_create()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68208",
                            "    - bpf: account for current allocated stack depth in",
                            "      widen_imprecise_scalars()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68200",
                            "    - bpf: Add bpf_prog_run_data_pointers()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40275",
                            "    - ALSA: usb-audio: Fix NULL pointer dereference in",
                            "      snd_usb_mixer_controls_badd",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68242",
                            "    - NFS: Fix LTP test failures when timestamps are delegated",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68243",
                            "    - NFS: Check the TLS certificate fields in nfs_match_client()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40276",
                            "    - drm/panthor: Flush shmem writes before mapping buffers CPU-uncached",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40277",
                            "    - drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68206",
                            "    - netfilter: nft_ct: add seqadj extension for natted connections",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68209",
                            "    - mlx5: Fix default values in create CQ",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40278",
                            "    - net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-",
                            "      infoleak",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40279",
                            "    - net: sched: act_connmark: initialize struct tc_ife to fix kernel leak",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40280",
                            "    - tipc: Fix use-after-free in tipc_mon_reinit_self().",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40281",
                            "    - sctp: prevent possible shift-out-of-bounds in sctp_transport_update_rto",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40282",
                            "    - Bluetooth: 6lowpan: reset link-local header on ipv6 recv path",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40283",
                            "    - Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40284",
                            "    - Bluetooth: MGMT: cancel mesh send timer when hdev removed",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68210",
                            "    - erofs: avoid infinite loop due to incomplete zstd-compressed data",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40285",
                            "    - smb/server: fix possible refcount leak in smb2_sess_setup()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40286",
                            "    - smb/server: fix possible memory leak in smb2_read()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40287",
                            "    - exfat: fix improper check of dentry.stream.valid_size",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40288",
                            "    - drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40289",
                            "    - drm/amdgpu: hide VRAM sysfs attributes on GPUs without VRAM",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68201",
                            "    - drm/amdgpu: remove two invalid BUG_ON()s",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68207",
                            "    - drm/xe/guc: Synchronize Dead CT worker with unbind",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68244",
                            "    - drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833)",
                            "    - Revert \"Bluetooth: L2CAP: convert timeouts to secs_to_jiffies()\"",
                            "    - sched_ext: Mark scx_bpf_dsq_move_set_[slice|vtime]() with KF_RCU",
                            "    - net: usb: asix_devices: Check return value of usbnet_get_endpoints",
                            "    - fbdev: atyfb: Check if pll_ops->init_pll failed",
                            "    - ACPI: button: Call input_free_device() on failing input device",
                            "      registration",
                            "    - ACPI: fan: Use platform device for devres-related actions",
                            "    - virtio-net: drop the multi-buffer XDP packet in zerocopy",
                            "    - batman-adv: Release references to inactive interfaces",
                            "    - Bluetooth: rfcomm: fix modem control handling",
                            "    - net: phy: dp83867: Disable EEE support as not implemented",
                            "    - fbdev: pvr2fb: Fix leftover reference to ONCHIP_NR_DMA_CHANNELS",
                            "    - fbdev: valkyriefb: Fix reference count leak in valkyriefb_init",
                            "    - mptcp: drop bogus optimization in __mptcp_check_push()",
                            "    - mptcp: restore window probe",
                            "    - ASoC: qdsp6: q6asm: do not sleep while atomic",
                            "    - ASoC: renesas: rz-ssi: Use proper dma_buffer_pos after resume",
                            "    - s390/pci: Restore IRQ unconditionally for the zPCI device",
                            "    - x86/build: Disable SSE4a",
                            "    - wifi: ath10k: Fix memory leak on unsupported WMI command",
                            "    - wifi: ath11k: Add missing platform IDs for quirk table",
                            "    - wifi: ath12k: free skb during idr cleanup callback",
                            "    - wifi: ath11k: avoid bit operation on key flags",
                            "    - drm/msm/a6xx: Fix GMU firmware parser",
                            "    - ALSA: usb-audio: fix control pipe direction",
                            "    - ASoC: cs-amp-lib-test: Fix missing include of kunit/test-bug.h",
                            "    - wifi: mac80211: reset FILS discovery and unsol probe resp intervals",
                            "    - wifi: mac80211: fix key tailroom accounting leak",
                            "    - wifi: nl80211: call kfree without a NULL check",
                            "    - kunit: test_dev_action: Correctly cast 'priv' pointer to long*",
                            "    - scsi: ufs: core: Initialize value of an attribute returned by uic cmd",
                            "    - scsi: core: Fix the unit attention counter implementation",
                            "    - bpf: Do not audit capability check in do_jit()",
                            "    - nvmet-auth: update sc_c in host response",
                            "    - crypto: s390/phmac - Do not modify the req->nbytes value",
                            "    - ASoC: Intel: avs: Unprepare a stream when XRUN occurs",
                            "    - ASoC: fsl_sai: fix bit order for DSD format",
                            "    - ASoC: fsl_micfil: correct the endian format for DSD",
                            "    - libbpf: Fix powerpc's stack register definition in bpf_tracing.h",
                            "    - ASoC: mediatek: Fix double pm_runtime_disable in remove functions",
                            "    - Bluetooth: ISO: Fix BIS connection dst_type handling",
                            "    - Bluetooth: btmtksdio: Add pmctrl handling for BT closed state during",
                            "      reset",
                            "    - Bluetooth: HCI: Fix tracking of advertisement set/instance 0x00",
                            "    - Bluetooth: ISO: Fix another instance of dst_type handling",
                            "    - Bluetooth: btintel_pcie: Fix event packet loss issue",
                            "    - Bluetooth: hci_conn: Fix connection cleanup with BIG with 2 or more BIS",
                            "    - Bluetooth: hci_core: Fix tracking of periodic advertisement",
                            "    - bpf: Conditionally include dynptr copy kfuncs",
                            "    - drm/msm: Ensure vm is created in VM_BIND ioctl",
                            "    - ALSA: usb-audio: add mono main switch to Presonus S1824c",
                            "    - ALSA: usb-audio: don't log messages meant for 1810c when initializing",
                            "      1824c",
                            "    - ACPI: MRRM: Check revision of MRRM table",
                            "    - drm/etnaviv: fix flush sequence logic",
                            "    - tools: ynl: fix string attribute length to include null terminator",
                            "    - net: hns3: return error code when function fails",
                            "    - sfc: fix potential memory leak in efx_mae_process_mport()",
                            "    - tools: ynl: avoid print_field when there is no reply",
                            "    - dpll: spec: add missing module-name and clock-id to pin-get reply",
                            "    - ASoC: fsl_sai: Fix sync error in consumer mode",
                            "    - ASoC: soc_sdw_utils: remove cs42l43 component_name",
                            "    - drm/amd/pm: fix smu table id bound check issue in smu_cmn_update_table()",
                            "    - drm/amd/pm/powerplay/smumgr: Fix PCIeBootLinkLevel value on Fiji",
                            "    - drm/amd/pm/powerplay/smumgr: Fix PCIeBootLinkLevel value on Iceland",
                            "    - drm/amdgpu: fix SPDX headers on amdgpu_cper.c/h",
                            "    - drm/amdgpu: fix SPDX header on amd_cper.h",
                            "    - drm/amdgpu: fix SPDX header on irqsrcs_vcn_5_0.h",
                            "    - ACPI: fan: Use ACPI handle when retrieving _FST",
                            "    - block: fix op_is_zone_mgmt() to handle REQ_OP_ZONE_RESET_ALL",
                            "    - block: make REQ_OP_ZONE_OPEN a write operation",
                            "    - dma-fence: Fix safe access wrapper to call timeline name method",
                            "    - kbuild: align modinfo section for Secureboot Authenticode EDK2 compat",
                            "    - regmap: irq: Correct documentation of wake_invert flag",
                            "    - [Config] Disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP for s390x",
                            "    - s390/mm: Fix memory leak in add_marker() when kvrealloc() fails",
                            "    - drm/xe: Do not wake device during a GT reset",
                            "    - drm/sched: avoid killing parent entity on child SIGKILL",
                            "    - drm/sched: Fix race in drm_sched_entity_select_rq()",
                            "    - drm/nouveau: Fix race in nouveau_sched_fini()",
                            "    - drm/i915/dmc: Clear HRR EVT_CTL/HTP to zero on ADL-S",
                            "    - drm/ast: Clear preserved bits from register output value",
                            "    - drm/amd: Check that VPE has reached DPM0 in idle handler",
                            "    - drm/amd/display: Fix incorrect return of vblank enable on unconfigured",
                            "      crtc",
                            "    - drm/amd/display: Don't program BLNDGAM_MEM_PWR_FORCE when CM low-power",
                            "      is disabled on DCN30",
                            "    - drm/amd/display: Add HDR workaround for a specific eDP",
                            "    - mptcp: leverage skb deferral free",
                            "    - mptcp: fix MSG_PEEK stream corruption",
                            "    - cpuidle: governors: menu: Rearrange main loop in menu_select()",
                            "    - cpuidle: governors: menu: Select polling state in some more cases",
                            "    - PM: hibernate: Combine return paths in power_down()",
                            "    - PM: sleep: Allow pm_restrict_gfp_mask() stacking",
                            "    - mfd: kempld: Switch back to earlier ->init() behavior",
                            "    - soc: aspeed: socinfo: Add AST27xx silicon IDs",
                            "    - firmware: qcom: scm: preserve assign_mem() error return value",
                            "    - soc: qcom: smem: Fix endian-unaware access of num_entries",
                            "    - spi: loopback-test: Don't use %pK through printk",
                            "    - spi: spi-qpic-snand: handle 'use_ecc' parameter of",
                            "      qcom_spi_config_cw_read()",
                            "    - soc: ti: pruss: don't use %pK through printk",
                            "    - bpf: Don't use %pK through printk",
                            "    - mmc: sdhci: Disable SD card clock before changing parameters",
                            "    - pinctrl: single: fix bias pull up/down handling in pin_config_set",
                            "    - mmc: host: renesas_sdhi: Fix the actual clock",
                            "    - memstick: Add timeout to prevent indefinite waiting",
                            "    - cpufreq: ti: Add support for AM62D2",
                            "    - bpf: Use tnums for JEQ/JNE is_branch_taken logic",
                            "    - firmware: ti_sci: Enable abort handling of entry to LPM",
                            "    - firewire: ohci: move self_id_complete tracepoint after validating",
                            "      register",
                            "    - irqchip/sifive-plic: Respect mask state when setting affinity",
                            "    - irqchip/loongson-eiointc: Route interrupt parsed from bios table",
                            "    - ACPI: sysfs: Use ACPI_FREE() for freeing an ACPI object",
                            "    - ACPI: video: force native for Lenovo 82K8",
                            "    - libbpf: Fix USDT SIB argument handling causing unrecognized register",
                            "      error",
                            "    - selftests/bpf: Fix bpf_prog_detach2 usage in test_lirc_mode2",
                            "    - arm64: versal-net: Update rtc calibration value",
                            "    - Revert \"UBUNTU: SAUCE: firmware: qcom: scm: Allow QSEECOM on Dell",
                            "      Inspiron 7441 / Latitude 7455\"",
                            "    - firmware: qcom: scm: Allow QSEECOM on Dell Inspiron 7441 / Latitude 7455",
                            "    - kselftest/arm64: tpidr2: Switch to waitpid() over wait4()",
                            "    - arc: Fix __fls() const-foldability via __builtin_clzl()",
                            "    - selftests/bpf: Upon failures, exit with code 1 in test_xsk.sh",
                            "    - irqchip/gic-v2m: Handle Multiple MSI base IRQ Alignment",
                            "    - ACPI: PRM: Skip handlers with NULL handler_address or NULL VA",
                            "    - ACPI: resource: Skip IRQ override on ASUS Vivobook Pro N6506CU",
                            "    - ACPI: scan: Add Intel CVS ACPI HIDs to acpi_ignore_dep_ids[]",
                            "    - thermal: gov_step_wise: Allow cooling level to be reduced earlier",
                            "    - thermal: intel: selftests: workload_hint: Mask unsupported types",
                            "    - power: supply: qcom_battmgr: add OOI chemistry",
                            "    - hwmon: (k10temp) Add thermal support for AMD Family 1Ah-based models",
                            "    - hwmon: (k10temp) Add device ID for Strix Halo",
                            "    - hwmon: (lenovo-ec-sensors) Update P8 supprt",
                            "    - hwmon: (sbtsi_temp) AMD CPU extended temperature range support",
                            "    - pinctrl: renesas: rzg2l: Add suspend/resume support for Schmitt control",
                            "      registers",
                            "    - pinctrl: keembay: release allocated memory in detach path",
                            "    - power: supply: sbs-charger: Support multiple devices",
                            "    - io_uring/rsrc: respect submitter_task in io_register_clone_buffers()",
                            "    - hwmon: sy7636a: add alias",
                            "    - selftests/bpf: Fix incorrect array size calculation",
                            "    - block: check for valid bio while splitting",
                            "    - irqchip/loongson-pch-lpc: Use legacy domain for PCH-LPC IRQ controller",
                            "    - cpufreq: ondemand: Update the efficient idle check for Intel extended",
                            "      Families",
                            "    - arm64: zynqmp: Disable coresight by default",
                            "    - arm64: zynqmp: Revert usb node drive strength and slew rate for zcu106",
                            "    - soc/tegra: fuse: Add Tegra114 nvmem cells and fuse lookups",
                            "    - ARM: tegra: p880: set correct touchscreen clipping",
                            "    - ARM: tegra: transformer-20: add missing magnetometer interrupt",
                            "    - ARM: tegra: transformer-20: fix audio-codec interrupt",
                            "    - firmware: qcom: tzmem: disable sc7180 platform",
                            "    - soc: ti: k3-socinfo: Add information for AM62L SR1.1",
                            "    - mmc: sdhci-msm: Enable tuning for SDR50 mode for SD card",
                            "    - pwm: pca9685: Use bulk write to atomicially update registers",
                            "    - ACPICA: dispatcher: Use acpi_ds_clear_operands() in",
                            "      acpi_ds_call_control_method()",
                            "    - tee: allow a driver to allocate a tee_device without a pool",
                            "    - kunit: Enable PCI on UML without triggering WARN()",
                            "    - selftests/bpf: Fix arena_spin_lock selftest failure",
                            "    - bpf: Do not limit bpf_cgroup_from_id to current's namespace",
                            "    - i3c: mipi-i3c-hci-pci: Add support for Intel Wildcat Lake-U I3C",
                            "    - rust: kunit: allow `cfg` on `test`s",
                            "    - video: backlight: lp855x_bl: Set correct EPROM start for LP8556",
                            "    - i3c: dw: Add shutdown support to dw_i3c_master driver",
                            "    - io_uring/zcrx: check all niovs filled with dma addresses",
                            "    - tools/cpupower: fix error return value in cpupower_write_sysfs()",
                            "    - io_uring/zcrx: account niov arrays to cgroup",
                            "    - pmdomain: apple: Add \"apple,t8103-pmgr-pwrstate\"",
                            "    - power: supply: qcom_battmgr: handle charging state change notifications",
                            "    - bpftool: Fix -Wuninitialized-const-pointer warnings with clang >= 21",
                            "    - cpuidle: Fail cpuidle device registration if there is one already",
                            "    - selftests/bpf: Fix selftest verifier_arena_large failure",
                            "    - selftests: ublk: fix behavior when fio is not installed",
                            "    - spi: rpc-if: Add resume support for RZ/G3E",
                            "    - ACPI: SPCR: Support Precise Baud Rate field",
                            "    - clocksource/drivers/vf-pit: Replace raw_readl/writel to readl/writel",
                            "    - clocksource/drivers/timer-rtl-otto: Work around dying timers",
                            "    - clocksource/drivers/timer-rtl-otto: Do not interfere with interrupts",
                            "    - riscv: bpf: Fix uninitialized symbol 'retval_off'",
                            "    - bpf: Clear pfmemalloc flag when freeing all fragments",
                            "    - selftests: drv-net: Pull data before parsing headers",
                            "    - nvme: Use non zero KATO for persistent discovery connections",
                            "    - uprobe: Do not emulate/sstep original instruction when ip is changed",
                            "    - hwmon: (asus-ec-sensors) increase timeout for locking ACPI mutex",
                            "    - hwmon: (dell-smm) Remove Dell Precision 490 custom config data",
                            "    - hwmon: (dell-smm) Add support for Dell OptiPlex 7040",
                            "    - tools/cpupower: Fix incorrect size in cpuidle_state_disable()",
                            "    - selftests/bpf: Fix flaky bpf_cookie selftest",
                            "    - tools/power turbostat: Fix incorrect sorting of PMT telemetry",
                            "    - tools/power x86_energy_perf_policy: Fix incorrect fopen mode usage",
                            "    - tools/power x86_energy_perf_policy: Enhance HWP enable",
                            "    - tools/power x86_energy_perf_policy: Prefer driver HWP limits",
                            "    - mfd: simple-mfd-i2c: Add compatible strings for Layerscape QIXIS FPGA",
                            "    - mfd: stmpe: Remove IRQ domain upon removal",
                            "    - mfd: stmpe-i2c: Add missing MODULE_LICENSE",
                            "    - mfd: qnap-mcu: Handle errors returned from qnap_mcu_write",
                            "    - mfd: qnap-mcu: Include linux/types.h in qnap-mcu.h shared header",
                            "    - mfd: madera: Work around false-positive -Wininitialized warning",
                            "    - mfd: da9063: Split chip variant reading in two bus transactions",
                            "    - mfd: macsmc: Add \"apple,t8103-smc\" compatible",
                            "    - mfd: core: Increment of_node's refcount before linking it to the",
                            "      platform device",
                            "    - mfd: cs42l43: Move IRQ enable/disable to encompass force suspend",
                            "    - mfd: intel-lpss: Add Intel Wildcat Lake LPSS PCI IDs",
                            "    - drm/xe/ptl: Apply Wa_16026007364",
                            "    - drm/xe/configfs: Enforce canonical device names",
                            "    - drm/amd/display: Update tiled to tiled copy command",
                            "    - drm/amd/display: fix condition for setting timing_adjust_pending",
                            "    - drm/amd/display: ensure committing streams is seamless",
                            "    - drm/amdgpu: add range check for RAS bad page address",
                            "    - drm/amdgpu: Check vcn sram load return value",
                            "    - drm/amd/display: Remove check DPIA HPD status for BW Allocation",
                            "    - drm/amd/display: Increase AUX Intra-Hop Done Max Wait Duration",
                            "    - drm/amd/display: Fix dmub_cmd header alignment",
                            "    - drm/xe/guc: Add more GuC load error status codes",
                            "    - drm/xe/pf: Don't resume device from restart worker",
                            "    - drm/amdgpu: Fix build error when CONFIG_SUSPEND is disabled",
                            "    - drm/amdgpu: Update IPID value for bad page threshold CPER",
                            "    - drm/amdgpu: Avoid rma causes GPU duplicate reset",
                            "    - drm/amdgpu: Effective health check before reset",
                            "    - drm/amd/amdgpu: Release xcp drm memory after unplug",
                            "    - drm/amdgpu: Fix vcn v5.0.1 poison irq call trace",
                            "    - drm/xe: Extend wa_13012615864 to additional Xe2 and Xe3 platforms",
                            "    - drm/amdgpu: Skip poison aca bank from UE channel",
                            "    - drm/amd/display: add more cyan skillfish devices",
                            "    - drm/amdgpu: Initialize jpeg v5_0_1 ras function",
                            "    - drm/amdgpu: skip mgpu fan boost for multi-vf",
                            "    - drm/amd/display: fix dmub access race condition",
                            "    - drm/amd/display: update dpp/disp clock from smu clock table",
                            "    - drm/amd/pm: Use cached metrics data on aldebaran",
                            "    - drm/amd/pm: Use cached metrics data on arcturus",
                            "    - accel/amdxdna: Unify pm and rpm suspend and resume callbacks",
                            "    - drm/amdgpu/jpeg: Hold pg_lock before jpeg poweroff",
                            "    - drm/xe/pf: Program LMTT directory pointer on all GTs within a tile",
                            "    - drm/nouveau: replace snprintf() with scnprintf() in nvkm_snprintbf()",
                            "    - ASoC: tas2781: Add keyword \"init\" in profile section",
                            "    - ASoC: mediatek: Use SND_JACK_AVOUT for HDMI/DP jacks",
                            "    - drm/amd/display: Reset apply_eamless_boot_optimization when dpms_off",
                            "    - drm/amdgpu: add to custom amdgpu_drm_release drm_dev_enter/exit",
                            "    - drm/amd/display: Wait until OTG enable state is cleared",
                            "    - drm/xe: rework PDE PAT index selection",
                            "    - docs: kernel-doc: avoid script crash on ancient Python",
                            "    - drm/sharp-memory: Do not access GEM-DMA vaddr directly",
                            "    - PCI: Disable MSI on RDC PCI to PCIe bridges",
                            "    - drm/nouveau: always set RMDevidCheckIgnore for GSP-RM",
                            "    - drm/panel-edp: Add SHP LQ134Z1 panel for Dell XPS 9345",
                            "    - selftests/net: Replace non-standard __WORDSIZE with sizeof(long) * 8",
                            "    - selftests/net: Ensure assert() triggers in psock_tpacket.c",
                            "    - wifi: rtw89: print just once for unknown C2H events",
                            "    - wifi: rtw88: sdio: use indirect IO for device registers before power-on",
                            "    - wifi: rtw89: add dummy C2H handlers for BCN resend and update done",
                            "    - drm/amdkfd: return -ENOTTY for unsupported IOCTLs",
                            "    - selftests: drv-net: devmem: add / correct the IPv6 support",
                            "    - selftests: drv-net: devmem: flip the direction of Tx tests",
                            "    - media: pci: ivtv: Don't create fake v4l2_fh",
                            "    - media: amphion: Delete v4l2_fh synchronously in .release()",
                            "    - drm/tidss: Use the crtc_* timings when programming the HW",
                            "    - drm/bridge: cdns-dsi: Fix REG_WAKEUP_TIME value",
                            "    - drm/bridge: cdns-dsi: Don't fail on MIPI_DSI_MODE_VIDEO_BURST",
                            "    - drm/tidss: Set crtc modesetting parameters with adjusted mode",
                            "    - drm/tidss: Remove early fb",
                            "    - RDMA/mana_ib: Drain send wrs of GSI QP",
                            "    - media: i2c: Kconfig: Ensure a dependency on HAVE_CLK for",
                            "      VIDEO_CAMERA_SENSOR",
                            "    - PCI/ERR: Update device error_state already after reset",
                            "    - x86/vsyscall: Do not require X86_PF_INSTR to emulate vsyscall",
                            "    - net: stmmac: Check stmmac_hw_setup() in stmmac_resume()",
                            "    - ice: Don't use %pK through printk or tracepoints",
                            "    - thunderbolt: Use is_pciehp instead of is_hotplug_bridge",
                            "    - ASoC: es8323: enable DAPM power widgets for playback DAC and output",
                            "    - powerpc/eeh: Use result of error_detected() in uevent",
                            "    - s390/pci: Use pci_uevent_ers() in PCI recovery",
                            "    - bridge: Redirect to backup port when port is administratively down",
                            "    - selftests: drv-net: wait for carrier",
                            "    - net: phy: mscc: report and configure in-band auto-negotiation for",
                            "      SGMII/QSGMII",
                            "    - scsi: ufs: host: mediatek: Fix auto-hibern8 timer configuration",
                            "    - scsi: ufs: host: mediatek: Fix PWM mode switch issue",
                            "    - scsi: ufs: host: mediatek: Assign power mode userdata before FASTAUTO",
                            "      mode change",
                            "    - scsi: ufs: host: mediatek: Change reset sequence for improved stability",
                            "    - scsi: ufs: host: mediatek: Fix invalid access in vccqx handling",
                            "    - gpu: nova-core: register: allow fields named `offset`",
                            "    - drm/panthor: Serialize GPU cache flush operations",
                            "    - HID: pidff: Use direction fix only for conditional effects",
                            "    - HID: pidff: PERMISSIVE_CONTROL quirk autodetection",
                            "    - drm/bridge: display-connector: don't set OP_DETECT for DisplayPorts",
                            "    - drm/amdkfd: Handle lack of READ permissions in SVM mapping",
                            "    - drm/amdgpu: refactor bad_page_work for corner case handling",
                            "    - hwrng: timeriomem - Use us_to_ktime() where appropriate",
                            "    - iio: adc: spear_adc: mask SPEAR_ADC_STATUS channel and avg sample before",
                            "      setting register",
                            "    - iio: adc: imx93_adc: load calibrated values even calibration failed",
                            "    - usb: gadget: f_ncm: Fix MAC assignment NCM ethernet",
                            "    - ASoC: es8323: remove DAC enablement write from es8323_probe",
                            "    - ASoC: es8323: add proper left/right mixer controls via DAPM",
                            "    - ASoC: codecs: wsa883x: Handle shared reset GPIO for WSA883x speakers",
                            "    - drm/xe: Make page size consistent in loop",
                            "    - wifi: rtw89: wow: remove notify during WoWLAN net-detect",
                            "    - wifi: rtw89: fix BSSID comparison for non-transmitted BSSID",
                            "    - wifi: rtw89: 8851b: rfk: update IQK TIA setting",
                            "    - dm error: mark as DM_TARGET_PASSES_INTEGRITY",
                            "    - char: misc: Make misc_register() reentry for miscdevice who wants",
                            "      dynamic minor",
                            "    - char: misc: Does not request module for miscdevice with dynamic minor",
                            "    - net: When removing nexthops, don't call synchronize_net if it is not",
                            "      necessary",
                            "    - net: Call trace_sock_exceed_buf_limit() for memcg failure with",
                            "      SK_MEM_RECV.",
                            "    - dmaengine: idxd: Add a new IAA device ID for Wildcat Lake family",
                            "      platforms",
                            "    - PCI/P2PDMA: Fix incorrect pointer usage in devm_kfree() call",
                            "    - bnxt_en: Add Hyper-V VF ID",
                            "    - tty: serial: Modify the use of dev_err_probe()",
                            "    - ALSA: usb-audio: Add validation of UAC2/UAC3 effect units",
                            "    - Octeontx2-af: Broadcast XON on all channels",
                            "    - idpf: do not linearize big TSO packets",
                            "    - drm/xe/pcode: Initialize data0 for pcode read routine",
                            "    - drm/panel: ilitek-ili9881c: turn off power-supply when init fails",
                            "    - drm/panel: ilitek-ili9881c: move display_on/_off dcs calls to",
                            "      (un-)prepare",
                            "    - rds: Fix endianness annotation for RDS_MPATH_HASH",
                            "    - net: wangxun: limit tx_max_coalesced_frames_irq",
                            "    - iio: imu: bmi270: Match PNP ID found on newer GPD firmware",
                            "    - media: ipu6: isys: Set embedded data type correctly for metadata formats",
                            "    - rpmsg: char: Export alias for RPMSG ID rpmsg-raw from table",
                            "    - net: ipv4: allow directed broadcast routes to use dst hint",
                            "    - scsi: mpi3mr: Fix device loss during enclosure reboot due to zero link",
                            "      speed",
                            "    - wifi: rtw89: coex: Limit Wi-Fi scan slot cost to avoid A2DP glitch",
                            "    - scsi: mpi3mr: Fix I/O failures during controller reset",
                            "    - scsi: mpi3mr: Fix controller init failure on fault during queue creation",
                            "    - scsi: pm80xx: Fix race condition caused by static variables",
                            "    - extcon: adc-jack: Fix wakeup source leaks on device unbind",
                            "    - extcon: fsa9480: Fix wakeup source leaks on device unbind",
                            "    - extcon: axp288: Fix wakeup source leaks on device unbind",
                            "    - drm/xe: Set GT as wedged before sending wedged uevent",
                            "    - remoteproc: wkup_m3: Use devm_pm_runtime_enable() helper",
                            "    - drm/xe/wcl: Extend L3bank mask workaround",
                            "    - net: phy: fixed_phy: let fixed_phy_unregister free the phy_device",
                            "    - selftests: drv-net: hds: restore hds settings",
                            "    - fuse: zero initialize inode private data",
                            "    - virtio_fs: fix the hash table using in virtio_fs_enqueue_req()",
                            "    - selftests: pci_endpoint: Skip IRQ test if IRQ is out of range.",
                            "    - drm/xe: Ensure GT is in C0 during resumes",
                            "    - misc: pci_endpoint_test: Skip IRQ tests if irq is out of range",
                            "    - drm/amdgpu: Correct the loss of aca bank reg info",
                            "    - drm/amdgpu: Correct the counts of nr_banks and nr_errors",
                            "    - drm/amdkfd: fix vram allocation failure for a special case",
                            "    - drm/amd/display: Support HW cursor 180 rot for any number of pipe splits",
                            "    - drm/amdkfd: Tie UNMAP_LATENCY to queue_preemption",
                            "    - drm/amd/display: wait for otg update pending latch before clock",
                            "      optimization",
                            "    - drm/amd/display: Consider sink max slice width limitation for dsc",
                            "    - drm/amdgpu/vpe: cancel delayed work in hw_fini",
                            "    - drm/xe: Cancel pending TLB inval workers on teardown",
                            "    - net: Prevent RPS table overwrite of active flows",
                            "    - eth: fbnic: Reset hw stats upon PCI error",
                            "    - wifi: iwlwifi: mld: trigger mlo scan only when not in EMLSR",
                            "    - platform/x86/intel-uncore-freq: Fix warning in partitioned system",
                            "    - drm/msm/dpu: Filter modes based on adjusted mode clock",
                            "    - drm/msm: Use of_reserved_mem_region_to_resource() for \"memory-region\"",
                            "    - selftests: drv-net: rss_ctx: fix the queue count check",
                            "    - media: fix uninitialized symbol warnings",
                            "    - media: pci: mgb4: Fix timings comparison in VIDIOC_S_DV_TIMINGS",
                            "    - ASoC: SOF: ipc4-pcm: Add fixup for channels",
                            "    - drm/amdgpu: Notify pmfw bad page threshold exceeded",
                            "    - drm/amd/display: Increase minimum clock for TMDS 420 with pipe splitting",
                            "    - drm/amdgpu: Avoid jpeg v5.0.1 poison irq call trace on sriov guest",
                            "    - drm/amd/display: incorrect conditions for failing dto calculations",
                            "    - drm/amdgpu: Avoid vcn v5.0.1 poison irq call trace on sriov guest",
                            "    - drm/amdgpu: Respect max pixel clock for HDMI and DVI-D (v2)",
                            "    - mips: lantiq: danube: add missing properties to cpu node",
                            "    - mips: lantiq: danube: add model to EASY50712 dts",
                            "    - mips: lantiq: danube: add missing device_type in pci node",
                            "    - mips: lantiq: xway: sysctrl: rename stp clock",
                            "    - mips: lantiq: danube: rename stp node on EASY50712 reference board",
                            "    - inet_diag: annotate data-races in inet_diag_bc_sk()",
                            "    - microchip: lan865x: add ndo_eth_ioctl handler to enable PHY ioctl",
                            "      support",
                            "    - crypto: qat - use kcalloc() in qat_uclo_map_objs_from_mof()",
                            "    - scsi: pm8001: Use int instead of u32 to store error codes",
                            "    - iio: adc: ad7124: do not require mclk",
                            "    - scsi: ufs: exynos: fsd: Gate ref_clk and put UFS device in reset on",
                            "      suspend",
                            "    - media: imx-mipi-csis: Only set clock rate when specified in DT",
                            "    - wifi: iwlwifi: pcie: remember when interrupts are disabled",
                            "    - drm/st7571-i2c: add support for inverted pixel format",
                            "    - ptp: Limit time setting of PTP clocks",
                            "    - dmaengine: sh: setup_xref error handling",
                            "    - dmaengine: mv_xor: match alloc_wc and free_wc",
                            "    - dmaengine: dw-edma: Set status for callback_result",
                            "    - netfilter: nf_tables: all transaction allocations can now sleep",
                            "    - drm/msm/dsi/phy: Toggle back buffer resync after preparing PLL",
                            "    - drm/msm/dsi/phy_7nm: Fix missing initial VCO rate",
                            "    - drm/amdgpu: Allow kfd CRIU with no buffer objects",
                            "    - drm/xe/guc: Increase GuC crash dump buffer size",
                            "    - drm/amd/pm: Increase SMC timeout on SI and warn (v3)",
                            "    - move_mount(2): take sanity checks in 'beneath' case into do_lock_mount()",
                            "    - selftests: drv-net: rss_ctx: make the test pass with few queues",
                            "    - ipv6: Add sanity checks on ipv6_devconf.rpl_seg_enabled",
                            "    - drm/xe: Extend Wa_22021007897 to Xe3 platforms",
                            "    - wifi: mac80211: count reg connection element in the size",
                            "    - drm/panthor: check bo offset alignment in vm bind",
                            "    - drm: panel-backlight-quirks: Make EDID match optional",
                            "    - ixgbe: reduce number of reads when getting OROM data",
                            "    - netlink: specs: fou: change local-v6/peer-v6 check",
                            "    - net: nfc: nci: Increase NCI_DATA_TIMEOUT to 3000 ms",
                            "    - media: adv7180: Add missing lock in suspend callback",
                            "    - media: adv7180: Do not write format to device in set_fmt",
                            "    - media: adv7180: Only validate format in querystd",
                            "    - media: verisilicon: Explicitly disable selection api ioctls for decoders",
                            "    - wifi: mac80211: Fix 6 GHz Band capabilities element advertisement in",
                            "      lower bands",
                            "    - platform/x86: think-lmi: Add extra TC BIOS error messages",
                            "    - platform/x86/intel-uncore-freq: Present unique domain ID per package",
                            "    - ALSA: usb-audio: apply quirk for MOONDROP Quark2",
                            "    - PCI: imx6: Enable the Vaux supply if available",
                            "    - drm/xe/guc: Set upper limit of H2G retries over CTB",
                            "    - net: call cond_resched() less often in __release_sock()",
                            "    - smsc911x: add second read of EEPROM mac when possible corruption seen",
                            "    - drm/xe: improve dma-resv handling for backup object",
                            "    - iommu/amd: Add support to remap/unmap IOMMU buffers for kdump",
                            "    - iommu/amd: Skip enabling command/event buffers for kdump",
                            "    - iommu/amd: Reuse device table for kdump",
                            "    - crypto: ccp: Skip SEV and SNP INIT for kdump boot",
                            "    - iommu/apple-dart: Clear stream error indicator bits for T8110 DARTs",
                            "    - bus: mhi: host: pci_generic: Add support for all Foxconn T99W696 SKU",
                            "      variants",
                            "    - drm/amdgpu: Correct info field of bad page threshold exceed CPER",
                            "    - drm/amd: add more cyan skillfish PCI ids",
                            "    - drm/amdgpu: don't enable SMU on cyan skillfish",
                            "    - drm/amdgpu: add support for cyan skillfish gpu_info",
                            "    - drm/amd/display: Fix pbn_div Calculation Error",
                            "    - drm/amd/display: dont wait for pipe update during medupdate/highirq",
                            "    - drm/amd/pm: refine amdgpu pm sysfs node error code",
                            "    - drm/amd/display: Indicate when custom brightness curves are in use",
                            "    - selftests: ncdevmem: don't retry EFAULT",
                            "    - net: dsa: felix: support phy-mode = \"10g-qxgmii\"",
                            "    - usb: gadget: f_hid: Fix zero length packet transfer",
                            "    - serial: qcom-geni: Add DFS clock mode support to GENI UART driver",
                            "    - serdev: Drop dev_pm_domain_detach() call",
                            "    - tty/vt: Add missing return value for VT_RESIZE in vt_ioctl()",
                            "    - eeprom: at25: support Cypress FRAMs without device ID",
                            "    - drm/msm/adreno: Add speedbins for A663 GPU",
                            "    - drm/msm: Fix 32b size truncation",
                            "    - dt-bindings: display/msm/gmu: Update Adreno 623 bindings",
                            "    - drm/msm: make sure to not queue up recovery more than once",
                            "    - char: Use list_del_init() in misc_deregister() to reinitialize list",
                            "      pointer",
                            "    - drm/msm/adreno: Add speedbin data for A623 GPU",
                            "    - drm/msm/adreno: Add fenced regwrite support",
                            "    - drm/msm/a6xx: Switch to GMU AO counter",
                            "    - idpf: link NAPIs to queues",
                            "    - selftests: net: make the dump test less sensitive to mem accounting",
                            "    - PCI: endpoint: pci-epf-test: Limit PCIe BAR size for fixed BARs",
                            "    - wifi: rtw89: Add USB ID 2001:332a for D-Link AX9U rev. A1",
                            "    - wifi: rtw89: Add USB ID 2001:3327 for D-Link AX18U rev. A1",
                            "    - wifi: iwlwifi: fw: Add ASUS to PPAG and TAS list",
                            "    - drm/xe/i2c: Enable bus mastering",
                            "    - media: ov08x40: Fix the horizontal flip control",
                            "    - media: i2c: og01a1b: Specify monochrome media bus format instead of",
                            "      Bayer",
                            "    - media: qcom: camss: csiphy-3ph: Add CSIPHY 2ph DPHY v2.0.1 init sequence",
                            "    - drm/bridge: write full Audio InfoFrame",
                            "    - drm/xe/guc: Always add CT disable action during second init step",
                            "    - f2fs: fix wrong layout information on 16KB page",
                            "    - selftests: mptcp: join: allow more time to send ADD_ADDR",
                            "    - scsi: ufs: host: mediatek: Enhance recovery on resume failure",
                            "    - scsi: ufs: ufs-qcom: Align programming sequence of Shared ICE for UFS",
                            "      controller v5",
                            "    - scsi: ufs: host: mediatek: Fix unbalanced IRQ enable issue",
                            "    - scsi: ufs: host: mediatek: Enhance recovery on hibernation exit failure",
                            "    - net: phy: marvell: Fix 88e1510 downshift counter errata",
                            "    - scsi: ufs: host: mediatek: Correct system PM flow",
                            "    - scsi: ufs: host: mediatek: Disable auto-hibern8 during power mode",
                            "      changes",
                            "    - scsi: ufs: host: mediatek: Fix adapt issue after PA_Init",
                            "    - wifi: cfg80211: update the time stamps in hidden ssid",
                            "    - wifi: mac80211: Fix HE capabilities element check",
                            "    - fbcon: Use screen info to find primary device",
                            "    - phy: cadence: cdns-dphy: Enable lower resolutions in dphy",
                            "    - Fix access to video_is_primary_device() when compiled without",
                            "      CONFIG_VIDEO",
                            "    - phy: renesas: r8a779f0-ether-serdes: add new step added to latest",
                            "      datasheet",
                            "    - phy: rockchip: phy-rockchip-inno-csidphy: allow writes to grf register 0",
                            "    - drm/msm/registers: Generate _HI/LO builders for reg64",
                            "    - net: sh_eth: Disable WoL if system can not suspend",
                            "    - selftests: net: replace sleeps in fcnal-test with waits",
                            "    - media: redrat3: use int type to store negative error codes",
                            "    - platform/x86/amd/pmf: Fix the custom bios input handling mechanism",
                            "    - selftests: traceroute: Use require_command()",
                            "    - selftests: traceroute: Return correct value on failure",
                            "    - openrisc: Add R_OR1K_32_PCREL relocation type module support",
                            "    - netfilter: nf_reject: don't reply to icmp error messages",
                            "    - x86/kvm: Prefer native qspinlock for dedicated vCPUs irrespective of",
                            "      PV_UNHALT",
                            "    - x86/virt/tdx: Use precalculated TDVPR page physical address",
                            "    - selftests: Disable dad for ipv6 in fcnal-test.sh",
                            "    - eth: 8139too: Make 8139TOO_PIO depend on !NO_IOPORT_MAP",
                            "    - [Config] No longer enable `CONFIG_8139TOO_PIO` for armhf",
                            "    - selftests: Replace sleep with slowwait",
                            "    - net: devmem: expose tcp_recvmsg_locked errors",
                            "    - selftests: net: lib.sh: Don't defer failed commands",
                            "    - HID: asus: add Z13 folio to generic group for multitouch to work",
                            "    - watchdog: s3c2410_wdt: Fix max_timeout being calculated larger",
                            "    - crypto: sun8i-ce - remove channel timeout field",
                            "    - PCI: dwc: Verify the single eDMA IRQ in dw_pcie_edma_irq_verify()",
                            "    - crypto: ccp - Fix incorrect payload size calculation in",
                            "      psp_poulate_hsti()",
                            "    - crypto: caam - double the entropy delay interval for retry",
                            "    - can: rcar_canfd: Update bit rate constants for RZ/G3E and R-Car Gen4",
                            "    - net: mana: Reduce waiting time if HWC not responding",
                            "    - ionic: use int type for err in ionic_get_module_eeprom_by_page",
                            "    - net/cls_cgroup: Fix task_get_classid() during qdisc run",
                            "    - wifi: mt76: mt7921: Add 160MHz beamformee capability for mt7922 device",
                            "    - wifi: mt76: mt7925: add pci restore for hibernate",
                            "    - wifi: mt76: mt7996: Fix mt7996_reverse_frag0_hdr_trans for MLO",
                            "    - wifi: mt76: mt7996: Set def_wcid pointer in mt7996_mac_sta_init_link()",
                            "    - wifi: mt76: mt7996: Temporarily disable EPCS",
                            "    - wifi: mt76: mt7996: support writing MAC TXD for AddBA Request",
                            "    - wifi: mt76: mt76_eeprom_override to int",
                            "    - ALSA: serial-generic: remove shared static buffer",
                            "    - wifi: mt76: mt7996: fix memory leak on mt7996_mcu_sta_key_tlv error",
                            "    - wifi: mt76: mt7996: disable promiscuous mode by default",
                            "    - wifi: mt76: use altx queue for offchannel tx on connac+",
                            "    - wifi: mt76: improve phy reset on hw restart",
                            "    - drm/amdgpu: Use memdup_array_user in amdgpu_cs_wait_fences_ioctl",
                            "    - drm/amdgpu: Release hive reference properly",
                            "    - drm/amd/display: Fix DMCUB loading sequence for DCN3.2",
                            "    - drm/amd/display: Set up pixel encoding for YCBCR422",
                            "    - drm/amd/display: fix dml ms order of operations",
                            "    - drm/amd/display: Don't use non-registered VUPDATE on DCE 6",
                            "    - drm/amd/display: Keep PLL0 running on DCE 6.0 and 6.4",
                            "    - drm/amd/display: Fix DVI-D/HDMI adapters",
                            "    - drm/amd/display: Disable VRR on DCE 6",
                            "    - drm/amd/display/dml2: Guard dml21_map_dc_state_into_dml_display_cfg with",
                            "      DC_FP_START",
                            "    - net: phy: clear EEE runtime state in PHY_HALTED/PHY_ERROR",
                            "    - ethernet: Extend device_get_mac_address() to use NVMEM",
                            "    - scsi: ufs: ufs-qcom: Disable lane clocks during phy hibern8",
                            "    - HID: i2c-hid: Resolve touchpad issues on Dell systems during S4",
                            "    - hinic3: Queue pair endianness improvements",
                            "    - hinic3: Fix missing napi->dev in netif_queue_set_napi",
                            "    - tools: ynl-gen: validate nested arrays",
                            "    - drm/xe/guc: Return an error code if the GuC load fails",
                            "    - drm/amdgpu: reject gang submissions under SRIOV",
                            "    - selftests/Makefile: include $(INSTALL_DEP_TARGETS) in clean target to",
                            "      clean net/lib dependency",
                            "    - scsi: ufs: core: Disable timestamp functionality if not supported",
                            "    - scsi: lpfc: Clean up allocated queues when queue setup mbox commands",
                            "      fail",
                            "    - scsi: lpfc: Decrement ndlp kref after FDISC retries exhausted",
                            "    - scsi: lpfc: Check return status of lpfc_reset_flush_io_context during",
                            "      TGT_RESET",
                            "    - scsi: lpfc: Remove ndlp kref decrement clause for F_Port_Ctrl in",
                            "      lpfc_cleanup",
                            "    - scsi: lpfc: Define size of debugfs entry for xri rebalancing",
                            "    - scsi: lpfc: Ensure PLOGI_ACC is sent prior to PRLI in Point to Point",
                            "      topology",
                            "    - allow finish_no_open(file, ERR_PTR(-E...))",
                            "    - usb: mon: Increase BUFF_MAX to 64 MiB to support multi-MB URBs",
                            "    - usb: xhci: plat: Facilitate using autosuspend for xhci plat devices",
                            "    - wifi: rtw89: disable RTW89_PHYSTS_IE09_FTR_0 for ppdu status",
                            "    - wifi: rtw89: obtain RX path from ppdu status IE00",
                            "    - wifi: rtw89: renew a completion for each H2C command waiting C2H event",
                            "    - usb: xhci-pci: add support for hosts with zero USB3 ports",
                            "    - ipv6: np->rxpmtu race annotation",
                            "    - RDMA/irdma: Update Kconfig",
                            "    - IB/ipoib: Ignore L3 master device",
                            "    - bnxt_en: Add fw log trace support for 5731X/5741X chips",
                            "    - mei: make a local copy of client uuid in connect",
                            "    - ASoC: qcom: sc8280xp: explicitly set S16LE format in",
                            "      sc8280xp_be_hw_params_fixup()",
                            "    - net: phy: clear link parameters on admin link down",
                            "    - net: ethernet: microchip: sparx5: make it selectable for ARCH_LAN969X",
                            "    - bus: mhi: core: Improve mhi_sync_power_up handling for SYS_ERR state",
                            "    - iommu/vt-d: Replace snprintf with scnprintf in dmar_latency_snapshot()",
                            "    - wifi: ath10k: Fix connection after GTK rekeying",
                            "    - iommu/vt-d: Remove LPIG from page group response descriptor",
                            "    - wifi: mac80211: Get the correct interface for non-netdev skb status",
                            "    - wifi: mac80211: Track NAN interface start/stop",
                            "    - net: intel: fm10k: Fix parameter idx set but not used",
                            "    - sparc/module: Add R_SPARC_UA64 relocation handling",
                            "    - sparc64: fix prototypes of reads[bwl]()",
                            "    - vfio: return -ENOTTY for unsupported device feature",
                            "    - ptp_ocp: make ptp_ocp driver compatible with PTP_EXTTS_REQUEST2",
                            "    - crypto: hisilicon/qm - invalidate queues in use",
                            "    - crypto: hisilicon/qm - clear all VF configurations in the hardware",
                            "    - ASoC: ops: improve snd_soc_get_volsw",
                            "    - PCI/PM: Skip resuming to D0 if device is disconnected",
                            "    - selftests: forwarding: Reorder (ar)ping arguments to obey POSIX getopt",
                            "    - remoteproc: qcom: q6v5: Avoid handling handover twice",
                            "    - wifi: ath12k: Increase DP_REO_CMD_RING_SIZE to 256",
                            "    - net: dsa: microchip: Set SPI as bus interface during reset for KSZ8463",
                            "    - bng_en: make bnge_alloc_ring() self-unwind on failure",
                            "    - ALSA: usb-audio: don't apply interface quirk to Presonus S1824c",
                            "    - tcp: Update bind bucket state on port release",
                            "    - ovl: make sure that ovl_create_real() returns a hashed dentry",
                            "    - drm/amd/display: Add missing post flip calls",
                            "    - drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream",
                            "    - drm/amd/display: Add fast sync field in ultra sleep more for DMUB",
                            "    - drm/amd/display: Init dispclk from bootup clock for DCN314",
                            "    - drm/amd/display: Fix for test crash due to power gating",
                            "    - drm/amd/display: change dc stream color settings only in atomic commit",
                            "    - NFSv4: handle ERR_GRACE on delegation recalls",
                            "    - NFSv4.1: fix mount hang after CREATE_SESSION failure",
                            "    - net: bridge: Install FDB for bridge MAC on VLAN 0",
                            "    - net: phy: dp83640: improve phydev and driver removal handling",
                            "    - scsi: ufs: core: Change MCQ interrupt enable flow",
                            "    - scsi: libfc: Fix potential buffer overflow in fc_ct_ms_fill()",
                            "    - accel/habanalabs/gaudi2: fix BMON disable configuration",
                            "    - scsi: mpt3sas: Add support for 22.5 Gbps SAS link rate",
                            "    - accel/habanalabs: return ENOMEM if less than requested pages were pinned",
                            "    - accel/habanalabs/gaudi2: read preboot status after recovering from dirty",
                            "      state",
                            "    - ASoC: renesas: msiof: add .symmetric_xxx on snd_soc_dai_driver",
                            "    - ASoC: renesas: msiof: use reset controller",
                            "    - ASoC: renesas: msiof: tidyup DMAC stop timing",
                            "    - ASoC: renesas: msiof: set SIFCTR register",
                            "    - ext4: increase IO priority of fastcommit",
                            "    - drm/amdgpu: Add fallback to pipe reset if KCQ ring reset fails",
                            "    - drm/amdgpu: Fix fence signaling race condition in userqueue",
                            "    - ASoC: stm32: sai: manage context in set_sysclk callback",
                            "    - ASoC: tlv320aic3x: Fix class-D initialization for tlv320aic3007",
                            "    - ACPI: scan: Update honor list for RPMI System MSI",
                            "    - platform/x86: x86-android-tablets: Stop using EPROBE_DEFER",
                            "    - vfio/pci: Fix INTx handling on legacy non-PCI 2.3 devices",
                            "    - vfio/nvgrace-gpu: Add GB300 SKU to the devid table",
                            "    - selftest: net: Fix error message if empty variable",
                            "    - net/mlx5e: Don't query FEC statistics when FEC is disabled",
                            "    - Bluetooth: btintel: Add support for BlazarIW core",
                            "    - net: macb: avoid dealing with endianness in macb_set_hwaddr()",
                            "    - Bluetooth: btusb: Add new VID/PID 13d3/3627 for MT7925",
                            "    - Bluetooth: btintel_pcie: Define hdev->wakeup() callback",
                            "    - Bluetooth: ISO: Don't initiate CIS connections if there are no buffers",
                            "    - Bluetooth: btusb: Check for unexpected bytes when defragmenting HCI",
                            "      frames",
                            "    - Bluetooth: ISO: Use sk_sndtimeo as conn_timeout",
                            "    - Bluetooth: btusb: Add new VID/PID 13d3/3633 for MT7922",
                            "    - net: stmmac: est: Drop frames causing HLBS error",
                            "    - exfat: limit log print for IO error",
                            "    - 6pack: drop redundant locking and refcounting",
                            "    - page_pool: Clamp pool size to max 16K pages",
                            "    - net/mlx5e: Prevent entering switchdev mode with inconsistent netns",
                            "    - ksmbd: use sock_create_kern interface to create kernel socket",
                            "    - smb: client: update cfid->last_access_time in",
                            "      open_cached_dir_by_dentry()",
                            "    - smb: client: transport: avoid reconnects triggered by pending task work",
                            "    - usb: xhci-pci: Fix USB2-only root hub registration",
                            "    - drm/amd/display: Add fallback path for YCBCR422",
                            "    - ACPICA: Update dsmethod.c to get rid of unused variable warning",
                            "    - RDMA/bnxt_re: Fix a potential memory leak in destroy_gsi_sqp",
                            "    - RDMA/irdma: Fix SD index calculation",
                            "    - RDMA/irdma: Remove unused struct irdma_cq fields",
                            "    - RDMA/irdma: Set irdma_cq cq_num field during CQ create",
                            "    - RDMA/uverbs: Fix umem release in UVERBS_METHOD_CQ_CREATE",
                            "    - RDMA/hns: Fix recv CQ and QP cache affinity",
                            "    - RDMA/hns: Fix the modification of max_send_sge",
                            "    - RDMA/hns: Fix wrong WQE data when QP wraps around",
                            "    - btrfs: mark dirty extent range for out of bound prealloc extents",
                            "    - clk: qcom: gcc-ipq6018: rework nss_port5 clock to multiple conf",
                            "    - clk: renesas: rzv2h: Re-assert reset on deassert timeout",
                            "    - clk: samsung: exynos990: Add missing USB clock registers to HSI0",
                            "    - fs/hpfs: Fix error code for new_inode() failure in",
                            "      mkdir/create/mknod/symlink",
                            "    - clocksource: hyper-v: Skip unnecessary checks for the root partition",
                            "    - hyperv: Add missing field to hv_output_map_device_interrupt",
                            "    - um: Fix help message for ssl-non-raw",
                            "    - clk: sunxi-ng: sun6i-rtc: Add A523 specifics",
                            "    - rtc: pcf2127: clear minute/second interrupt",
                            "    - ARM: at91: pm: save and restore ACR during PLL disable/enable",
                            "    - clk: at91: add ACR in all PLL settings",
                            "    - clk: at91: sam9x7: Add peripheral clock id for pmecc",
                            "    - clk: at91: clk-master: Add check for divide by 3",
                            "    - clk: at91: clk-sam9x60-pll: force write to PLL_UPDT register",
                            "    - clk: ti: am33xx: keep WKUP_DEBUGSS_CLKCTRL enabled",
                            "    - clk: scmi: Add duty cycle ops only when duty cycle is supported",
                            "    - clk: clocking-wizard: Fix output clock register offset for Versal",
                            "      platforms",
                            "    - NTB: epf: Allow arbitrary BAR mapping",
                            "    - 9p: fix /sys/fs/9p/caches overwriting itself",
                            "    - cpufreq: tegra186: Initialize all cores to max frequencies",
                            "    - 9p: sysfs_init: don't hardcode error to ENOMEM",
                            "    - scsi: ufs: core: Include UTP error in INT_FATAL_ERRORS",
                            "    - fbdev: core: Fix ubsan warning in pixel_to_pat",
                            "    - ACPI: property: Return present device nodes only on fwnode interface",
                            "    - LoongArch: Handle new atomic instructions for probes",
                            "    - tools bitmap: Add missing asm-generic/bitsperlong.h include",
                            "    - tools: lib: thermal: don't preserve owner in install",
                            "    - tools: lib: thermal: use pkg-config to locate libnl3",
                            "    - ALSA: hda/realtek: Add quirk for ASUS ROG Zephyrus Duo",
                            "    - rtc: zynqmp: Restore alarm functionality after kexec transition",
                            "    - rtc: pcf2127: fix watchdog interrupt mask on pcf2131",
                            "    - net: wwan: t7xx: add support for HP DRMR-H01",
                            "    - kbuild: uapi: Strip comments before size type check",
                            "    - ASoC: meson: aiu-encoder-i2s: fix bit clock polarity",
                            "    - ASoC: rt722: add settings for rt722VB",
                            "    - drm/amdgpu: Report individual reset error",
                            "    - ceph: add checking of wait_for_completion_killable() return value",
                            "    - ceph: fix potential race condition in ceph_ioctl_lazyio()",
                            "    - ceph: refactor wake_up_bit() pattern of calling",
                            "    - x86: uaccess: don't use runtime-const rewriting in modules",
                            "    - rust: condvar: fix broken intra-doc link",
                            "    - rust: devres: fix private intra-doc link",
                            "    - rust: kbuild: workaround `rustdoc` doctests modifier bug",
                            "    - rust: kbuild: treat `build_error` and `rustdoc` as kernel objects",
                            "    - media: uvcvideo: Use heuristic to find stream entity",
                            "    - Revert \"wifi: ath10k: avoid unnecessary wait for service ready message\"",
                            "    - tracing: tprobe-events: Fix to register tracepoint correctly",
                            "    - tracing: tprobe-events: Fix to put tracepoint_user when disable the",
                            "      tprobe",
                            "    - net: libwx: fix device bus LAN ID",
                            "    - scsi: ufs: core: Fix a race condition related to the \"hid\" attribute",
                            "      group",
                            "    - riscv: ptdump: use seq_puts() in pt_dump_seq_puts() macro",
                            "    - Revert \"wifi: ath12k: Fix missing station power save configuration\"",
                            "    - scsi: ufs: core: Revert \"Make HID attributes visible\"",
                            "    - Bluetooth: btrtl: Fix memory leak in rtlbt_parse_firmware_v2()",
                            "    - net: dsa: tag_brcm: legacy: fix untagged rx on unbridged ports for",
                            "      bcm63xx",
                            "    - selftests/net: fix out-of-order delivery of FIN in gro:tcp test",
                            "    - selftests/net: use destination options instead of hop-by-hop",
                            "    - selftests: netdevsim: Fix ethtool-coalesce.sh fail by installing",
                            "      ethtool-common.sh",
                            "    - net: vlan: sync VLAN features with lower device",
                            "    - net: dsa: b53: fix resetting speed and pause on forced link",
                            "    - net: dsa: b53: fix bcm63xx RGMII port link adjustment",
                            "    - net: dsa: b53: fix enabling ip multicast",
                            "    - net: dsa: b53: stop reading ARL entries if search is done",
                            "    - net: dsa: b53: properly bound ARL searches for < 4 ARL bin chips",
                            "    - sctp: Hold RCU read lock while iterating over address list",
                            "    - sctp: Hold sock lock while iterating over address list",
                            "    - net: ionic: add dma_wmb() before ringing TX doorbell",
                            "    - net: ionic: map SKB after pseudo-header checksum prep",
                            "    - octeontx2-pf: Fix devm_kcalloc() error checking",
                            "    - bnxt_en: Fix a possible memory leak in bnxt_ptp_init",
                            "    - bnxt_en: Always provide max entry and entry size in coredump segments",
                            "    - bnxt_en: Fix warning in bnxt_dl_reload_down()",
                            "    - wifi: mac80211_hwsim: Limit destroy_on_close radio removal to netgroup",
                            "    - io_uring: fix types for region size calulation",
                            "    - net/mlx5e: Fix return value in case of module EEPROM read error",
                            "    - net: ti: icssg-prueth: Fix fdb hash size configuration",
                            "    - net/mlx5e: SHAMPO, Fix header mapping for 64K pages",
                            "    - net/mlx5e: SHAMPO, Fix skb size check for 64K pages",
                            "    - net/mlx5e: SHAMPO, Fix header formulas for higher MTUs and 64K pages",
                            "    - net: wan: framer: pef2256: Switch to devm_mfd_add_devices()",
                            "    - net: dsa: microchip: Fix reserved multicast address table programming",
                            "    - net: bridge: fix MST static key usage",
                            "    - selftests/vsock: avoid false-positives when checking dmesg",
                            "    - tracing: Fix memory leaks in create_field_var()",
                            "    - drm/amd/display: Enable mst when it's detected but yet to be initialized",
                            "    - wifi: cfg80211: add an hrtimer based delayed work item",
                            "    - wifi: mac80211: use wiphy_hrtimer_work for ml_reconf_work",
                            "    - wifi: mac80211: use wiphy_hrtimer_work for ttlm_work",
                            "    - wifi: mac80211: use wiphy_hrtimer_work for csa.switch_work",
                            "    - riscv: Fix memory leak in module_frob_arch_sections()",
                            "    - rtc: rx8025: fix incorrect register reference",
                            "    - x86/microcode/AMD: Add more known models to entry sign checking",
                            "    - smb: client: validate change notify buffer before copy",
                            "    - x86/amd_node: Fix AMD root device caching",
                            "    - xfs: fix delalloc write failures in software-provided atomic writes",
                            "    - xfs: fix various problems in xfs_atomic_write_cow_iomap_begin",
                            "    - x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode",
                            "    - drm: define NVIDIA DRM format modifiers for GB20x",
                            "    - drm/nouveau: Advertise correct modifiers on GB20x",
                            "    - drm/amdgpu/smu: Handle S0ix for vangogh",
                            "    - drm/amdkfd: Don't clear PT after process killed",
                            "    - virtio_net: fix alignment for virtio_net_hdr_v1_hash",
                            "    - lib/crypto: curve25519-hacl64: Fix older clang KASAN workaround for GCC",
                            "    - scsi: ufs: ufs-pci: Fix S0ix/S3 for Intel controllers",
                            "    - scsi: ufs: ufs-pci: Set UFSHCD_QUIRK_PERFORM_LINK_STARTUP_ONCE for Intel",
                            "      ADL",
                            "    - scsi: ufs: core: Add a quirk to suppress link_startup_again",
                            "    - drm/amd/display: update color on atomic commit time",
                            "    - extcon: adc-jack: Cleanup wakeup source only if it was enabled",
                            "    - kunit: Extend kconfig help text for KUNIT_UML_PCI",
                            "    - ALSA: hda/tas2781: Enable init_profile_id for device initialization",
                            "    - ACPI: SPCR: Check for table version when using precise baudrate",
                            "    - kbuild: Strip trailing padding bytes from modules.builtin.modinfo",
                            "    - drm/amdgpu: Fix unintended error log in VCN5_0_0",
                            "    - drm/amd/display: Fix vupdate_offload_work doc",
                            "    - drm/amdgpu: Fix function header names in amdgpu_connectors.c",
                            "    - drm/amdgpu/userq: assign an error code for invalid userq va",
                            "    - drm/msm/dpu: Fix adjusted mode clock check for 3d merge",
                            "    - drm/amd/display: Reject modes with too high pixel clock on DCE6-10",
                            "    - drm/amd/display: use GFP_NOWAIT for allocation in interrupt handler",
                            "    - drm/amd/display: Fix black screen with HDMI outputs",
                            "    - selftests: drv-net: Reload pkt pointer after calling filter_udphdr",
                            "    - dt-bindings: eeprom: at25: use \"size\" for FRAMs without device ID",
                            "    - Linux 6.17.8",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68316",
                            "    - scsi: ufs: core: Fix invalid probe error return value",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40292",
                            "    - virtio-net: fix received length check in big packets",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68180",
                            "    - drm/amd/display: Fix NULL deref in debugfs odm_combine_segments",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40327",
                            "    - perf/core: Fix system hang caused by cpu-clock usage",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40328",
                            "    - smb: client: fix potential UAF in smb2_close_cached_fid()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40291",
                            "    - io_uring: fix regbuf vector size truncation",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68322",
                            "    - parisc: Avoid crash due to unaligned access in unwinder",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40293",
                            "    - iommufd: Don't overflow during division for dirty tracking",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40294",
                            "    - Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40329",
                            "    - drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40295",
                            "    - fscrypt: fix left shift underflow when inode->i_blkbits > PAGE_SHIFT",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40296",
                            "    - platform/x86: int3472: Fix double free of GPIO device during unregister",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40297",
                            "    - net: bridge: fix use-after-free due to MST port state bypass",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68320",
                            "    - lan966x: Fix sleeping in atomic context",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68169",
                            "    - netpoll: Fix deadlock in memory allocation under spinlock",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68197",
                            "    - bnxt_en: Fix null pointer dereference in bnxt_bs_trace_check_wrap()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40330",
                            "    - bnxt_en: Shutdown FW DMA in bnxt_shutdown()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68192",
                            "    - net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40331",
                            "    - sctp: Prevent TOCTOU out-of-bounds write",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68187",
                            "    - net: mdio: Check regmap pointer returned by device_node_to_regmap()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68167",
                            "    - gpiolib: fix invalid pointer access in debugfs",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68319",
                            "    - netconsole: Acquire su_mutex before navigating configs hierarchy",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40298",
                            "    - gve: Implement settime64 with -EOPNOTSUPP",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40299",
                            "    - gve: Implement gettimex64 with -EOPNOTSUPP",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40301",
                            "    - Bluetooth: hci_event: validate skb length for unknown CC opcode",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40358",
                            "    - riscv: stacktrace: Disable KASAN checks for non-current tasks",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68186",
                            "    - ring-buffer: Do not warn in ring_buffer_map_get_reader() when reader",
                            "      catches up",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68184",
                            "    - drm/mediatek: Disable AFBC support on Mediatek DRM driver",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40302",
                            "    - media: videobuf2: forbid remove_bufs when legacy fileio is active",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40303",
                            "    - btrfs: ensure no dirty metadata is written back for an fs with errors",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40362",
                            "    - ceph: fix multifs mds auth caps issue",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40332",
                            "    - drm/amdkfd: Fix mmap write lock not release",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40304",
                            "    - fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40305",
                            "    - 9p/trans_fd: p9_fd_request: kick rx thread if EPOLLIN",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68318",
                            "    - clk: thead: th1520-ap: set all AXI clocks to CLK_IS_CRITICAL",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40209",
                            "    - btrfs: fix memory leak of qgroup_list in btrfs_add_qgroup_relation",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68183",
                            "    - ima: don't clear IMA_DIGSIG flag when setting or removing non-IMA xattr",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68173",
                            "    - ftrace: Fix softlockup in ftrace_module_enable",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40306",
                            "    - orangefs: fix xattr related buffer overflow...",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40307",
                            "    - exfat: validate cluster allocation bits of the allocation bitmap",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40308",
                            "    - Bluetooth: bcsp: receive data only if registered",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40309",
                            "    - Bluetooth: SCO: Fix UAF on sco_conn_free",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68174",
                            "    - amd/amdkfd: enhance kfd process check in switch partition",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40310",
                            "    - amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40361",
                            "    - fs: ext4: change GFP_KERNEL to GFP_NOFS to avoid deadlock",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40311",
                            "    - accel/habanalabs: support mapping cb with vmalloc-backed coherent memory",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68185",
                            "    - nfs4_setup_readdir(): insufficient locking for ->d_parent->d_inode",
                            "      dereferencing",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68176",
                            "    - PCI: cadence: Check for the existence of cdns_pcie::ops before using it",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68190",
                            "    - drm/amdgpu/atom: Check kcalloc() for WS buffer in",
                            "      amdgpu_atom_execute_table_locked()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68168",
                            "    - jfs: fix uninitialized waitqueue in transaction manager",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40312",
                            "    - jfs: Verify inode mode when loading from disk",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40333",
                            "    - f2fs: fix infinite loop in __insert_extent_tree()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68321",
                            "    - page_pool: always add GFP_NOWARN for ATOMIC allocations",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40334",
                            "    - drm/amdgpu: validate userq buffer virtual address and size",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68191",
                            "    - udp_tunnel: use netdev_warn() instead of netdev_WARN()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68309",
                            "    - PCI/AER: Fix NULL pointer access by aer_info",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40313",
                            "    - ntfs3: pretend $Extend records as regular files",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40335",
                            "    - drm/amdgpu: validate userq input args",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40314",
                            "    - usb: cdns3: gadget: Use-after-free during failed initialization and exit",
                            "      of cdnsp gadget",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40336",
                            "    - drm/gpusvm: fix hmm_pfn_to_map_order() usage",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68193",
                            "    - drm/xe/guc: Add devm release action to safely tear down CT",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68175",
                            "    - media: nxp: imx8-isi: Fix streaming cleanup on release",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68188",
                            "    - tcp: use dst_dev_rcu() in tcp_fastopen_active_disable_ofo_check()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68315",
                            "    - f2fs: fix to detect potential corrupted nid in free_nid_list",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40337",
                            "    - net: stmmac: Correctly handle Rx checksum offload errors",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40338",
                            "    - ASoC: Intel: avs: Do not share the name pointer between components",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40339",
                            "    - drm/amdgpu: fix nullptr err of vm_handle_moved",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68194",
                            "    - media: imon: make send_packet() more robust",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40363",
                            "    - net: ipv6: fix field-spanning memcpy warning in AH output",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68311",
                            "    - tty: serial: ip22zilog: Use platform device for probing",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40340",
                            "    - drm/xe: Fix oops in xe_gem_fault when running core_hotunplug test.",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68196",
                            "    - drm/amd/display: Cache streams targeting link when performing LT",
                            "      automation",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68178",
                            "    - blk-cgroup: fix possible deadlock while configuring policy",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40341",
                            "    - futex: Don't leak robust_list pointer on exec race",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40342",
                            "    - nvme-fc: use lock accessing port_state and rport state",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40343",
                            "    - nvmet-fc: avoid scheduling association deletion twice",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68177",
                            "    - cpufreq/longhaul: handle NULL policy in longhaul_exit",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68317",
                            "    - io_uring/zctx: check chained notif contexts",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40315",
                            "    - usb: gadget: f_fs: Fix epfile null pointer access after ep enable.",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40316",
                            "    - drm/mediatek: Fix device use-after-free on unbind",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40360",
                            "    - drm/sysfb: Do not dereference NULL pointer in plane reset",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68179",
                            "    - s390: Disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68310",
                            "    - s390/pci: Avoid deadlock between PCI error recovery and mlx5 crdump",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40317",
                            "    - regmap: slimbus: fix bus_context pointer in regmap init calls",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40359",
                            "    - perf/x86/intel: Fix KASAN global-out-of-bounds warning",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68181",
                            "    - drm/radeon: Remove calls to drm_put_dev()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68170",
                            "    - drm/radeon: Do not kfree() devres managed rdev",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40213",
                            "    - Bluetooth: MGMT: fix crash in set_mesh_sync and set_mesh_complete",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40318",
                            "    - Bluetooth: hci_sync: fix race in hci_cmd_sync_dequeue_once",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68312",
                            "    - usbnet: Prevents free active kevent",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40344",
                            "    - ASoC: Intel: avs: Disable periods-elapsed work when closing PCM",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68172",
                            "    - crypto: aspeed - fix double free caused by devm",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40319",
                            "    - bpf: Sync pending IRQ work before freeing ring buffer",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68182",
                            "    - wifi: iwlwifi: fix potential use after free in iwl_mld_remove_link()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68314",
                            "    - drm/msm: make sure last_fence is always updated",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68189",
                            "    - drm/msm: Fix GEM free for imported dma-bufs",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68171",
                            "    - x86/fpu: Ensure XFD state on signal delivery",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68313",
                            "    - x86/CPU/AMD: Add RDSEED fix for Zen5",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40320",
                            "    - smb: client: fix potential cfid UAF in smb2_query_info_compound",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40321",
                            "    - wifi: brcmfmac: fix crash while sending Action Frames in standalone AP",
                            "      Mode",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40322",
                            "    - fbdev: bitblit: bound-check glyph index in bit_putcs*",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40211",
                            "    - ACPI: video: Fix use-after-free in acpi_video_switch_brightness()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40323",
                            "    - fbcon: Set fb_display[i]->mode to NULL when the mode is released",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40210",
                            "    - Revert \"NFSD: Remove the cap on number of operations per NFSv4 COMPOUND\"",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40324",
                            "    - NFSD: Fix crash in nfsd4_read_release()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40326",
                            "    - NFSD: Define actions for the new time_deleg FATTR4 attributes",
                            "  * Questing update: v6.17.7 upstream stable release (LP: #2136813)",
                            "    - sched_ext: Move internal type and accessor definitions to ext_internal.h",
                            "    - sched_ext: Put event_stats_cpu in struct scx_sched_pcpu",
                            "    - sched_ext: Sync error_irq_work before freeing scx_sched",
                            "    - timekeeping: Fix aux clocks sysfs initialization loop bound",
                            "    - x86/bugs: Report correct retbleed mitigation status",
                            "    - x86/bugs: Qualify RETBLEED_INTEL_MSG",
                            "    - genirq/chip: Add buslock back in to irq_set_handler()",
                            "    - genirq/manage: Add buslock back in to __disable_irq_nosync()",
                            "    - genirq/manage: Add buslock back in to enable_irq()",
                            "    - audit: record fanotify event regardless of presence of rules",
                            "    - EDAC/ie31200: Add two more Intel Alder Lake-S SoCs for EDAC support",
                            "    - perf/x86/intel: Add ICL_FIXED_0_ADAPTIVE bit into INTEL_FIXED_BITS_MASK",
                            "    - perf: Use current->flags & PF_KTHREAD|PF_USER_WORKER instead of",
                            "      current->mm == NULL",
                            "    - perf: Have get_perf_callchain() return NULL if crosstask and user are",
                            "      set",
                            "    - perf: Skip user unwind if the task is a kernel thread",
                            "    - EDAC: Fix wrong executable file modes for C source files",
                            "    - seccomp: passthrough uprobe systemcall without filtering",
                            "    - sched_ext: Keep bypass on between enable failure and",
                            "      scx_disable_workfn()",
                            "    - x86/bugs: Add attack vector controls for VMSCAPE",
                            "    - x86/bugs: Fix reporting of LFENCE retpoline",
                            "    - EDAC/mc_sysfs: Increase legacy channel support to 16",
                            "    - cpuset: Use new excpus for nocpu error check when enabling root",
                            "      partition",
                            "    - btrfs: abort transaction on specific error places when walking log tree",
                            "    - btrfs: abort transaction in the process_one_buffer() log tree walk",
                            "      callback",
                            "    - btrfs: zoned: return error from btrfs_zone_finish_endio()",
                            "    - btrfs: zoned: refine extent allocator hint selection",
                            "    - btrfs: scrub: replace max_t()/min_t() with clamp() in",
                            "      scrub_throttle_dev_io()",
                            "    - btrfs: always drop log root tree reference in btrfs_replay_log()",
                            "    - btrfs: use level argument in log tree walk callback replay_one_buffer()",
                            "    - btrfs: abort transaction if we fail to update inode in log replay dir",
                            "      fixup",
                            "    - btrfs: tree-checker: add inode extref checks",
                            "    - btrfs: use smp_mb__after_atomic() when forcing COW in",
                            "      create_pending_snapshot()",
                            "    - sched_ext: Make qmap dump operation non-destructive",
                            "    - arch: Add the macro COMPILE_OFFSETS to all the asm-offsets.c",
                            "    - btrfs: tree-checker: fix bounds check in check_inode_extref()",
                            "    - Linux 6.17.7",
                            "  * [UBUNTU 24.04] KVM: s390: improve interrupt cpu for wakeup (LP: #2132317)",
                            "    - KVM: s390: improve interrupt cpu for wakeup",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982)",
                            "    - sched/fair: Block delayed tasks on throttled hierarchy during dequeue",
                            "    - vfio/cdx: update driver to build without CONFIG_GENERIC_MSI_IRQ",
                            "    - expfs: Fix exportfs_can_encode_fh() for EXPORT_FH_FID",
                            "    - cgroup/misc: fix misc_res_type kernel-doc warning",
                            "    - dlm: move to rinfo for all middle conversion cases",
                            "    - exec: Fix incorrect type for ret",
                            "    - s390/pkey: Forward keygenflags to ep11_unwrapkey",
                            "    - hfs: clear offset and space out of valid records in b-tree node",
                            "    - hfs: make proper initalization of struct hfs_find_data",
                            "    - hfs: validate record offset in hfsplus_bmap_alloc",
                            "    - hfsplus: fix KMSAN uninit-value issue in hfsplus_delete_cat()",
                            "    - dlm: check for defined force value in dlm_lockspace_release",
                            "    - hfsplus: return EIO when type of hidden directory mismatch in",
                            "      hfsplus_fill_super()",
                            "    - PCI: Test for bit underflow in pcie_set_readrq()",
                            "    - lkdtm: fortify: Fix potential NULL dereference on kmalloc failure",
                            "    - arm64: sysreg: Correct sign definitions for EIESB and DoubleLock",
                            "    - m68k: bitops: Fix find_*_bit() signatures",
                            "    - powerpc/32: Remove PAGE_KERNEL_TEXT to fix startup failure",
                            "    - riscv: mm: Return intended SATP mode for noXlvl options",
                            "    - riscv: mm: Use mmu-type from FDT to limit SATP mode",
                            "    - riscv: cpufeature: add validation for zfa, zfh and zfhmin",
                            "    - drivers/perf: hisi: Relax the event ID check in the framework",
                            "    - s390/mm: Use __GFP_ACCOUNT for user page table allocations",
                            "    - smb: client: queue post_recv_credits_work also if the peer raises the",
                            "      credit target",
                            "    - smb: client: limit the range of info->receive_credit_target",
                            "    - smb: client: make use of ib_wc_status_msg() and skip IB_WC_WR_FLUSH_ERR",
                            "      logging",
                            "    - smb: server: let smb_direct_flush_send_list() invalidate a remote key",
                            "      first",
                            "    - Unbreak 'make tools/*' for user-space targets",
                            "    - platform/mellanox: mlxbf-pmc: add sysfs_attr_init() to count_clock init",
                            "    - cpufreq/amd-pstate: Fix a regression leading to EPP 0 after hibernate",
                            "    - net/mlx5e: Return 1 instead of 0 in invalid case in",
                            "      mlx5e_mpwrq_umr_entry_size()",
                            "    - rtnetlink: Allow deleting FDB entries in user namespace",
                            "    - net: enetc: fix the deadlock of enetc_mdio_lock",
                            "    - net: enetc: correct the value of ENETC_RXB_TRUESIZE",
                            "    - dpaa2-eth: fix the pointer passed to PTR_ALIGN on Tx path",
                            "    - net: phy: realtek: fix rtl8221b-vm-cg name",
                            "    - can: bxcan: bxcan_start_xmit(): use can_dev_dropped_skb() instead of",
                            "      can_dropped_invalid_skb()",
                            "    - can: esd: acc_start_xmit(): use can_dev_dropped_skb() instead of",
                            "      can_dropped_invalid_skb()",
                            "    - can: rockchip-canfd: rkcanfd_start_xmit(): use can_dev_dropped_skb()",
                            "      instead of can_dropped_invalid_skb()",
                            "    - selftests: net: fix server bind failure in sctp_vrf.sh",
                            "    - net/mlx5e: RX, Fix generating skb from non-linear xdp_buff for legacy RQ",
                            "    - net/mlx5e: RX, Fix generating skb from non-linear xdp_buff for striding",
                            "      RQ",
                            "    - net/smc: fix general protection fault in __smc_diag_dump",
                            "    - net: ethernet: ti: am65-cpts: fix timestamp loss due to race conditions",
                            "    - arm64, mm: avoid always making PTE dirty in pte_mkwrite()",
                            "    - erofs: avoid infinite loops due to corrupted subpage compact indexes",
                            "    - net: hibmcge: select FIXED_PHY",
                            "    - ptp: ocp: Fix typo using index 1 instead of i in SMA initialization loop",
                            "    - net: hsr: prevent creation of HSR device with slaves from another netns",
                            "    - espintcp: use datagram_poll_queue for socket readiness",
                            "    - net: datagram: introduce datagram_poll_queue for custom receive queues",
                            "    - ovpn: use datagram_poll_queue for socket readiness in TCP",
                            "    - net: bonding: fix possible peer notify event loss or dup issue",
                            "    - hung_task: fix warnings caused by unaligned lock pointers",
                            "    - mm: don't spin in add_stack_record when gfp flags don't allow",
                            "    - dma-debug: don't report false positives with",
                            "      DMA_BOUNCE_UNALIGNED_KMALLOC",
                            "    - arch_topology: Fix incorrect error check in",
                            "      topology_parse_cpu_capacity()",
                            "    - riscv: hwprobe: Fix stale vDSO data for late-initialized keys at boot",
                            "    - io_uring/sqpoll: switch away from getrusage() for CPU accounting",
                            "    - io_uring/sqpoll: be smarter on when to update the stime usage",
                            "    - btrfs: send: fix duplicated rmdir operations when using extrefs",
                            "    - btrfs: ref-verify: fix IS_ERR() vs NULL check in btrfs_build_ref_tree()",
                            "    - gpio: pci-idio-16: Define maximum valid register address offset",
                            "    - gpio: 104-idio-16: Define maximum valid register address offset",
                            "    - xfs: fix locking in xchk_nlinks_collect_dir",
                            "    - platform/x86: alienware-wmi-wmax: Add AWCC support to Dell G15 5530",
                            "    - Revert \"cpuidle: menu: Avoid discarding useful information\"",
                            "    - riscv: cpufeature: avoid uninitialized variable in",
                            "      has_thead_homogeneous_vlenb()",
                            "    - rust: device: fix device context of Device::parent()",
                            "    - slab: Avoid race on slab->obj_exts in alloc_slab_obj_exts",
                            "    - slab: Fix obj_ext mistakenly considered NULL due to race condition",
                            "    - smb: client: get rid of d_drop() in cifs_do_rename()",
                            "    - ACPICA: Work around bogus -Wstringop-overread warning since GCC 11",
                            "    - arm64: mte: Do not warn if the page is already tagged in copy_highpage()",
                            "    - can: netlink: can_changelink(): allow disabling of automatic restart",
                            "    - cifs: Fix TCP_Server_Info::credits to be signed",
                            "    - devcoredump: Fix circular locking dependency with devcd->mutex.",
                            "    - hwmon: (pmbus/max34440) Update adpm12160 coeff due to latest FW",
                            "    - MIPS: Malta: Fix keyboard resource preventing i8042 driver from",
                            "      registering",
                            "    - rv: Make rtapp/pagefault monitor depends on CONFIG_MMU",
                            "    - net: bonding: update the slave array for broadcast mode",
                            "    - net: stmmac: dwmac-rk: Fix disabling set_clock_selection",
                            "    - net: usb: rtl8150: Fix frame padding",
                            "    - net: ravb: Enforce descriptor type ordering",
                            "    - net: ravb: Ensure memory write completes before ringing TX doorbell",
                            "    - mptcp: pm: in-kernel: C-flag: handle late ADD_ADDR",
                            "    - selftests: mptcp: join: mark 'flush re-add' as skipped if not supported",
                            "    - selftests: mptcp: join: mark implicit tests as skipped if not supported",
                            "    - selftests: mptcp: join: mark 'delete re-add signal' as skipped if not",
                            "      supported",
                            "    - mm/mremap: correctly account old mapping after MREMAP_DONTUNMAP remap",
                            "    - drm/xe: Check return value of GGTT workqueue allocation",
                            "    - drm/amd/display: increase max link count and fix link->enc NULL pointer",
                            "      access",
                            "    - mm/damon/core: use damos_commit_quota_goal() for new goal commit",
                            "    - mm/damon/core: fix list_add_tail() call on damon_call()",
                            "    - spi: rockchip-sfc: Fix DMA-API usage",
                            "    - firmware: arm_ffa: Add support for IMPDEF value in the memory access",
                            "      descriptor",
                            "    - spi: spi-nxp-fspi: add the support for sample data from DQS pad",
                            "    - spi: spi-nxp-fspi: re-config the clock rate when operation require new",
                            "      clock rate",
                            "    - spi: spi-nxp-fspi: add extra delay after dll locked",
                            "    - spi: spi-nxp-fspi: limit the clock rate for different sample clock",
                            "      source selection",
                            "    - spi: cadence-quadspi: Fix pm_runtime unbalance on dma EPROBE_DEFER",
                            "    - arm64: dts: broadcom: bcm2712: Add default GIC address cells",
                            "    - arm64: dts: broadcom: bcm2712: Define VGIC interrupt",
                            "    - include: trace: Fix inflight count helper on failed initialization",
                            "    - firmware: arm_scmi: Fix premature SCMI_XFER_FLAG_IS_RAW clearing in raw",
                            "      mode",
                            "    - spi: airoha: return an error for continuous mode dirmap creation cases",
                            "    - spi: airoha: add support of dual/quad wires spi modes to exec_op()",
                            "      handler",
                            "    - spi: airoha: switch back to non-dma mode in the case of error",
                            "    - spi: airoha: fix reading/writing of flashes with more than one plane per",
                            "      lun",
                            "    - sysfs: check visibility before changing group attribute ownership",
                            "    - RISC-V: Define pgprot_dmacoherent() for non-coherent devices",
                            "    - RISC-V: Don't print details of CPUs disabled in DT",
                            "    - riscv: hwprobe: avoid uninitialized variable use in hwprobe_arch_id()",
                            "    - hwmon: (pmbus/isl68137) Fix child node reference leak on early return",
                            "    - hwmon: (sht3x) Fix error handling",
                            "    - io_uring: fix incorrect unlikely() usage in io_waitid_prep()",
                            "    - nbd: override creds to kernel when calling sock_{send,recv}msg()",
                            "    - drm/panic: Fix drawing the logo on a small narrow screen",
                            "    - drm/panic: Fix qr_code, ensure vmargin is positive",
                            "    - drm/panic: Fix 24bit pixel crossing page boundaries",
                            "    - of/irq: Convert of_msi_map_id() callers to of_msi_xlate()",
                            "    - of/irq: Add msi-parent check to of_msi_xlate()",
                            "    - block: require LBA dma_alignment when using PI",
                            "    - gpio: ljca: Fix duplicated IRQ mapping",
                            "    - io_uring: correct __must_hold annotation in io_install_fixed_file",
                            "    - sched: Remove never used code in mm_cid_get()",
                            "    - USB: serial: option: add UNISOC UIS7720",
                            "    - USB: serial: option: add Quectel RG255C",
                            "    - USB: serial: option: add Telit FN920C04 ECM compositions",
                            "    - usb/core/quirks: Add Huawei ME906S to wakeup quirk",
                            "    - usb: raw-gadget: do not limit transfer length",
                            "    - xhci: dbc: enable back DbC in resume if it was enabled before suspend",
                            "    - xhci: dbc: fix bogus 1024 byte prefix if ttyDBC read races with stall",
                            "      event",
                            "    - x86/microcode: Fix Entrysign revision check for Zen1/Naples",
                            "    - binder: remove \"invalid inc weak\" check",
                            "    - mei: me: add wildcat lake P DID",
                            "    - objtool/rust: add one more `noreturn` Rust function",
                            "    - nvmem: rcar-efuse: add missing MODULE_DEVICE_TABLE",
                            "    - misc: fastrpc: Fix dma_buf object leak in fastrpc_map_lookup",
                            "    - most: usb: hdm_probe: Fix calling put_device() before device",
                            "      initialization",
                            "    - tcpm: switch check for role_sw device with fw_node",
                            "    - dt-bindings: serial: sh-sci: Fix r8a78000 interrupts",
                            "    - dt-bindings: usb: dwc3-imx8mp: dma-range is required only for imx8mp",
                            "    - dt-bindings: usb: qcom,snps-dwc3: Fix bindings for X1E80100",
                            "    - serial: 8250_dw: handle reset control deassert error",
                            "    - serial: 8250_exar: add support for Advantech 2 port card with Device ID",
                            "      0x0018",
                            "    - serial: 8250_mtk: Enable baud clock and manage in runtime PM",
                            "    - serial: sc16is7xx: remove useless enable of enhanced features",
                            "    - staging: gpib: Fix device reference leak in fmh_gpib driver",
                            "    - staging: gpib: Fix no EOI on 1 and 2 byte writes",
                            "    - staging: gpib: Return -EINTR on device clear",
                            "    - staging: gpib: Fix sending clear and trigger events",
                            "    - mm/migrate: remove MIGRATEPAGE_UNMAP",
                            "    - treewide: remove MIGRATEPAGE_SUCCESS",
                            "    - vmw_balloon: indicate success when effectively deflating during",
                            "      migration",
                            "    - xfs: always warn about deprecated mount options",
                            "    - gpio: regmap: Allow to allocate regmap-irq device",
                            "    - gpio: regmap: add the .fixed_direction_output configuration parameter",
                            "    - gpio: idio-16: Define fixed direction of the GPIO lines",
                            "    - Linux 6.17.6",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40084",
                            "    - ksmbd: transport_ipc: validate payload size before reading handle",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40222",
                            "    - tty: serial: sh-sci: fix RSCI FIFO overrun handling",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40223",
                            "    - most: usb: Fix use-after-free in hdm_disconnect",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40106",
                            "    - comedi: fix divide-by-zero in comedi_buf_munge()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40224",
                            "    - hwmon: (cgbc-hwmon) Add missing NULL check after devm_kzalloc()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40225",
                            "    - drm/panthor: Fix kernel panic on partial unmap of a GPU VA region",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40226",
                            "    - firmware: arm_scmi: Account for failed debug initialization",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40227",
                            "    - mm/damon/sysfs: dealloc commit test ctx always",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40228",
                            "    - mm/damon/sysfs: catch commit test ctx alloc failure",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40229",
                            "    - mm/damon/core: fix potential memory leak by cleaning ops_filter in",
                            "      damon_destroy_scheme",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40230",
                            "    - mm: prevent poison consumption when splitting THP",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40231",
                            "    - vsock: fix lock inversion in vsock_assign_transport()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40233",
                            "    - ocfs2: clear extent cache after moving/defragmenting extents",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40235",
                            "    - btrfs: directly free partially initialized fs_info in",
                            "      btrfs_check_leaked_roots()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40236",
                            "    - virtio-net: zero unused hash fields",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40237",
                            "    - fs/notify: call exportfs_encode_fid with s_umount",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40238",
                            "    - net/mlx5: Fix IPsec cleanup over MPV device",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40239",
                            "    - net: phy: micrel: always set shared->phydev for LAN8814",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40240",
                            "    - sctp: avoid NULL dereference when chunk data buffer is missing",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40241",
                            "    - erofs: fix crafted invalid cases for encoded extents",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40242",
                            "    - gfs2: Fix unlikely race in gdlm_put_lock",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40243",
                            "    - hfs: fix KMSAN uninit-value issue in hfs_find_set_zero_bits()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40244",
                            "    - hfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40245",
                            "    - nios2: ensure that memblock.current_limit is set when setting pfn limits",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557)",
                            "    - docs: kdoc: handle the obsolescensce of docutils.ErrorString()",
                            "    - Revert \"fs: make vfs_fileattr_[get|set] return -EOPNOTSUPP\"",
                            "    - PCI: vmd: Override irq_startup()/irq_shutdown() in",
                            "      vmd_init_dev_msi_info()",
                            "    - ata: libata-core: relax checks in ata_read_log_directory()",
                            "    - arm64/sysreg: Fix GIC CDEOI instruction encoding",
                            "    - ixgbevf: fix getting link speed data for E610 devices",
                            "    - rust: cfi: only 64-bit arm and x86 support CFI_CLANG",
                            "    - x86/CPU/AMD: Prevent reset reasons from being retained across reboot",
                            "    - slab: reset slab->obj_ext when freeing and it is OBJEXTS_ALLOC_FAIL",
                            "    - Revert \"io_uring/rw: drop -EOPNOTSUPP check in",
                            "      __io_complete_rw_common()\"",
                            "    - io_uring: protect mem region deregistration",
                            "    - Revert \"drm/amd/display: Only restore backlight after amdgpu_dm_init or",
                            "      dm_resume\"",
                            "    - r8152: add error handling in rtl8152_driver_init",
                            "    - net: usb: lan78xx: Fix lost EEPROM write timeout error(-ETIMEDOUT) in",
                            "      lan78xx_write_raw_eeprom",
                            "    - f2fs: fix wrong block mapping for multi-devices",
                            "    - gve: Check valid ts bit on RX descriptor before hw timestamping",
                            "    - jbd2: ensure that all ongoing I/O complete before freeing blocks",
                            "    - ext4: wait for ongoing I/O to complete before freeing blocks",
                            "    - btrfs: fix clearing of BTRFS_FS_RELOC_RUNNING if relocation already",
                            "      running",
                            "    - btrfs: fix memory leak on duplicated memory in the qgroup assign ioctl",
                            "    - btrfs: only set the device specific options after devices are opened",
                            "    - btrfs: fix incorrect readahead expansion length",
                            "    - can: gs_usb: gs_make_candev(): populate net_device->dev_port",
                            "    - can: gs_usb: increase max interface to U8_MAX",
                            "    - cxl/acpi: Fix setup of memory resource in cxl_acpi_set_cache_size()",
                            "    - ALSA: hda/intel: Add MSI X870E Tomahawk to denylist",
                            "    - ALSA: hda/realtek: Add quirk entry for HP ZBook 17 G6",
                            "    - drm/amdgpu: use atomic functions with memory barriers for vm fault info",
                            "    - drm/amdgpu: fix gfx12 mes packet status return check",
                            "    - drm/xe: Increase global invalidation timeout to 1000us",
                            "    - perf/core: Fix address filter match with backing files",
                            "    - perf/core: Fix MMAP event path names with backing files",
                            "    - perf/core: Fix MMAP2 event device with backing files",
                            "    - drm/amd: Check whether secure display TA loaded successfully",
                            "    - PM: hibernate: Add pm_hibernation_mode_is_suspend()",
                            "    - drm/amd: Fix hybrid sleep",
                            "    - usb: gadget: Store endpoint pointer in usb_request",
                            "    - usb: gadget: Introduce free_usb_request helper",
                            "    - HID: multitouch: fix sticky fingers",
                            "    - dax: skip read lock assertion for read-only filesystems",
                            "    - coredump: fix core_pattern input validation",
                            "    - can: m_can: m_can_plat_remove(): add missing pm_runtime_disable()",
                            "    - can: m_can: m_can_handle_state_errors(): fix CAN state transition to",
                            "      Error Active",
                            "    - can: m_can: m_can_chip_config(): bring up interface in correct state",
                            "    - can: m_can: fix CAN state in system PM",
                            "    - net: mtk: wed: add dma mask limitation and GFP_DMA32 for device with",
                            "      more than 4GB DRAM",
                            "    - net: dlink: handle dma_map_single() failure properly",
                            "    - doc: fix seg6_flowlabel path",
                            "    - can: j1939: add missing calls in NETDEV_UNREGISTER notification handler",
                            "    - dpll: zl3073x: Refactor DPLL initialization",
                            "    - dpll: zl3073x: Handle missing or corrupted flash configuration",
                            "    - r8169: fix packet truncation after S4 resume on RTL8168H/RTL8111H",
                            "    - net: phy: bcm54811: Fix GMII/MII/MII-Lite selection",
                            "    - net: phy: realtek: Avoid PHYCR2 access if PHYCR2 not present",
                            "    - amd-xgbe: Avoid spurious link down messages during interface toggle",
                            "    - Octeontx2-af: Fix missing error code in cgx_probe()",
                            "    - tcp: fix tcp_tso_should_defer() vs large RTT",
                            "    - net: airoha: Take into account out-of-order tx completions in",
                            "      airoha_dev_xmit()",
                            "    - selftests: net: check jq command is supported",
                            "    - net: core: fix lockdep splat on device unregister",
                            "    - ksmbd: fix recursive locking in RPC handle list access",
                            "    - tg3: prevent use of uninitialized remote_adv and local_adv variables",
                            "    - tls: trim encrypted message to match the plaintext on short splice",
                            "    - tls: wait for async encrypt in case of error during latter iterations of",
                            "      sendmsg",
                            "    - tls: always set record_type in tls_process_cmsg",
                            "    - tls: don't rely on tx_work during send()",
                            "    - netdevsim: set the carrier when the device goes up",
                            "    - net: usb: lan78xx: fix use of improperly initialized dev->chipid in",
                            "      lan78xx_reset",
                            "    - drm/panthor: Ensure MCU is disabled on suspend",
                            "    - nvme-multipath: Skip nr_active increments in RETRY disposition",
                            "    - riscv: kprobes: Fix probe address validation",
                            "    - drm/bridge: lt9211: Drop check for last nibble of version register",
                            "    - powerpc/fadump: skip parameter area allocation when fadump is disabled",
                            "    - ASoC: codecs: Fix gain setting ranges for Renesas IDT821034 codec",
                            "    - ASoC: nau8821: Cancel jdet_work before handling jack ejection",
                            "    - ASoC: nau8821: Generalize helper to clear IRQ status",
                            "    - ASoC: nau8821: Consistently clear interrupts before unmasking",
                            "    - ASoC: nau8821: Add DMI quirk to bypass jack debounce circuit",
                            "    - drm/i915/guc: Skip communication warning on reset in progress",
                            "    - drm/i915/frontbuffer: Move bo refcounting",
                            "      intel_frontbuffer_{get,release}()",
                            "    - drm/i915/fb: Fix the set_tiling vs. addfb race, again",
                            "    - drm/amdgpu: add ip offset support for cyan skillfish",
                            "    - drm/amdgpu: add support for cyan skillfish without IP discovery",
                            "    - drm/amdgpu: fix handling of harvesting for ip_discovery firmware",
                            "    - drm/amdgpu: handle wrap around in reemit handling",
                            "    - drm/amdgpu: set an error on all fences from a bad context",
                            "    - drm/amdgpu: drop unused structures in amdgpu_drm.h",
                            "    - drm/amd/powerplay: Fix CIK shutdown temperature",
                            "    - drm/xe: Enable media sampler power gating",
                            "    - drm/draw: fix color truncation in drm_draw_fill24",
                            "    - drm/rockchip: vop2: use correct destination rectangle height check",
                            "    - HID: intel-thc-hid: Intel-quickspi: switch first interrupt from level to",
                            "      edge detection",
                            "    - sched/fair: Fix pelt lost idle time detection",
                            "    - ALSA: firewire: amdtp-stream: fix enum kernel-doc warnings",
                            "    - accel/qaic: Synchronize access to DBC request queue head & tail pointer",
                            "    - nvme-auth: update sc_c in host response",
                            "    - cxl/trace: Subtract to find an hpa_alias0 in cxl_poison events",
                            "    - selftests/bpf: make arg_parsing.c more robust to crashes",
                            "    - blk-mq: fix stale tag depth for shared sched tags in",
                            "      blk_mq_update_nr_requests()",
                            "    - block: Remove elevator_lock usage from blkg_conf frozen operations",
                            "    - HID: hid-input: only ignore 0 battery events for digitizers",
                            "    - HID: multitouch: fix name of Stylus input devices",
                            "    - drm/xe/evict: drop bogus assert",
                            "    - selftests: arg_parsing: Ensure data is flushed to disk before reading.",
                            "    - nvme/tcp: handle tls partially sent records in write_space()",
                            "    - rust: cpufreq: fix formatting",
                            "    - arm64: debug: always unmask interrupts in el0_softstp()",
                            "    - arm64: cputype: Add Neoverse-V3AE definitions",
                            "    - arm64: errata: Apply workarounds for Neoverse-V3AE",
                            "    - xfs: rename the old_crc variable in xlog_recover_process",
                            "    - xfs: fix log CRC mismatches between i386 and other architectures",
                            "    - NFSD: Rework encoding and decoding of nfsd4_deviceid",
                            "    - NFSD: Minor cleanup in layoutcommit processing",
                            "    - NFSD: Implement large extent array support in pNFS",
                            "    - NFSD: Fix last write offset handling in layoutcommit",
                            "    - phy: cdns-dphy: Store hs_clk_rate and return it",
                            "    - phy: cadence: cdns-dphy: Fix PLL lock and O_CMN_READY polling",
                            "    - x86/resctrl: Refactor resctrl_arch_rmid_read()",
                            "    - x86/resctrl: Fix miscount of bandwidth event when reactivating",
                            "      previously unavailable RMID",
                            "    - cxl: Fix match_region_by_range() to use region_res_match_cxl_range()",
                            "    - phy: cadence: cdns-dphy: Update calibration wait time for startup state",
                            "      machine",
                            "    - drm/xe: Use devm_ioremap_wc for VRAM mapping and drop manual unmap",
                            "    - drm/xe: Use dynamic allocation for tile and device VRAM region",
                            "      structures",
                            "    - drm/xe: Move struct xe_vram_region to a dedicated header",
                            "    - drm/xe: Unify the initialization of VRAM regions",
                            "    - drm/xe: Move rebar to be done earlier",
                            "    - PM: hibernate: Fix pm_hibernation_mode_is_suspend() build breakage",
                            "    - drm/xe: Fix an IS_ERR() vs NULL bug in xe_tile_alloc_vram()",
                            "    - Linux 6.17.5",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40086",
                            "    - drm/xe: Don't allow evicting of BOs in same VM in array of VM binds",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40087",
                            "    - NFSD: Define a proc_layoutcommit for the FlexFiles layout type",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40088",
                            "    - hfsplus: fix slab-out-of-bounds read in hfsplus_strcasecmp()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40162",
                            "    - ASoC: amd/sdw_utils: avoid NULL deref when devm_kasprintf() fails",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40085",
                            "    - ALSA: usb-audio: Fix NULL pointer deference in try_to_register_card",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40172",
                            "    - accel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40177",
                            "    - accel/qaic: Fix bootlog initialization ordering",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40163",
                            "    - sched/deadline: Stop dl_server before CPU goes offline",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40174",
                            "    - x86/mm: Fix SMP ordering in switch_mm_irqs_off()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40089",
                            "    - cxl/features: Add check for no entries in cxl_feature_info",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40176",
                            "    - tls: wait for pending async decryptions if tls_strp_msg_hold fails",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40164",
                            "    - usbnet: Fix using smp_processor_id() in preemptible code warnings",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40091",
                            "    - ixgbe: fix too early devlink_free() in ixgbe_remove()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40175",
                            "    - idpf: cleanup remaining SKBs in PTP flows",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40173",
                            "    - net/ip6_tunnel: Prevent perpetual tunnel growth",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40092",
                            "    - usb: gadget: f_ncm: Refactor bind path to use __free()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40093",
                            "    - usb: gadget: f_ecm: Refactor bind path to use __free()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40094",
                            "    - usb: gadget: f_acm: Refactor bind path to use __free()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40095",
                            "    - usb: gadget: f_rndis: Refactor bind path to use __free()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40165",
                            "    - media: nxp: imx8-isi: m2m: Fix streaming cleanup on release",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40096",
                            "    - drm/sched: Fix potential double free in",
                            "      drm_sched_job_add_resv_dependencies",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40097",
                            "    - ALSA: hda: Fix missing pointer check in hda_component_manager_init",
                            "      function",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40098",
                            "    - ALSA: hda: cs35l41: Fix NULL pointer dereference in",
                            "      cs35l41_get_acpi_mute_state()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40099",
                            "    - cifs: parse_dfs_referrals: prevent oob on malformed input",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40100",
                            "    - btrfs: do not assert we found block group item when creating free space",
                            "      tree",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40101",
                            "    - btrfs: fix memory leaks when rejecting a non SINGLE data profile without",
                            "      an RST",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40167",
                            "    - ext4: detect invalid INLINE_DATA + EXTENTS flag combination",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40102",
                            "    - KVM: arm64: Prevent access to vCPU events before init",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40103",
                            "    - smb: client: Fix refcount leak for cifs_sb_tlink",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40104",
                            "    - ixgbevf: fix mailbox API compatibility by negotiating supported features",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40166",
                            "    - drm/xe/guc: Check GuC running state before deregistering exec queue",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40105",
                            "    - vfs: Don't leak disconnected dentries on umount",
                            "  * The machine didn’t go into suspend and got stuck (LP: #2132095)",
                            "    - platform/x86: alienware-wmi-wmax: Fix NULL pointer dereference in sleep",
                            "      handlers",
                            "  * CAP_PERFMON insufficient to get perf data (LP: #2131046)",
                            "    - SAUCE: perf/core: Allow CAP_PERFMON for paranoid level 4",
                            "  * Poweroff not working consistently after upgrading kernel 6.14.0-17.17 or",
                            "    later (LP: #2115860)",
                            "    - drm/amd: Unify shutdown() callback behavior",
                            "    - drm/amd: Stop exporting amdgpu_device_ip_suspend() outside amdgpu_device",
                            "    - drm/amd: Remove comment about handling errors in",
                            "      amdgpu_device_ip_suspend_phase1()",
                            "    - drm/amd: Don't always set IP block HW status to false",
                            "    - drm/amd: Pass IP suspend errors up to callers",
                            "    - drm/amd: Avoid evicting resources at S5",
                            "  * Re-enable INTEL_SKL_INT3472 for kernels >= 6.16 for Intel IPU camera",
                            "    (LP: #2128792)",
                            "    - Revert \"UBUNTU: [Config] FTBFS: disable INTEL_SKL_INT3472\"",
                            "    - Revert \"UBUNTU: SAUCE: platform/x86: int3472: Add handshake GPIO",
                            "      function\"",
                            "  * Support Samsung S5K3J1 sensor for Intel MIPI camera (LP: #2121852)",
                            "    - SAUCE: media: ipu-bridge: Support s5k3j1 sensor",
                            "  * Questing update: v6.17.4 upstream stable release (LP: #2131259)",
                            "    - fs: always return zero on success from replace_fd()",
                            "    - fscontext: do not consume log entries when returning -EMSGSIZE",
                            "    - btrfs: fix the incorrect max_bytes value for find_lock_delalloc_range()",
                            "    - arm64: map [_text, _stext) virtual address range non-executable+read-",
                            "      only",
                            "    - rseq: Protect event mask against membarrier IPI",
                            "    - statmount: don't call path_put() under namespace semaphore",
                            "    - listmount: don't call path_put() under namespace semaphore",
                            "    - clocksource/drivers/clps711x: Fix resource leaks in error paths",
                            "    - memcg: skip cgroup_file_notify if spinning is not allowed",
                            "    - page_pool: Fix PP_MAGIC_MASK to avoid crashing on some 32-bit arches",
                            "    - PM: runtime: Update kerneldoc return codes",
                            "    - dma-mapping: fix direction in dma_alloc direction traces",
                            "    - cpufreq: Make drivers using CPUFREQ_ETERNAL specify transition latency",
                            "    - nfsd: unregister with rpcbind when deleting a transport",
                            "    - KVM: x86: Add helper to retrieve current value of user return MSR",
                            "    - KVM: SVM: Emulate PERF_CNTR_GLOBAL_STATUS_SET for PerfMonV2",
                            "    - iio: frequency: adf4350: Fix ADF4350_REG3_12BIT_CLKDIV_MODE",
                            "    - media: v4l2-subdev: Fix alloc failure check in",
                            "      v4l2_subdev_call_state_try()",
                            "    - asm-generic/io.h: Skip trace helpers if rwmmio events are disabled",
                            "    - clk: npcm: select CONFIG_AUXILIARY_BUS",
                            "    - clk: thead: th1520-ap: describe gate clocks with clk_gate",
                            "    - clk: thead: th1520-ap: fix parent of padctrl0 clock",
                            "    - clk: thead: Correct parent for DPU pixel clocks",
                            "    - clk: renesas: r9a08g045: Add MSTOP for GPIO",
                            "    - perf disasm: Avoid undefined behavior in incrementing NULL",
                            "    - perf test trace_btf_enum: Skip if permissions are insufficient",
                            "    - perf evsel: Avoid container_of on a NULL leader",
                            "    - libperf event: Ensure tracing data is multiple of 8 sized",
                            "    - clk: qcom: common: Fix NULL vs IS_ERR() check in qcom_cc_icc_register()",
                            "    - clk: qcom: Select the intended config in QCS_DISPCC_615",
                            "    - perf parse-events: Handle fake PMUs in CPU terms",
                            "    - clk: at91: peripheral: fix return value",
                            "    - clk: renesas: cpg-mssr: Fix memory leak in cpg_mssr_reserved_init()",
                            "    - perf: Completely remove possibility to override MAX_NR_CPUS",
                            "    - perf drm_pmu: Fix fd_dir leaks in for_each_drm_fdinfo_in_dir()",
                            "    - perf util: Fix compression checks returning -1 as bool",
                            "    - rtc: x1205: Fix Xicor X1205 vendor prefix",
                            "    - rtc: optee: fix memory leak on driver removal",
                            "    - perf arm_spe: Correct setting remote access",
                            "    - perf arm_spe: Correct memory level for remote access",
                            "    - perf vendor events arm64 AmpereOneX: Fix typo - should be",
                            "      l1d_cache_access_prefetches",
                            "    - perf test: AMD IBS swfilt skip kernel tests if paranoia is >1",
                            "    - perf test shell lbr: Avoid failures with perf event paranoia",
                            "    - perf trace: Fix IS_ERR() vs NULL check bug",
                            "    - perf session: Fix handling when buffer exceeds 2 GiB",
                            "    - perf test: Don't leak workload gopipe in PERF_RECORD_*",
                            "    - perf evsel: Fix uniquification when PMU given without suffix",
                            "    - perf test: Avoid uncore_imc/clockticks in uniquification test",
                            "    - perf evsel: Ensure the fallback message is always written to",
                            "    - perf build-id: Ensure snprintf string is empty when size is 0",
                            "    - clk: mediatek: mt8195-infra_ao: Fix parent for infra_ao_hdmi_26m",
                            "    - clk: mediatek: clk-mux: Do not pass flags to",
                            "      clk_mux_determine_rate_flags()",
                            "    - clk: nxp: lpc18xx-cgu: convert from round_rate() to determine_rate()",
                            "    - clk: nxp: Fix pll0 rate check condition in LPC18xx CGU driver",
                            "    - clk: tegra: do not overallocate memory for bpmp clocks",
                            "    - nfsd: fix assignment of ia_ctime.tv_nsec on delegated mtime update",
                            "    - nfsd: ignore ATTR_DELEG when checking ia_valid before notify_change()",
                            "    - vfs: add ATTR_CTIME_SET flag",
                            "    - nfsd: use ATTR_CTIME_SET for delegated ctime updates",
                            "    - nfsd: track original timestamps in nfs4_delegation",
                            "    - nfsd: fix SETATTR updates for delegated timestamps",
                            "    - nfsd: fix timestamp updates in CB_GETATTR",
                            "    - tracing: Fix the bug where bpf_get_stackid returns -EFAULT on the ARM64",
                            "    - PM: core: Annotate loops walking device links as _srcu",
                            "    - PM: core: Add two macros for walking device links",
                            "    - PM: sleep: Do not wait on SYNC_STATE_ONLY device links",
                            "    - cpufreq: tegra186: Set target frequency for all cpus in policy",
                            "    - scsi: mvsas: Fix use-after-free bugs in mvs_work_queue",
                            "    - perf bpf-filter: Fix opts declaration on older libbpfs",
                            "    - scsi: ufs: sysfs: Make HID attributes visible",
                            "    - mshv: Handle NEED_RESCHED_LAZY before transferring to guest",
                            "    - perf bpf_counter: Fix handling of cpumap fixing hybrid",
                            "    - ASoC: SOF: ipc4-topology: Correct the minimum host DMA buffer size",
                            "    - ASoC: SOF: ipc4-topology: Account for different ChainDMA host buffer",
                            "      size",
                            "    - ASoC: SOF: Intel: hda-pcm: Place the constraint on period time instead",
                            "      of buffer time",
                            "    - LoongArch: Add cflag -fno-isolate-erroneous-paths-dereference",
                            "    - LoongArch: Fix build error for LTO with LLVM-18",
                            "    - LoongArch: Init acpi_gbl_use_global_lock to false",
                            "    - ASoC: SOF: Intel: Read the LLP via the associated Link DMA channel",
                            "    - net: usb: lan78xx: Fix lost EEPROM read timeout error(-ETIMEDOUT) in",
                            "      lan78xx_read_raw_eeprom",
                            "    - net/mlx4: prevent potential use after free in mlx4_en_do_uc_filter()",
                            "    - drm/xe/hw_engine_group: Fix double write lock release in error path",
                            "    - drm/xe/i2c: Don't rely on d3cold.allowed flag in system PM path",
                            "    - s390/cio: Update purge function to unregister the unused subchannels",
                            "    - drm/vmwgfx: Fix a null-ptr access in the cursor snooper",
                            "    - drm/vmwgfx: Fix Use-after-free in validation",
                            "    - drm/vmwgfx: Fix copy-paste typo in validation",
                            "    - net/sctp: fix a null dereference in sctp_disposition",
                            "      sctp_sf_do_5_1D_ce()",
                            "    - tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request().",
                            "    - net: mscc: ocelot: Fix use-after-free caused by cyclic delayed work",
                            "    - selftest: net: ovpn: Fix uninit return values",
                            "    - ice: ice_adapter: release xa entry on adapter allocation failure",
                            "    - net: fsl_pq_mdio: Fix device node reference leak in fsl_pq_mdio_probe",
                            "    - tools build: Align warning options with perf",
                            "    - perf python: split Clang options when invoking Popen",
                            "    - tcp: take care of zero tp->window_clamp in tcp_set_rcvlowat()",
                            "    - mailbox: zynqmp-ipi: Remove redundant mbox_controller_unregister() call",
                            "    - mailbox: zynqmp-ipi: Remove dev.parent check in zynqmp_ipi_free_mboxes",
                            "    - mailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop",
                            "    - mailbox: zynqmp-ipi: Fix SGI cleanup on unbind",
                            "    - bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}",
                            "    - net: mdio: mdio-i2c: Hold the i2c bus lock during smbus transactions",
                            "    - net: sparx5/lan969x: fix flooding configuration on bridge join/leave",
                            "    - net/mlx5: Prevent tunnel mode conflicts between FDB and NIC IPsec tables",
                            "    - net/mlx5e: Prevent tunnel reformat when tunnel mode not allowed",
                            "    - mailbox: mtk-cmdq: Remove pm_runtime APIs from cmdq_mbox_send_data()",
                            "    - drm/amdgpu: Add additional DCE6 SCL registers",
                            "    - drm/amd/display: Add missing DCE6 SCL_HORZ_FILTER_INIT* SRIs",
                            "    - drm/amd/display: Properly clear SCL_*_FILTER_CONTROL on DCE6",
                            "    - drm/amd/display: Properly disable scaling on DCE6",
                            "    - drm/amd/display: Disable scaling on DCE6 for now",
                            "    - drm/amdkfd: Fix kfd process ref leaking when userptr unmapping",
                            "    - net: pse-pd: tps23881: Fix current measurement scaling",
                            "    - crypto: skcipher - Fix reqsize handling",
                            "    - netfilter: nft_objref: validate objref and objrefmap expressions",
                            "    - bridge: br_vlan_fill_forward_path_pvid: use br_vlan_group_rcu()",
                            "    - selftests: netfilter: nft_fib.sh: fix spurious test failures",
                            "    - selftests: netfilter: query conntrack state to check for port clash",
                            "      resolution",
                            "    - io_uring/zcrx: increment fallback loop src offset",
                            "    - net: airoha: Fix loopback mode configuration for GDM2 port",
                            "    - cifs: Fix copy_to_iter return value check",
                            "    - smb: client: fix missing timestamp updates after utime(2)",
                            "    - rtc: isl12022: Fix initial enable_irq/disable_irq balance",
                            "    - cifs: Query EA $LXMOD in cifs_query_path_info() for WSL reparse points",
                            "    - tpm_tis: Fix incorrect arguments in tpm_tis_probe_irq_single",
                            "    - gpio: wcd934x: mark the GPIO controller as sleeping",
                            "    - bpf: Avoid RCU context warning when unpinning htab with internal structs",
                            "    - kbuild: always create intermediate vmlinux.unstripped",
                            "    - kbuild: keep .modinfo section in vmlinux.unstripped",
                            "    - kbuild: Restore pattern to avoid stripping .rela.dyn from vmlinux",
                            "    - kbuild: Add '.rel.*' strip pattern for vmlinux",
                            "    - s390: vmlinux.lds.S: Reorder sections",
                            "    - s390/vmlinux.lds.S: Move .vmlinux.info to end of allocatable sections",
                            "    - ACPICA: acpidump: drop ACPI_NONSTRING attribute from file_name",
                            "    - ACPI: property: Fix buffer properties extraction for subnodes",
                            "    - ACPI: TAD: Add missing sysfs_remove_group() for ACPI_TAD_RT",
                            "    - ACPICA: Debugger: drop ACPI_NONSTRING attribute from name_seg",
                            "    - ACPI: debug: fix signedness issues in read/write helpers",
                            "    - ACPI: battery: Add synchronization between interface updates",
                            "    - arm64: dts: qcom: msm8916: Add missing MDSS reset",
                            "    - arm64: dts: qcom: msm8939: Add missing MDSS reset",
                            "    - arm64: dts: qcom: sdm845: Fix slimbam num-channels/ees",
                            "    - Revert \"UBUNTU: SAUCE: arm64: dts: qcom: x1e80100-pmics: Disable pm8010",
                            "      by default\"",
                            "    - arm64: dts: qcom: x1e80100-pmics: Disable pm8010 by default",
                            "    - arm64: dts: ti: k3-am62a-main: Fix main padcfg length",
                            "    - arm64: dts: ti: k3-am62p: Fix supported hardware for 1GHz OPP",
                            "    - arm64: kprobes: call set_memory_rox() for kprobe page",
                            "    - arm64: mte: Do not flag the zero page as PG_mte_tagged",
                            "    - ARM: AM33xx: Implement TI advisory 1.0.36 (EMU0/EMU1 pins state on",
                            "      reset)",
                            "    - ARM: OMAP2+: pm33xx-core: ix device node reference leaks in",
                            "      amx3_idle_init",
                            "    - firmware: arm_scmi: quirk: Prevent writes to string constants",
                            "    - perf/arm-cmn: Fix CMN S3 DTM offset",
                            "    - KVM: s390: Fix to clear PTE when discarding a swapped page",
                            "    - KVM: arm64: Fix debug checking for np-guests using huge mappings",
                            "    - KVM: arm64: Fix page leak in user_mem_abort()",
                            "    - x86/kvm: Force legacy PCI hole to UC when overriding MTRRs for TDX/SNP",
                            "    - KVM: SVM: Re-load current, not host, TSC_AUX on #VMEXIT from SEV-ES",
                            "      guest",
                            "    - KVM: TDX: Fix uninitialized error code for __tdx_bringup()",
                            "    - dt-bindings: phy: rockchip-inno-csi-dphy: make power-domains non-",
                            "      required",
                            "    - xen: take system_transition_mutex on suspend",
                            "    - xen/events: Cleanup find_virq() return codes",
                            "    - xen/manage: Fix suspend error path",
                            "    - xen/events: Return -EEXIST for bound VIRQs",
                            "    - xen/events: Update virq_to_irq on migration",
                            "    - firmware: exynos-acpm: fix PMIC returned errno",
                            "    - firmware: meson_sm: fix device leak at probe",
                            "    - media: cec: extron-da-hd-4k-plus: drop external-module make commands",
                            "    - media: cx18: Add missing check after DMA map",
                            "    - media: i2c: mt9p031: fix mbus code initialization",
                            "    - media: i2c: mt9v111: fix incorrect type for ret",
                            "    - media: mc: Fix MUST_CONNECT handling for pads with no links",
                            "    - media: pci: ivtv: Add missing check after DMA map",
                            "    - media: pci: mg4b: fix uninitialized iio scan data",
                            "    - media: platform: mtk-mdp3: Add missing MT8188 compatible to comp_dt_ids",
                            "    - media: s5p-mfc: remove an unused/uninitialized variable",
                            "    - media: staging/ipu7: fix isys device runtime PM usage in firmware",
                            "      closing",
                            "    - media: uvcvideo: Avoid variable shadowing in uvc_ctrl_cleanup_fh",
                            "    - media: venus: firmware: Use correct reset sequence for IRIS2",
                            "    - media: venus: pm_helpers: add fallback for the opp-table",
                            "    - media: vivid: fix disappearing <Vendor Command With ID> messages",
                            "    - media: vsp1: Export missing vsp1_isp_free_buffer symbol",
                            "    - media: ti: j721e-csi2rx: Use devm_of_platform_populate",
                            "    - media: ti: j721e-csi2rx: Fix source subdev link creation",
                            "    - media: lirc: Fix error handling in lirc_register()",
                            "    - drm/exynos: exynos7_drm_decon: remove ctx->suspended",
                            "    - drm/panthor: Fix memory leak in panthor_ioctl_group_create()",
                            "    - drm/msm/a6xx: Fix PDC sleep sequence",
                            "    - drm/rcar-du: dsi: Fix 1/2/3 lane support",
                            "    - drm/nouveau: fix bad ret code in nouveau_bo_move_prep",
                            "    - drm/xe/uapi: loosen used tracking restriction",
                            "    - drm/amd/display: Incorrect Mirror Cositing",
                            "    - drm/amd/display: Enable Dynamic DTBCLK Switch",
                            "    - drm/amd/display: Fix unsafe uses of kernel mode FPU",
                            "    - blk-crypto: fix missing blktrace bio split events",
                            "    - btrfs: avoid potential out-of-bounds in btrfs_encode_fh()",
                            "    - bus: mhi: ep: Fix chained transfer handling in read path",
                            "    - bus: mhi: host: Do not use uninitialized 'dev' pointer in",
                            "      mhi_init_irq_setup()",
                            "    - cdx: Fix device node reference leak in cdx_msi_domain_init",
                            "    - clk: qcom: tcsrcc-x1e80100: Set the bi_tcxo as parent to eDP refclk",
                            "    - clk: samsung: exynos990: Use PLL_CON0 for PLL parent muxes",
                            "    - clk: samsung: exynos990: Fix CMU_TOP mux/div bit widths",
                            "    - clk: samsung: exynos990: Replace bogus divs with fixed-factor clocks",
                            "    - copy_sighand: Handle architectures where sizeof(unsigned long) <",
                            "      sizeof(u64)",
                            "    - cpufreq: CPPC: Avoid using CPUFREQ_ETERNAL as transition delay",
                            "    - cpufreq: intel_pstate: Fix object lifecycle issue in",
                            "      update_qos_request()",
                            "    - crypto: aspeed - Fix dma_unmap_sg() direction",
                            "    - crypto: atmel - Fix dma_unmap_sg() direction",
                            "    - crypto: rockchip - Fix dma_unmap_sg() nents value",
                            "    - eventpoll: Replace rwlock with spinlock",
                            "    - fbdev: Fix logic error in \"offb\" name match",
                            "    - fs/ntfs3: Fix a resource leak bug in wnd_extend()",
                            "    - fs: quota: create dedicated workqueue for quota_release_work",
                            "    - fsnotify: pass correct offset to fsnotify_mmap_perm()",
                            "    - fuse: fix possibly missing fuse_copy_finish() call in fuse_notify()",
                            "    - fuse: fix livelock in synchronous file put from fuseblk workers",
                            "    - gpio: mpfs: fix setting gpio direction to output",
                            "    - i3c: Fix default I2C adapter timeout value",
                            "    - iio/adc/pac1934: fix channel disable configuration",
                            "    - iio: dac: ad5360: use int type to store negative error codes",
                            "    - iio: dac: ad5421: use int type to store negative error codes",
                            "    - iio: frequency: adf4350: Fix prescaler usage.",
                            "    - iio: xilinx-ams: Fix AMS_ALARM_THR_DIRECT_MASK",
                            "    - iio: xilinx-ams: Unmask interrupts after updating alarms",
                            "    - init: handle bootloader identifier in kernel parameters",
                            "    - iio: imu: inv_icm42600: Simplify pm_runtime setup",
                            "    - iio: imu: inv_icm42600: Drop redundant pm_runtime reinitialization in",
                            "      resume",
                            "    - iio: imu: inv_icm42600: Avoid configuring if already pm_runtime",
                            "      suspended",
                            "    - iommu/vt-d: PRS isn't usable if PDS isn't supported",
                            "    - ipmi: Rework user message limit handling",
                            "    - ipmi:msghandler:Change seq_lock to a mutex",
                            "    - kernel/sys.c: fix the racy usage of task_lock(tsk->group_leader) in",
                            "      sys_prlimit64() paths",
                            "    - KEYS: trusted_tpm1: Compare HMAC values in constant time",
                            "    - kho: only fill kimage if KHO is finalized",
                            "    - lib/genalloc: fix device leak in of_gen_pool_get()",
                            "    - loop: fix backing file reference leak on validation error",
                            "    - md: fix mssing blktrace bio split events",
                            "    - of: unittest: Fix device reference count leak in",
                            "      of_unittest_pci_node_verify",
                            "    - openat2: don't trigger automounts with RESOLVE_NO_XDEV",
                            "    - padata: Reset next CPU when reorder sequence wraps around",
                            "    - parisc: don't reference obsolete termio struct for TC* constants",
                            "    - parisc: Remove spurious if statement from raw_copy_from_user()",
                            "    - nvme-pci: Add TUXEDO IBS Gen8 to Samsung sleep quirk",
                            "    - pinctrl: samsung: Drop unused S3C24xx driver data",
                            "    - PM: EM: Fix late boot with holes in CPU topology",
                            "    - PM: hibernate: Fix hybrid-sleep",
                            "    - PM: hibernate: Restrict GFP mask in power_down()",
                            "    - power: supply: max77976_charger: fix constant current reporting",
                            "    - powerpc/powernv/pci: Fix underflow and leak issue",
                            "    - powerpc/pseries/msi: Fix potential underflow and leak issue",
                            "    - pwm: berlin: Fix wrong register in suspend/resume",
                            "    - pwm: Fix incorrect variable used in error message",
                            "    - Revert \"ipmi: fix msg stack when IPMI is disconnected\"",
                            "    - sched/deadline: Fix race in push_dl_task()",
                            "    - scsi: hpsa: Fix potential memory leak in hpsa_big_passthru_ioctl()",
                            "    - scsi: sd: Fix build warning in sd_revalidate_disk()",
                            "    - sctp: Fix MAC comparison to be constant-time",
                            "    - smb client: fix bug with newly created file in cached dir",
                            "    - sparc64: fix hugetlb for sun4u",
                            "    - sparc: fix error handling in scan_one_device()",
                            "    - xtensa: simdisk: add input size check in proc_write_simdisk",
                            "    - xsk: Harden userspace-supplied xdp_desc validation",
                            "    - mtd: rawnand: fsmc: Default to autodetect buswidth",
                            "    - mtd: nand: raw: gpmi: fix clocks when CONFIG_PM=N",
                            "    - mmc: core: SPI mode remove cmd7",
                            "    - mmc: mmc_spi: multiple block read remove read crc ack",
                            "    - memory: samsung: exynos-srom: Fix of_iomap leak in exynos_srom_probe",
                            "    - memory: stm32_omm: Fix req2ack update test",
                            "    - rtc: interface: Ensure alarm irq is enabled when UIE is enabled",
                            "    - rtc: interface: Fix long-standing race when setting alarm",
                            "    - rseq/selftests: Use weak symbol reference, not definition, to link with",
                            "      glibc",
                            "    - PCI: xilinx-nwl: Fix ECAM programming",
                            "    - PCI: tegra: Convert struct tegra_msi mask_lock into raw spinlock",
                            "    - PCI/sysfs: Ensure devices are powered for config reads",
                            "    - PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV",
                            "    - PCI/ERR: Fix uevent on failure to recover",
                            "    - PCI/AER: Fix missing uevent on recovery when a reset is requested",
                            "    - PCI/AER: Support errors introduced by PCIe r6.0",
                            "    - PCI: Ensure relaxed tail alignment does not increase min_align",
                            "    - PCI: Fix failure detection during resource resize",
                            "    - PCI: j721e: Fix module autoloading",
                            "    - PCI: j721e: Fix programming sequence of \"strap\" settings",
                            "    - PCI: keystone: Use devm_request_irq() to free \"ks-pcie-error-irq\" on",
                            "      exit",
                            "    - PCI: rcar-gen4: Fix PHY initialization",
                            "    - PCI: rcar-host: Drop PMSR spinlock",
                            "    - PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock",
                            "    - PCI: tegra194: Fix broken tegra_pcie_ep_raise_msi_irq()",
                            "    - PCI: tegra194: Handle errors in BPMP response",
                            "    - PCI: tegra194: Reset BARs when running in PCIe endpoint mode",
                            "    - PCI/pwrctrl: Fix device leak at registration",
                            "    - PCI/pwrctrl: Fix device and OF node leak at bus scan",
                            "    - PCI/pwrctrl: Fix device leak at device stop",
                            "    - spi: cadence-quadspi: Flush posted register writes before INDAC access",
                            "    - spi: cadence-quadspi: Flush posted register writes before DAC access",
                            "    - spi: cadence-quadspi: Fix cqspi_setup_flash()",
                            "    - xfs: use deferred intent items for reaping crosslinked blocks",
                            "    - x86/fred: Remove ENDBR64 from FRED entry points",
                            "    - x86/umip: Check that the instruction opcode is at least two bytes",
                            "    - x86/umip: Fix decoding of register forms of 0F 01 (SGDT and SIDT",
                            "      aliases)",
                            "    - mptcp: pm: in-kernel: usable client side with C-flag",
                            "    - mptcp: reset blackhole on success with non-loopback ifaces",
                            "    - selftests: mptcp: join: validate C-flag + def limit",
                            "    - s390/cio/ioasm: Fix __xsch() condition code handling",
                            "    - s390/dasd: enforce dma_alignment to ensure proper buffer validation",
                            "    - s390/dasd: Return BLK_STS_INVAL for EINVAL from do_dasd_request",
                            "    - s390: Add -Wno-pointer-sign to KBUILD_CFLAGS_DECOMPRESSOR",
                            "    - slab: prevent warnings when slab obj_exts vector allocation fails",
                            "    - slab: mark slab->obj_exts allocation failures unconditionally",
                            "    - wifi: ath11k: HAL SRNG: don't deinitialize and re-initialize again",
                            "    - wifi: iwlwifi: Fix dentry reference leak in iwl_mld_add_link_debugfs",
                            "    - wifi: rtw89: avoid possible TX wait initialization race",
                            "    - wifi: mt76: mt7925u: Add VID/PID for Netgear A9000",
                            "    - wifi: mt76: mt7921u: Add VID/PID for Netgear A7500",
                            "    - mm/thp: fix MTE tag mismatch when replacing zero-filled subpages",
                            "    - mm/rmap: fix soft-dirty and uffd-wp bit loss when remapping zero-filled",
                            "      mTHP subpage to shared zeropage",
                            "    - mm/page_alloc: only set ALLOC_HIGHATOMIC for __GPF_HIGH allocations",
                            "    - mm/hugetlb: early exit from hugetlb_pages_alloc_boot() when",
                            "      max_huge_pages=0",
                            "    - mm/damon/vaddr: do not repeat pte_offset_map_lock() until success",
                            "    - mm/damon/lru_sort: use param_ctx for damon_attrs staging",
                            "    - nfsd: decouple the xprtsec policy check from check_nfsd_access()",
                            "    - NFSD: Fix destination buffer size in nfsd4_ssc_setup_dul()",
                            "    - nfsd: nfserr_jukebox in nlm_fopen should lead to a retry",
                            "    - media: iris: Call correct power off callback in cleanup path",
                            "    - media: iris: Fix firmware reference leak and unmap memory after load",
                            "    - media: iris: fix module removal if firmware download failed",
                            "    - media: iris: vpu3x: Add MNoC low power handshake during hardware power-",
                            "      off",
                            "    - media: iris: Fix port streaming handling",
                            "    - media: iris: Fix buffer count reporting in internal buffer check",
                            "    - media: iris: Allow substate transition to load resources during output",
                            "      streaming",
                            "    - media: iris: Always destroy internal buffers on firmware release",
                            "      response",
                            "    - media: iris: Simplify session stop logic by relying on vb2 checks",
                            "    - media: iris: Update vbuf flags before v4l2_m2m_buf_done",
                            "    - media: iris: Send dummy buffer address for all codecs during drain",
                            "    - media: iris: Fix missing LAST flag handling during drain",
                            "    - media: iris: Fix format check for CAPTURE plane in try_fmt",
                            "    - media: iris: Allow stop on firmware only if start was issued.",
                            "    - ext4: add ext4_sb_bread_nofail() helper function for",
                            "      ext4_free_branches()",
                            "    - ext4: fail unaligned direct IO write with EINVAL",
                            "    - ext4: verify orphan file size is not too big",
                            "    - ext4: increase i_disksize to offset + len in",
                            "      ext4_update_disksize_before_punch()",
                            "    - ext4: correctly handle queries for metadata mappings",
                            "    - ext4: avoid potential buffer over-read in parse_apply_sb_mount_options()",
                            "    - ext4: fix an off-by-one issue during moving extents",
                            "    - ext4: guard against EA inode refcount underflow in xattr update",
                            "    - ext4: validate ea_ino and size in check_xattrs",
                            "    - ACPICA: Allow to skip Global Lock initialization",
                            "    - ext4: free orphan info with kvfree",
                            "    - ipmi: Fix handling of messages with provided receive message pointer",
                            "    - Squashfs: add additional inode sanity checking",
                            "    - Squashfs: reject negative file sizes in squashfs_read_inode()",
                            "    - mm/ksm: fix incorrect KSM counter handling in mm_struct during fork",
                            "    - media: mc: Clear minor number before put device",
                            "    - arm64: dts: qcom: qcs615: add missing dt property in QUP SEs",
                            "    - ACPI: property: Disregard references in data-only subnode lists",
                            "    - ACPI: property: Add code comments explaining what is going on",
                            "    - ACPI: property: Do not pass NULL handles to acpi_attach_data()",
                            "    - irqchip/sifive-plic: Avoid interrupt ID 0 handling during suspend/resume",
                            "    - copy_file_range: limit size if in compat mode",
                            "    - minixfs: Verify inode mode when loading from disk",
                            "    - pid: Add a judgment for ns null in pid_nr_ns",
                            "    - fs: Add 'initramfs_options' to set initramfs mount options",
                            "    - cramfs: Verify inode mode when loading from disk",
                            "    - nsfs: validate extensible ioctls",
                            "    - mnt_ns_tree_remove(): DTRT if mnt_ns had never been added to mnt_ns_list",
                            "    - writeback: Avoid softlockup when switching many inodes",
                            "    - writeback: Avoid excessively long inode switching times",
                            "    - iomap: error out on file IO when there is no inline_data buffer",
                            "    - pidfs: validate extensible ioctls",
                            "    - mount: handle NULL values in mnt_ns_release()",
                            "    - Linux 6.17.4",
                            "  * Questing update: v6.17.4 upstream stable release (LP: #2131259) // Race",
                            "    condition in perf build causes build failure due to missing unistd_64.h",
                            "    header on arm64 (LP: #2131702)",
                            "    - perf tools: Fix arm64 libjvmti build by generating unistd_64.h",
                            "  * Questing update: v6.17.3 upstream stable release (LP: #2129610)",
                            "    - arch: copy_thread: pass clone_flags as u64",
                            "    - filelock: add FL_RECLAIM to show_fl_flags() macro",
                            "    - init: INITRAMFS_PRESERVE_MTIME should depend on BLK_DEV_INITRD",
                            "    - pid: use ns_capable_noaudit() when determining net sysctl permissions",
                            "    - Fix CC_HAS_ASM_GOTO_OUTPUT on non-x86 architectures",
                            "    - [Config]: Update CC configs for v6.17.3",
                            "    - seccomp: Fix a race with WAIT_KILLABLE_RECV if the tracer replies too",
                            "      fast",
                            "    - kbuild: Add missing $(objtree) prefix to powerpc crtsavres.o artifact",
                            "    - selftests: arm64: Check fread return value in exec_target",
                            "    - selftests: arm64: Fix -Waddress warning in tpidr2 test",
                            "    - kselftest/arm64/gcs: Correctly check return value when disabling GCS",
                            "    - hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()",
                            "    - gfs2: Fix GLF_INVALIDATE_IN_PROGRESS flag clearing in do_xmote",
                            "    - gfs2: Remove space before newline",
                            "    - gfs2: Further sanitize lock_dlm.c",
                            "    - gfs2: Fix LM_FLAG_TRY* logic in add_to_queue",
                            "    - gfs2: Remove duplicate check in do_xmote",
                            "    - gfs2: Get rid of GLF_INVALIDATE_IN_PROGRESS",
                            "    - gfs2: do_xmote cleanup",
                            "    - gfs2: Add proper lockspace locking",
                            "    - powerpc/8xx: Remove left-over instruction and comments in",
                            "      DataStoreTLBMiss handler",
                            "    - powerpc/603: Really copy kernel PGD entries into all PGDIRs",
                            "    - powerpc/ftrace: ensure ftrace record ops are always set for NOPs",
                            "    - powerpc64/modules: correctly iterate over stubs in",
                            "      setup_ftrace_ool_stubs",
                            "    - uprobes: uprobe_warn should use passed task",
                            "    - raid6: riscv: Clean up unused header file inclusion",
                            "    - coresight: trbe: Prevent overflow in PERF_IDX2OFF()",
                            "    - perf: arm_spe: Prevent overflow in PERF_IDX2OFF()",
                            "    - erofs: avoid reading more for fragment maps",
                            "    - smb: client: fix sending the iwrap custom IRD/ORD negotiation messages",
                            "    - smb: server: fix IRD/ORD negotiation with the client",
                            "    - perf/x86/intel: Use early_initcall() to hook bts_init()",
                            "    - perf/x86/intel: Fix IA32_PMC_x_CFG_B MSRs access error",
                            "    - x86/vdso: Fix output operand size of RDPID",
                            "    - selftests: cgroup: Make test_pids backwards compatible",
                            "    - sched/fair: Get rid of sched_domains_curr_level hack for tl->cpumask()",
                            "    - [Config]: Update CONFIG_SCHED_MC for v6.17.3",
                            "    - lsm: CONFIG_LSM can depend on CONFIG_SECURITY",
                            "    - cpuset: fix failure to enable isolated partition when containing",
                            "      isolcpus",
                            "    - btrfs: return any hit error from extent_writepage_io()",
                            "    - btrfs: fix symbolic link reading when bs > ps",
                            "    - pinctrl: renesas: rzg2l: Fix invalid unsigned return in rzg3s_oen_read()",
                            "    - arm64: dts: renesas: rzg2lc-smarc: Disable CAN-FD channel0",
                            "    - bpf: Tidy verifier bug message",
                            "    - regmap: Remove superfluous check for !config in __regmap_init()",
                            "    - selftests/bpf: Copy test_kmods when installing selftest",
                            "    - rust: cpumask: Mark CpumaskVar as transparent",
                            "    - bpf/selftests: Fix test_tcpnotify_user",
                            "    - bpf: Remove migrate_disable in kprobe_multi_link_prog_run",
                            "    - libbpf: Fix reuse of DEVMAP",
                            "    - tools/nolibc: fix error return value of clock_nanosleep()",
                            "    - ARM: dts: renesas: porter: Fix CAN pin group",
                            "    - leds: max77705: Function return instead of variable assignment",
                            "    - leds: flash: leds-qcom-flash: Update torch current clamp setting",
                            "    - s390/bpf: Do not write tail call counter into helper and kfunc frames",
                            "    - s390/bpf: Write back tail call counter for BPF_PSEUDO_CALL",
                            "    - s390/bpf: Write back tail call counter for BPF_TRAMP_F_CALL_ORIG",
                            "    - cpufreq: scmi: Account for malformed DT in scmi_dev_used_by_cpus()",
                            "    - arm64: dts: renesas: sparrow-hawk: Invert microSD voltage selector on",
                            "      EVTB1",
                            "    - arm64: dts: renesas: sparrow-hawk: Set VDDQ18_25_AVB voltage on EVTB1",
                            "    - libbpf: Export bpf_object__prepare symbol",
                            "    - firmware: arm_scmi: Mark VirtIO ready before registering",
                            "      scmi_virtio_driver",
                            "    - arm64: dts: imx93-kontron: Fix GPIO for panel regulator",
                            "    - arm64: dts: imx93-kontron: Fix USB port assignment",
                            "    - arm64: dts: imx95: Correct the lpuart7 and lpuart8 srcid",
                            "    - bpf: Remove preempt_disable in bpf_try_get_buffers",
                            "    - ACPI: processor: idle: Fix memory leak when register cpuidle device",
                            "      failed",
                            "    - genirq: Add irq_chip_(startup/shutdown)_parent()",
                            "    - PCI/MSI: Add startup/shutdown for per device domains",
                            "    - irqchip/sg2042-msi: Fix broken affinity setting",
                            "    - scripts/misc-check: update export checks for EXPORT_SYMBOL_FOR_MODULES()",
                            "    - soc: qcom: rpmh-rsc: Unconditionally clear _TRIGGER bit for TCS",
                            "    - pinctrl: meson-gxl: add missing i2c_d pinmux",
                            "    - blk-mq: check kobject state_in_sysfs before deleting in",
                            "      blk_mq_unregister_hctx",
                            "    - selftests/futex: Remove the -g parameter from futex_priv_hash",
                            "    - ARM: at91: pm: fix MCKx restore routine",
                            "    - arm64: dts: apple: t8103-j457: Fix PCIe ethernet iommu-map",
                            "    - regulator: scmi: Use int type to store negative error codes",
                            "    - selftests/futex: Fix some futex_numa_mpol subtests",
                            "    - tools/nolibc: avoid error in dup2() if old fd equals new fd",
                            "    - selftests/nolibc: fix EXPECT_NZ macro",
                            "    - leds: leds-lp55xx: Use correct address for memory programming",
                            "    - PCI/MSI: Check MSI_FLAG_PCI_MSI_MASK_PARENT in",
                            "      cond_[startup|shutdown]_parent()",
                            "    - block: use int to store blk_stack_limits() return value",
                            "    - ARM: dts: stm32: stm32mp151c-plyaqm: Use correct dai-format property",
                            "    - dt-bindings: vendor-prefixes: Add undocumented vendor prefixes",
                            "    - genirq/test: Fix depth tests on architectures with NOREQUEST by default.",
                            "    - genirq/test: Select IRQ_DOMAIN",
                            "    - genirq/test: Depend on SPARSE_IRQ",
                            "    - genirq/test: Drop CONFIG_GENERIC_IRQ_MIGRATION assumptions",
                            "    - genirq/test: Ensure CPU 1 is online for hotplug test",
                            "    - selftests/bpf: Fix count write in testapp_xdp_metadata_copy()",
                            "    - vdso/datastore: Gate time data behind CONFIG_GENERIC_GETTIMEOFDAY",
                            "    - PM: sleep: core: Clear power.must_resume in noirq suspend error path",
                            "    - blk-mq: fix elevator depth_updated method",
                            "    - vdso: Add struct __kernel_old_timeval forward declaration to gettime.h",
                            "    - ARM: dts: ti: omap: am335x-baltos: Fix ti,en-ck32k-xtal property in DTS",
                            "      to use correct boolean syntax",
                            "    - ARM: dts: ti: omap: omap3-devkit8000-lcd: Fix ti,keep-vref-on property",
                            "      to use correct boolean syntax in DTS",
                            "    - ARM: dts: omap: am335x-cm-t335: Remove unused mcasp num-serializer",
                            "      property",
                            "    - PM / devfreq: mtk-cci: Fix potential error pointer dereference in",
                            "      probe()",
                            "    - power: supply: cw2015: Fix a alignment coding style issue",
                            "    - hwmon: (asus-ec-sensors) Narrow lock for X870E-CREATOR WIFI",
                            "    - pinctrl: renesas: Use int type to store negative error codes",
                            "    - pinctrl: eswin: Fix regulator error check and Kconfig dependency",
                            "    - null_blk: Fix the description of the cache_size module argument",
                            "    - blk-throttle: fix access race during throttle policy activation",
                            "    - selftests: vDSO: Fix -Wunitialized in powerpc VDSO_CALL() wrapper",
                            "    - selftests: vDSO: vdso_test_abi: Correctly skip whole test with missing",
                            "      vDSO",
                            "    - irqchip/gic-v5: Fix loop in gicv5_its_create_itt_two_level() cleanup",
                            "      path",
                            "    - irqchip/gic-v5: Fix error handling in gicv5_its_irq_domain_alloc()",
                            "    - tick: Do not set device to detached state in tick_shutdown()",
                            "    - arm64: dts: mediatek: mt8195: Remove suspend-breaking reset from pcie0",
                            "    - arm64: dts: mediatek: mt8183: Fix out of range pull values",
                            "    - nbd: restrict sockets to TCP and UDP",
                            "    - PM / devfreq: rockchip-dfi: double count on RK3588",
                            "    - firmware: firmware: meson-sm: fix compile-test default",
                            "    - dts: arm: amlogic: fix pwm node for c3",
                            "    - soc: mediatek: mtk-svs: fix device leaks on mt8183 probe failure",
                            "    - soc: mediatek: mtk-svs: fix device leaks on mt8192 probe failure",
                            "    - cpuidle: qcom-spm: fix device and OF node leaks at probe",
                            "    - block: cleanup bio_issue",
                            "    - block: initialize bio issue time in blk_mq_submit_bio()",
                            "    - block: factor out a helper bio_submit_split_bioset()",
                            "    - block: skip unnecessary checks for split bio",
                            "    - block: fix ordering of recursive split IO",
                            "    - blk-mq: remove useless checkings in blk_mq_update_nr_requests()",
                            "    - blk-mq: check invalid nr_requests in queue_requests_store()",
                            "    - blk-mq: convert to serialize updating nr_requests with",
                            "      update_nr_hwq_lock",
                            "    - blk-mq: cleanup shared tags case in blk_mq_update_nr_requests()",
                            "    - blk-mq: split bitmap grow and resize case in blk_mq_update_nr_requests()",
                            "    - blk-mq-sched: add new parameter nr_requests in blk_mq_alloc_sched_tags()",
                            "    - blk-mq: fix potential deadlock while nr_requests grown",
                            "    - arm64: dts: allwinner: a527: cubie-a5e: Add ethernet PHY reset setting",
                            "    - arm64: dts: allwinner: t527: avaota-a1: Add ethernet PHY reset setting",
                            "    - arm64: dts: rockchip: Add RTC on rk3576-evb1-v10",
                            "    - arm64: dts: rockchip: Add WiFi on rk3576-evb1-v10",
                            "    - arm64: dts: rockchip: Fix network on rk3576 evb1 board",
                            "    - arm64: dts: ti: k3-j742s2-mcu-wakeup: Override firmware-name for MCU R5F",
                            "      cores",
                            "    - arm64: dts: ti: k3: Rename rproc reserved-mem nodes to 'memory@addr'",
                            "    - Revert \"arm64: dts: ti: k3-j721e-sk: Fix reversed C6x carveout",
                            "      locations\"",
                            "    - Revert \"arm64: dts: ti: k3-j721e-beagleboneai64: Fix reversed C6x",
                            "      carveout locations\"",
                            "    - arm64: dts: mediatek: mt8188: Change efuse fallback compatible to mt8186",
                            "    - arm64: dts: mediatek: mt8186-tentacruel: Fix touchscreen model",
                            "    - arm64: dts: ti: k3-pinctrl: Fix the bug in existing macros",
                            "    - arm64: dts: renesas: r9a09g047e57-smarc: Fix gpio key's pin control node",
                            "    - arm64: dts: mediatek: mt6331: Fix pmic, regulators, rtc, keys node names",
                            "    - mmc: core: Fix variable shadowing in mmc_route_rpmb_frames()",
                            "    - arm64: dts: mediatek: mt6795-xperia-m5: Fix mmc0 latch-ck value",
                            "    - arm64: dts: mediatek: mt7986a: Fix PCI-Express T-PHY node address",
                            "    - arm64: dts: mediatek: mt8395-kontron-i1200: Fix MT6360 regulator nodes",
                            "    - arm64: dts: mediatek: mt8516-pumpkin: Fix machine compatible",
                            "    - arm64: dts: allwinner: a527: cubie-a5e: Add LEDs",
                            "    - arm64: dts: allwinner: a527: cubie-a5e: Drop external 32.768 KHz crystal",
                            "    - arm64: dts: allwinner: t527: avaota-a1: hook up external 32k crystal",
                            "    - arm64: dts: allwinner: t527: orangepi-4a: hook up external 32k crystal",
                            "    - pwm: tiehrpwm: Don't drop runtime PM reference in .free()",
                            "    - pwm: tiehrpwm: Make code comment in .free() more useful",
                            "    - pwm: tiehrpwm: Fix various off-by-one errors in duty-cycle calculation",
                            "    - pwm: tiehrpwm: Fix corner case in clock divisor calculation",
                            "    - ACPICA: Apply ACPI_NONSTRING",
                            "    - ACPICA: Fix largest possible resource descriptor index",
                            "    - riscv, bpf: Sign extend struct ops return values properly",
                            "    - nvme-auth: update bi_directional flag",
                            "    - nvmet-fc: move lsop put work to nvmet_fc_ls_req_op",
                            "    - nvmet-fcloop: call done callback even when remote port is gone",
                            "    - nvme-tcp: send only permitted commands for secure concat",
                            "    - i3c: master: svc: Use manual response for IBI events",
                            "    - i3c: master: svc: Recycle unused IBI slot",
                            "    - block: update validation of atomic writes boundary for stacked devices",
                            "    - block: fix stacking of atomic writes when atomics are not supported",
                            "    - selftests: watchdog: skip ping loop if WDIOF_KEEPALIVEPING not supported",
                            "    - selftests/kselftest_harness: Add harness-selftest.expected to TEST_FILES",
                            "    - blk-throttle: fix throtl_data leak during disk release",
                            "    - bpf: Explicitly check accesses to bpf_sock_addr",
                            "    - mmc: select REGMAP_MMIO with MMC_LOONGSON2",
                            "    - selftests/futex: Fix futex_wait() for 32bit ARM",
                            "    - selftest/futex: Make the error check more precise for futex_numa_mpol",
                            "    - selftest/futex: Compile also with libnuma < 2.0.16",
                            "    - bpf: dont report verifier bug for missing bpf_scc_visit on speculative",
                            "      path",
                            "    - bpf, arm64: Call bpf_jit_binary_pack_finalize() in bpf_jit_free()",
                            "    - arm64: dts: apple: t600x: Add missing WiFi properties",
                            "    - arm64: dts: apple: t600x: Add bluetooth device nodes",
                            "    - arm64: dts: apple: Add ethernet0 alias for J375 template",
                            "    - selftests: always install UAPI headers to the correct directory",
                            "    - smp: Fix up and expand the smp_call_function_many() kerneldoc",
                            "    - mfd: max77705: max77705_charger: move active discharge setting to mfd",
                            "      parent",
                            "    - power: supply: max77705_charger: refactoring: rename charger to chg",
                            "    - power: supply: max77705_charger: use regfields for config registers",
                            "    - power: supply: max77705_charger: rework interrupts",
                            "    - tools/nolibc: make time_t robust if __kernel_old_time_t is missing in",
                            "      host headers",
                            "    - spi: fix return code when spi device has too many chipselects",
                            "    - clocksource/drivers/timer-tegra186: Avoid 64-bit divide operation",
                            "    - clocksource/drivers/tegra186: Avoid 64-bit division",
                            "    - bpf: Mark kfuncs as __noclone",
                            "    - once: fix race by moving DO_ONCE to separate section",
                            "    - hwmon: (mlxreg-fan) Separate methods of fan setting coming from",
                            "      different subsystems",
                            "    - tools/nolibc: add stdbool.h to nolibc includes",
                            "    - thermal/drivers/qcom: Make LMH select QCOM_SCM",
                            "    - thermal/drivers/qcom/lmh: Add missing IRQ includes",
                            "    - i2c: mediatek: fix potential incorrect use of I2C_MASTER_WRRD",
                            "    - i2c: spacemit: ensure bus release check runs when wait_bus_idle() fails",
                            "    - i2c: spacemit: remove stop function to avoid bus error",
                            "    - i2c: spacemit: disable SDA glitch fix to avoid restart delay",
                            "    - i2c: spacemit: check SDA instead of SCL after bus reset",
                            "    - i2c: spacemit: ensure SDA is released after bus reset",
                            "    - i2c: designware: Fix clock issue when PM is disabled",
                            "    - i2c: designware: Add disabling clocks when probe fails",
                            "    - libbpf: Fix error when st-prefix_ops and ops from differ btf",
                            "    - bpf: Enforce expected_attach_type for tailcall compatibility",
                            "    - i3c: fix big-endian FIFO transfers",
                            "    - mfd: max77705: Setup the core driver as an interrupt controller",
                            "    - drm/sched: Fix a race in DRM_GPU_SCHED_STAT_NO_HANG test",
                            "    - drm/panel-edp: Add disable to 100ms for MNB601LS1-4",
                            "    - drm/display: bridge-connector: correct CEC bridge pointers in",
                            "      drm_bridge_connector_init",
                            "    - drm/panel-edp: Add 50ms disable delay for four panels",
                            "    - drm/vmwgfx: fix missing assignment to ts",
                            "    - drm/amd/display: Reduce Stack Usage by moving 'audio_output' into",
                            "      'stream_res' v4",
                            "    - drm/panel: novatek-nt35560: Fix invalid return value",
                            "    - drm/amdgpu: fix link error for !PM_SLEEP",
                            "    - drm/amdgpu: Fix jpeg v4.0.3 poison irq call trace on sriov guest",
                            "    - drm/amdgpu: Fix vcn v4.0.3 poison irq call trace on sriov guest",
                            "    - PCI: endpoint: pci-ep-msi: Fix NULL vs IS_ERR() check in",
                            "      pci_epf_write_msi_msg()",
                            "    - PCI: xgene-msi: Return negative -EINVAL in xgene_msi_handler_setup()",
                            "    - drm/radeon/r600_cs: clean up of dead code in r600_cs",
                            "    - f2fs: fix condition in __allow_reserved_blocks()",
                            "    - f2fs: fix to avoid overflow while left shift operation",
                            "    - f2fs: fix to zero data after EOF for compressed file correctly",
                            "    - drm/bridge: it6505: select REGMAP_I2C",
                            "    - wifi: rtw88: Lock rtwdev->mutex before setting the LED",
                            "    - HID: steelseries: refactor probe() and remove()",
                            "    - media: zoran: Remove zoran_fh structure",
                            "    - phy: rockchip: naneng-combphy: Enable U3 OTG port for RK3568",
                            "    - drm/bridge: cdns-dsi: Fix the _atomic_check()",
                            "    - usb: host: max3421-hcd: Fix error pointer dereference in probe cleanup",
                            "    - usb: misc: qcom_eud: Access EUD_MODE_MANAGER2 through secure calls",
                            "    - PCI/pwrctrl: Fix double cleanup on devm_add_action_or_reset() failure",
                            "    - misc: pci_endpoint_test: Fix array underflow in",
                            "      pci_endpoint_test_ioctl()",
                            "    - serial: max310x: Add error checking in probe()",
                            "    - drm/amd/display: Remove redundant semicolons",
                            "    - drm/amd/display: Add NULL pointer checks in dc_stream cursor attribute",
                            "      functions",
                            "    - crypto: keembay - Add missing check after sg_nents_for_len()",
                            "    - hwrng: nomadik - add ARM_AMBA dependency",
                            "    - docs: iio: ad3552r: Fix malformed code-block directive",
                            "    - fwctl/mlx5: Fix memory alloc/free in mlx5ctl_fw_rpc()",
                            "    - scsi: pm80xx: Restore support for expanders",
                            "    - scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod",
                            "    - scsi: libsas: Add dev_parent_is_expander() helper",
                            "    - scsi: pm80xx: Use dev_parent_is_expander() helper",
                            "    - scsi: pm80xx: Add helper function to get the local phy id",
                            "    - scsi: pm80xx: Fix pm8001_abort_task() for chip_8006 when using an",
                            "      expander",
                            "    - mptcp: Fix up subflow's memcg when CONFIG_SOCK_CGROUP_DATA=n.",
                            "    - scsi: myrs: Fix dma_alloc_coherent() error check",
                            "    - f2fs: fix to clear unusable_cap for checkpoint=enable",
                            "    - f2fs: fix to avoid NULL pointer dereference in",
                            "      f2fs_check_quota_consistency()",
                            "    - f2fs: fix to allow removing qf_name",
                            "    - Revert \"UBUNTU: SAUCE: drm/dp: drm_edp_backlight_set_level: do not",
                            "      always send 3-byte commands\"",
                            "    - drm/dp: drm_edp_backlight_set_level: do not always send 3-byte commands",
                            "    - crypto: octeontx2 - Call strscpy() with correct size argument",
                            "    - drm: re-allow no-op changes on non-primary planes in async flips",
                            "    - media: rj54n1cb0c: Fix memleak in rj54n1_probe()",
                            "    - media: staging/ipu7: convert to use pci_alloc_irq_vectors() API",
                            "    - media: staging/ipu7: Don't set name for IPU7 PCI device",
                            "    - media: staging/ipu7: cleanup the MMU correctly in IPU7 driver release",
                            "    - media: i2c: vd55g1: Fix duster register address",
                            "    - drm/panel: Allow powering on panel follower after panel is enabled",
                            "    - HID: i2c-hid: Make elan touch controllers power on after panel is",
                            "      enabled",
                            "    - RDMA/mlx5: Better estimate max_qp_wr to reflect WQE count",
                            "    - RDMA/mlx5: Fix vport loopback forcing for MPV device",
                            "    - wifi: rtw88: Use led->brightness_set_blocking for PCI too",
                            "    - net: phy: introduce phy_id_compare_vendor() PHY ID helper",
                            "    - net: phy: as21xxx: better handle PHY HW reset on soft-reboot",
                            "    - PCI: rcar-host: Pass proper IRQ domain to generic_handle_domain_irq()",
                            "    - fuse: remove unneeded offset assignment when filling write pages",
                            "    - PCI: qcom: Restrict port parsing only to PCIe bridge child nodes",
                            "    - cdx: don't select CONFIG_GENERIC_MSI_IRQ",
                            "    - PCI/ACPI: Fix pci_acpi_preserve_config() memory leak",
                            "    - HID: i2c-hid: Fix test in i2c_hid_core_register_panel_follower()",
                            "    - ALSA: lx_core: use int type to store negative error codes",
                            "    - media: st-delta: avoid excessive stack usage",
                            "    - drm/amdgpu/vcn: Add regdump helper functions",
                            "    - drm/amdgpu/vcn: Hold pg_lock before vcn power off",
                            "    - drm/amdgpu: Check vcn state before profile switch",
                            "    - accel/amdxdna: Use int instead of u32 to store error codes",
                            "    - efi: Explain OVMF acronym in OVMF_DEBUG_LOG help text",
                            "    - net: dst: introduce dst->dev_rcu",
                            "    - ipv6: mcast: Add ip6_mc_find_idev() helper",
                            "    - ipv6: start using dst_dev_rcu()",
                            "    - ipv6: use RCU in ip6_xmit()",
                            "    - ipv6: use RCU in ip6_output()",
                            "    - net: use dst_dev_rcu() in sk_setup_caps()",
                            "    - tcp_metrics: use dst_dev_net_rcu()",
                            "    - ipv4: start using dst_dev_rcu()",
                            "    - crypto: hisilicon/zip - remove unnecessary validation for high-",
                            "      performance mode configurations",
                            "    - crypto: hisilicon - re-enable address prefetch after device resuming",
                            "    - crypto: hisilicon - check the sva module status while enabling or",
                            "      disabling address prefetch",
                            "    - crypto: hisilicon/qm - check whether the input function and PF are on",
                            "      the same device",
                            "    - crypto: hisilicon/qm - request reserved interrupt for virtual function",
                            "    - inet: ping: check sock_net() in ping_get_port() and ping_lookup()",
                            "    - dmaengine: Fix dma_async_tx_descriptor->tx_submit documentation",
                            "    - coresight: trbe: Add ISB after TRBLIMITR write",
                            "    - coresight: Fix missing include for FIELD_GET",
                            "    - coresight: Only register perf symlink for sinks with alloc_buffer",
                            "    - drm/amdgpu: Power up UVD 3 for FW validation (v2)",
                            "    - drm/amd/pm: Disable ULV even if unsupported (v3)",
                            "    - drm/amd/pm: Fix si_upload_smc_data (v3)",
                            "    - drm/amd/pm: Adjust si_upload_smc_data register programming (v3)",
                            "    - drm/amd/pm: Treat zero vblank time as too short in si_dpm (v3)",
                            "    - drm/amd/pm: Disable MCLK switching with non-DC at 120 Hz+ (v2)",
                            "    - drm/amd/pm: Disable SCLK switching on Oland with high pixel clocks (v3)",
                            "    - wifi: mac80211: Make CONNECTION_MONITOR optional for MLO sta",
                            "    - wifi: mwifiex: send world regulatory domain to driver",
                            "    - wifi: brcmfmac: fix 43752 SDIO FWVID incorrectly labelled as Cypress",
                            "      (CYW)",
                            "    - drm/msm: Do not validate SSPP when it is not ready",
                            "    - PCI: tegra: Fix devm_kcalloc() argument order for port->phys allocation",
                            "    - wifi: mac80211: consider links for validating SCAN_FLAG_AP in scan",
                            "      request during MLO",
                            "    - PCI: qcom: Add equalization settings for 8.0 GT/s and 32.0 GT/s",
                            "    - tcp: fix __tcp_close() to only send RST when required",
                            "    - fanotify: Validate the return value of mnt_ns_from_dentry() before",
                            "      dereferencing",
                            "    - drm/amdkfd: Fix error code sign for EINVAL in svm_ioctl()",
                            "    - usb: phy: twl6030: Fix incorrect type for ret",
                            "    - usb: gadget: configfs: Correctly set use_os_string at bind",
                            "    - tty: n_gsm: Don't block input queue by waiting MSC",
                            "    - misc: genwqe: Fix incorrect cmd field being reported in error",
                            "    - pps: fix warning in pps_register_cdev when register device fail",
                            "    - drm/msm: Fix obj leak in VM_BIND error path",
                            "    - drm/msm: Fix missing VM_BIND offset/range validation",
                            "    - wifi: iwlwifi: Remove redundant header files",
                            "    - drm/msm/mdp4: stop supporting no-IOMMU configuration",
                            "    - drm/msm: stop supporting no-IOMMU configuration",
                            "    - idpf: fix Rx descriptor ready check barrier in splitq",
                            "    - ASoC: Intel: bytcht_es8316: Fix invalid quirk input mapping",
                            "    - ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping",
                            "    - ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping",
                            "    - ipv6: snmp: do not use SNMP_MIB_SENTINEL anymore",
                            "    - ipv6: snmp: do not track per idev ICMP6_MIB_RATELIMITHOST",
                            "    - drm/msm: Fix bootup splat with separate_gpu_drm modparam",
                            "    - drm/msm/dpu: fix incorrect type for ret",
                            "    - wifi: mac80211: fix reporting of all valid links in sta_set_sinfo()",
                            "    - fs: ntfs3: Fix integer overflow in run_unpack()",
                            "    - fs/ntfs3: reject index allocation if $BITMAP is empty but blocks exist",
                            "    - iio: consumers: Fix handling of negative channel scale in",
                            "      iio_convert_raw_to_processed()",
                            "    - iio: consumers: Fix offset handling in iio_convert_raw_to_processed()",
                            "    - mm/slub: Fix cmp_loc_by_count() to return 0 when counts are equal",
                            "    - tools: ynl: fix undefined variable name",
                            "    - RDMA/mlx5: Fix page size bitmap calculation for KSM mode",
                            "    - netfilter: ipset: Remove unused htable_bits in macro ahash_region",
                            "    - ipvs: Use READ_ONCE/WRITE_ONCE for ipvs->enable",
                            "    - HID: steelseries: Fix STEELSERIES_SRWS1 handling in steelseries_remove()",
                            "    - watchdog: intel_oc_wdt: Do not try to write into const memory",
                            "    - watchdog: mpc8xxx_wdt: Reload the watchdog timer when enabling the",
                            "      watchdog",
                            "    - PCI: endpoint: pci-epf-test: Fix doorbell test support",
                            "    - drivers/base/node: handle error properly in register_one_node()",
                            "    - RDMA/cm: Rate limit destroy CM ID timeout error message",
                            "    - wifi: mt76: mt7996: Fix mt7996_mcu_sta_ba wcid configuration",
                            "    - wifi: mt76: mt7996: Fix mt7996_mcu_bss_mld_tlv routine",
                            "    - wifi: mt76: fix potential memory leak in mt76_wmac_probe()",
                            "    - wifi: mt76: mt7996: Use proper link_id in link_sta_rc_update callback",
                            "    - wifi: mt76: mt7996: Check phy before init msta_link in",
                            "      mt7996_mac_sta_add_links()",
                            "    - wifi: mt76: mt7996: Fix tx-queues initialization for second phy on",
                            "      mt7996",
                            "    - wifi: mt76: mt7996: Fix RX packets configuration for primary WED device",
                            "    - wifi: mt76: mt7996: Convert mt7996_wed_rro_addr to LE",
                            "    - wifi: mt76: mt7915: fix mt7981 pre-calibration",
                            "    - wifi: mt76: mt7996: remove redundant per-phy mac80211 calls during",
                            "      restart",
                            "    - ASoC: Intel: hda-sdw-bpt: set persistent_buffer false",
                            "    - srcu/tiny: Remove preempt_disable/enable() in srcu_gp_start_if_needed()",
                            "    - drm/amdgpu: Fix allocating extra dwords for rings (v2)",
                            "    - f2fs: fix to update map->m_next_extent correctly in f2fs_map_blocks()",
                            "    - f2fs: fix to truncate first page in error path of f2fs_truncate()",
                            "    - f2fs: fix to avoid migrating empty section",
                            "    - f2fs: fix to mitigate overhead of f2fs_zero_post_eof_page()",
                            "    - RISC-V: KVM: Write hgatp register with valid mode bits",
                            "    - ALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on",
                            "      PREEMPT_RT",
                            "    - ACPI: NFIT: Fix incorrect ndr_desc being reportedin dev_err message",
                            "    - scsi: qla2xxx: edif: Fix incorrect sign of error code",
                            "    - scsi: qla2xxx: Fix incorrect sign of error code in START_SP_W_RETRIES()",
                            "    - scsi: qla2xxx: Fix incorrect sign of error code in qla_nvme_xmt_ls_rsp()",
                            "    - HID: hidraw: tighten ioctl command parsing",
                            "    - f2fs: fix zero-sized extent for precache extents",
                            "    - smc: Fix use-after-free in __pnet_find_base_ndev().",
                            "    - smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().",
                            "    - smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().",
                            "    - smc: Use __sk_dst_get() and dst_dev_rcu() in smc_vlan_by_tcpsk().",
                            "    - tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().",
                            "    - mptcp: Call dst_release() in mptcp_active_enable().",
                            "    - mptcp: Use __sk_dst_get() and dst_dev_rcu() in mptcp_active_enable().",
                            "    - Revert \"usb: xhci: Avoid Stop Endpoint retry loop if the endpoint seems",
                            "      Running\"",
                            "    - RDMA/core: Resolve MAC of next-hop device without ARP support",
                            "    - IB/sa: Fix sa_local_svc_timeout_ms read race",
                            "    - Documentation: trace: historgram-design: Separate sched_waking histogram",
                            "      section heading and the following diagram",
                            "    - ASoC: SOF: ipc4-pcm: Fix incorrect comparison with number of tdm_slots",
                            "    - wifi: ath12k: initialize eirp_power before use",
                            "    - wifi: ath12k: fix overflow warning on num_pwr_levels",
                            "    - wifi: ath12k: fix signal in radiotap for WCN7850",
                            "    - wifi: ath12k: fix HAL_PHYRX_COMMON_USER_INFO handling in monitor mode",
                            "    - wifi: ath12k: fix the fetching of combined rssi",
                            "    - wifi: ath12k: Add fallback for invalid channel number in PHY metadata",
                            "    - wifi: ath12k: fix wrong logging ID used for CE",
                            "    - wifi: ath10k: avoid unnecessary wait for service ready message",
                            "    - iommu/vt-d: debugfs: Fix legacy mode page table dump logic",
                            "    - wifi: mac80211: fix Rx packet handling when pubsta information is not",
                            "      available",
                            "    - ASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback",
                            "    - sparc: fix accurate exception reporting in copy_{from_to}_user for",
                            "      UltraSPARC",
                            "    - sparc: fix accurate exception reporting in copy_{from_to}_user for",
                            "      UltraSPARC III",
                            "    - sparc: fix accurate exception reporting in copy_{from_to}_user for",
                            "      Niagara",
                            "    - sparc: fix accurate exception reporting in copy_to_user for Niagara 4",
                            "    - sparc: fix accurate exception reporting in copy_{from,to}_user for M7",
                            "    - vfio/pds: replace bitmap_free with vfree",
                            "    - crypto: comp - Use same definition of context alloc and free ops",
                            "    - crypto: hisilicon/qm - set NULL to qm->debug.qm_diff_regs",
                            "    - wifi: ath12k: Fix peer lookup in ath12k_dp_mon_rx_deliver_msdu()",
                            "    - rpmsg: qcom_smd: Fix fallback to qcom,ipc parse",
                            "    - remoteproc: qcom_q6v5_mss: support loading MBN file on msm8974",
                            "    - RDMA/rxe: Fix race in do_task() when draining",
                            "    - selftests/mm: fix va_high_addr_switch.sh failure on x86_64",
                            "    - wifi: rtw89: fix leak in rtw89_core_send_nullfunc()",
                            "    - wifi: rtw89: avoid circular locking dependency in ser_state_run()",
                            "    - PCI: tegra194: Fix duplicate PLL disable in",
                            "      pex_ep_event_pex_rst_assert()",
                            "    - remoteproc: qcom: q6v5: Avoid disabling handover IRQ twice",
                            "    - remoteproc: qcom: pas: Shutdown lite ADSP DTB on X1E",
                            "    - wifi: ath12k: Refactor RX TID deletion handling into helper function",
                            "    - wifi: ath12k: Fix flush cache failure during RX queue update",
                            "    - wifi: cfg80211: fix width unit in cfg80211_radio_chandef_valid()",
                            "    - dm vdo: return error on corrupted metadata in start_restoring_volume",
                            "      functions",
                            "    - coresight: fix indentation error in cscfg_remove_owned_csdev_configs()",
                            "    - coresight-etm4x: Conditionally access register TRCEXTINSELR",
                            "    - coresight: tmc: Support atclk",
                            "    - coresight: catu: Support atclk",
                            "    - coresight: etm4x: Support atclk",
                            "    - coresight: Appropriately disable programming clocks",
                            "    - coresight: Appropriately disable trace bus clocks",
                            "    - coresight: Avoid enable programming clock duplicately",
                            "    - coresight: trbe: Return NULL pointer for allocation failures",
                            "    - coresight: tpda: fix the logic to setup the element size",
                            "    - coresight: Fix incorrect handling for return value of devm_kzalloc",
                            "    - NFSv4.1: fix backchannel max_resp_sz verification check",
                            "    - net: ethtool: tsconfig: set command must provide a reply",
                            "    - netfilter: nfnetlink: reset nlh pointer during batch replay",
                            "    - netfilter: nf_conntrack: do not skip entries in /proc/net/nf_conntrack",
                            "    - scsi: ufs: core: Fix data race in CPU latency PM QoS request handling",
                            "    - scsi: mpt3sas: Fix crash in transport port remove by using ioc_info()",
                            "    - usb: vhci-hcd: Prevent suspending virtually attached devices",
                            "    - PCI: rcar-gen4: Add missing 1ms delay after PWR reset assertion",
                            "    - PCI: rcar-gen4: Assure reset occurs before DBI access",
                            "    - PCI: rcar-gen4: Fix inverted break condition in PHY initialization",
                            "    - ASoC: qcom: sc8280xp: use sa8775p/ subdir for QCS9100 / QCS9075",
                            "    - iommu/vt-d: Disallow dirty tracking if incoherent page walk",
                            "    - iommu/selftest: prevent use of uninitialized variable",
                            "    - RDMA/siw: Always report immediate post SQ errors",
                            "    - net: enetc: Fix probing error message typo for the ENETCv4 PF driver",
                            "    - net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast",
                            "    - ptp: Add a upper bound on max_vclocks",
                            "    - vhost: vringh: Fix copy_to_iter return value check",
                            "    - net: macb: remove illusion about TBQPH/RBQPH being per-queue",
                            "    - net: macb: move ring size computation to functions",
                            "    - net: macb: single dma_alloc_coherent() for DMA descriptors",
                            "    - Bluetooth: btintel_pcie: Refactor Device Coredump",
                            "    - Bluetooth: MGMT: Fix not exposing debug UUID on",
                            "      MGMT_OP_READ_EXP_FEATURES_INFO",
                            "    - Bluetooth: ISO: Fix possible UAF on iso_conn_free",
                            "    - Bluetooth: ISO: free rx_skb if not consumed",
                            "    - Bluetooth: ISO: don't leak skb in ISO_CONT RX",
                            "    - Bluetooth: hci_sync: Fix using random address for BIG/PA advertisements",
                            "    - KEYS: X.509: Fix Basic Constraints CA flag parsing",
                            "    - hwrng: ks-sa - fix division by zero in ks_sa_rng_init",
                            "    - cramfs: fix incorrect physical page address calculation",
                            "    - ocfs2: fix double free in user_cluster_connect()",
                            "    - drivers/base/node: fix double free in register_one_node()",
                            "    - f2fs: fix UAF issue in f2fs_merge_page_bio()",
                            "    - mtd: rawnand: atmel: Fix error handling path in",
                            "      atmel_nand_controller_add_nands",
                            "    - PCI: j721e: Fix incorrect error message in probe()",
                            "    - idpf: fix mismatched free function for dma_alloc_coherent",
                            "    - tcp: use skb->len instead of skb->truesize in tcp_can_ingest()",
                            "    - nfp: fix RSS hash key size when RSS is not supported",
                            "    - net: ena: return 0 in ena_get_rxfh_key_size() when RSS hash key is not",
                            "      configurable",
                            "    - net: dlink: handle copy_thresh allocation failure",
                            "    - net/mlx5: Stop polling for command response if interface goes down",
                            "    - net/mlx5: pagealloc: Fix reclaim race during command interface teardown",
                            "    - net/mlx5: fw reset, add reset timeout work",
                            "    - smb: client: fix crypto buffers in non-linear memory",
                            "    - bonding: fix xfrm offload feature setup on active-backup mode",
                            "    - net: enetc: initialize SW PIR and CIR based HW PIR and CIR values",
                            "    - iommufd: Register iommufd mock devices with fwspec",
                            "    - Revert \"net/mlx5e: Update and set Xon/Xoff upon MTU set\"",
                            "    - NFSD: filecache: add STATX_DIOALIGN and STATX_DIO_READ_ALIGN support",
                            "    - nfs/localio: avoid issuing misaligned IO using O_DIRECT",
                            "    - octeontx2-vf: fix bitmap leak",
                            "    - octeontx2-pf: fix bitmap leak",
                            "    - vhost: vringh: Modify the return value check",
                            "    - selftests/bpf: Fix typos and grammar in test sources",
                            "    - selftests/bpf: move get_ksyms and get_addrs to trace_helpers.c",
                            "    - selftests/bpf: Fix realloc size in bpf_get_addrs",
                            "    - bpf: Skip scalar adjustment for BPF_NEG if dst is a pointer",
                            "    - bpf: Reject negative offsets for ALU ops",
                            "    - tpm: Disable TPM2_TCG_HMAC by default",
                            "    - ALSA: hda/hdmi: Add pin fix for HP ProDesk model",
                            "    - ALSA: hda/realtek: Add quirk for HP Spectre 14t-ea100",
                            "    - Squashfs: fix uninit-value in squashfs_get_parent",
                            "    - uio_hv_generic: Let userspace take care of interrupt mask",
                            "    - hisi_acc_vfio_pci: Fix reference leak in hisi_acc_vfio_debug_init",
                            "    - io_uring/waitid: always prune wait queue entry in io_waitid_wait()",
                            "    - io_uring/zcrx: fix overshooting recv limit",
                            "    - ASoC: wcd934x: fix error handling in wcd934x_codec_parse_data()",
                            "    - ASoC: SOF: ipc3-topology: Fix multi-core and static pipelines tear down",
                            "    - ASoC: codecs: wcd937x: set the comp soundwire port correctly",
                            "    - ASoC: codecs: wcd937x: make stub functions inline",
                            "    - ASoC: SOF: ipc4-pcm: fix delay calculation when DSP resamples",
                            "    - ASoC: SOF: ipc4-pcm: fix start offset calculation for chain DMA",
                            "    - fs: udf: fix OOB read in lengthAllocDescs handling",
                            "    - net: nfc: nci: Add parameter validation for packet data",
                            "    - mfd: rz-mtu3: Fix MTU5 NFCR register offset",
                            "    - mfd: intel_soc_pmic_chtdc_ti: Set use_single_read regmap_config flag",
                            "    - mfd: vexpress-sysreg: Check the return value of devm_gpiochip_add_data()",
                            "    - tracing: Fix lock imbalance in s_start() memory allocation failure path",
                            "    - tracing: Fix race condition in kprobe initialization causing NULL",
                            "      pointer dereference",
                            "    - tracing: Fix wakeup tracers on failure of acquiring calltime",
                            "    - tracing: Fix irqoff tracers on failure of acquiring calltime",
                            "    - tracing: Have trace_marker use per-cpu data to read user space",
                            "    - tracing: Fix tracing_mark_raw_write() to use buf and not ubuf",
                            "    - tracing: Stop fortify-string from warning in tracing_mark_raw_write()",
                            "    - dm: fix queue start/stop imbalance under suspend/load/resume races",
                            "    - dm: fix NULL pointer dereference in __dm_suspend()",
                            "    - LoongArch: Automatically disable kaslr if boot from kexec_file",
                            "    - pwm: loongson: Fix LOONGSON_PWM_FREQ_DEFAULT",
                            "    - LoongArch: BPF: Sign-extend struct ops return values properly",
                            "    - LoongArch: BPF: No support of struct argument in trampoline programs",
                            "    - LoongArch: BPF: Don't align trampoline size",
                            "    - LoongArch: BPF: Make trampoline size stable",
                            "    - LoongArch: BPF: Make error handling robust in",
                            "      arch_prepare_bpf_trampoline()",
                            "    - LoongArch: BPF: Remove duplicated bpf_flush_icache()",
                            "    - LoongArch: BPF: No text_poke() for kernel text",
                            "    - LoongArch: BPF: Remove duplicated flags check",
                            "    - LoongArch: BPF: Fix uninitialized symbol 'retval_off'",
                            "    - mm/ksm: fix flag-dropping behavior in ksm_madvise",
                            "    - ksmbd: Fix race condition in RPC handle list access",
                            "    - ksmbd: fix error code overwriting in smb2_get_info_filesystem()",
                            "    - ksmbd: add max ip connections parameter",
                            "    - ext4: fix potential null deref in ext4_mb_init()",
                            "    - ext4: fix checks for orphan inodes",
                            "    - KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn't valid",
                            "    - fbdev: simplefb: Fix use after free in simplefb_detach_genpds()",
                            "    - mm: hugetlb: avoid soft lockup when mprotect to large memory area",
                            "    - selftests/mm: skip soft-dirty tests when CONFIG_MEM_SOFT_DIRTY is",
                            "      disabled",
                            "    - nvdimm: ndtest: Return -ENOMEM if devm_kcalloc() fails in ndtest_probe()",
                            "    - misc: fastrpc: Save actual DMA size in fastrpc_map structure",
                            "    - misc: fastrpc: Fix fastrpc_map_lookup operation",
                            "    - misc: fastrpc: fix possible map leak in fastrpc_put_args",
                            "    - misc: fastrpc: Skip reference for DMA handles",
                            "    - Input: atmel_mxt_ts - allow reset GPIO to sleep",
                            "    - Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info",
                            "      leak",
                            "    - sunrpc: fix null pointer dereference on zero-length checksum",
                            "    - PCI/AER: Avoid NULL pointer dereference in aer_ratelimit()",
                            "    - remoteproc: pru: Fix potential NULL pointer dereference in",
                            "      pru_rproc_set_ctable()",
                            "    - PCI: endpoint: pci-epf-test: Add NULL check for DMA channels before",
                            "      release",
                            "    - thunderbolt: Fix use-after-free in tb_dp_dprx_work",
                            "    - tee: fix register_shm_helper()",
                            "    - pinctrl: check the return value of pinmux_ops::get_function_name()",
                            "    - bus: fsl-mc: Check return value of platform_get_resource()",
                            "    - net/9p: Fix buffer overflow in USB transport layer",
                            "    - net: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock",
                            "    - usb: typec: tipd: Clear interrupts first",
                            "    - arm64: dts: qcom: qcm2290: Disable USB SS bus instances in park mode",
                            "    - usb: cdns3: cdnsp-pci: remove redundant pci_disable_device() call",
                            "    - scsi: ufs: core: Fix PM QoS mutex initialization",
                            "    - drm/amdgpu/vcn: Fix double-free of vcn dump buffer",
                            "    - Linux 6.17.3",
                            "  * CVE-2025-40019",
                            "    - crypto: essiv - Check ssize for decryption and in-place encryption",
                            "  * CVE-2025-40214",
                            "    - af_unix: Initialise scc_index in unix_add_edge().",
                            "  * Miscellaneous Ubuntu changes",
                            "    - [SAUCE] Fix selftest/net/rtnetlink.sh for Big Endian",
                            "",
                            "  [ Ubuntu-riscv: 6.17.0-12.12.1 ]",
                            "",
                            "  * questing/linux-riscv: 6.17.0-12.12.1 -proposed tracker (LP: #2138113)",
                            "  [ Ubuntu: 6.17.0-12.12 ]",
                            "  * questing/linux: 6.17.0-12.12 -proposed tracker (LP: #2138115)",
                            "  * CVE-2025-40019",
                            "    - crypto: essiv - Check ssize for decryption and in-place encryption",
                            "  * CVE-2025-40214",
                            "    - af_unix: Initialise scc_index in unix_add_edge().",
                            ""
                        ],
                        "package": "linux-riscv-6.17",
                        "version": "6.17.0-14.14.1~24.04.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2137844,
                            2013232,
                            2074082,
                            2137845,
                            1786013,
                            2137849,
                            1786013,
                            2136820,
                            2137698,
                            2129812,
                            2125022,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136813,
                            2132317,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2132095,
                            2131046,
                            2115860,
                            2128792,
                            2121852,
                            2131259,
                            2131259,
                            2131702,
                            2129610,
                            2138113,
                            2138115
                        ],
                        "author": "Emil Renner Berthing <emil.renner.berthing@canonical.com>",
                        "date": "Tue, 27 Jan 2026 20:04:21 +0100"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * noble/linux-riscv-6.17: 6.17.0-9.9.1~24.04.1 -proposed tracker (LP: #2133507)",
                            "",
                            "  * Enable Nezha board (LP: #1975592)",
                            "    - SAUCE: mmc: pwrseq_simple: always fall back to GPIO based reset control",
                            "    - SAUCE: nvmem: core: update cell->bytes after shifting bits",
                            "    - SAUCE: dt-bindings: pwm: Add binding for Allwinner D1/T113-S3/R329 PWM",
                            "      controller",
                            "    - SAUCE: pwm: Add Allwinner's D1/T113-S3/R329 SoCs PWM support",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add pwm node",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add PWM pins",
                            "    - SAUCE: mmc: sunxi-mmc: Correct the maximum segment size",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add misc nodes",
                            "    - SAUCE: riscv: dts: allwinner: Keep aldo regulator on",
                            "    - SAUCE: riscv: dts: allwinner: Add button on the Nezha board",
                            "    - SAUCE: riscv: dts: allwinner: Add button on the Lichee RV Dock",
                            "    - SAUCE: regulator: dt-bindings: Add Allwinner D1 LDOs",
                            "    - SAUCE: regulator: sun20i: Add support for Allwinner D1 analog LDOs",
                            "    - SAUCE: regulator: sun20i: Use device_node_to_regmap()",
                            "    - SAUCE: dt-bindings: thermal: sun8i: Add compatible for D1",
                            "    - SAUCE: thermal: sun8i: Set the event type for new samples",
                            "    - SAUCE: thermal: sun8i: Ensure vref is powered",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add thermal sensor and zone",
                            "    - SAUCE: riscv: dts: allwinner: d1: Hook up PWM-controlled CPU voltage",
                            "      regulators",
                            "    - SAUCE: drm/sun4i: dsi: Allow panel attach before card registration",
                            "    - SAUCE: drm/sun4i: mixer: Remove unused CMA headers",
                            "    - SAUCE: drm/sun4i: tcon: Always protect the LCD dotclock rate",
                            "    - SAUCE: drm/sun4i: tcon_top: Register reset, clock gates in probe",
                            "    - SAUCE: riscv: dts: allwinner: lichee-rv-86-panel-480p: Add panel",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add HDMI pipeline",
                            "    - SAUCE: riscv: dts: allwinner: d1: Enable HDMI on supported boards",
                            "    - SAUCE: dt-bindings: display: sun4i-tcon: Add external LVDS PHY",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add LVDS0 PHY",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add LED controller node",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add RGB LEDs to boards",
                            "    - SAUCE: ASoC: sun20i-codec: New driver for D1 internal codec",
                            "    - SAUCE: [WIP] ASoC: sun20i-codec: What is this ramp thing?",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add sound cards to boards",
                            "    - SAUCE: dt-bindings: display: sun8i-a83t-dw-hdmi: Remove #phy-cells",
                            "    - SAUCE: dt-bindings: display: Add D1 HDMI compatibles",
                            "    - SAUCE: drm/sun4i: Add support for D1 HDMI",
                            "    - SAUCE: drm/sun4i: sun8i-hdmi-phy: Add support for D1 PHY",
                            "    - SAUCE: [HACK] drm/sun4i: Copy in BSP code for D1 HDMI PHY",
                            "    - SAUCE: riscv: dts: allwinner: Add Nezha and Lichee RV SPI nodes",
                            "    - SAUCE: dt-bindings: display: Add Sitronix ST7701s panel binding",
                            "    - SAUCE: drm/panel: Add driver for ST7701s DPI LCD panel",
                            "    - [Config] riscv: updateconfigs for D1 support",
                            "",
                            "  * Enable StarFive VisionFive 2 board (LP: #2013232)",
                            "    - SAUCE: PCI: starfive: Offload the NVMe timeout workaround to host",
                            "      drivers.",
                            "    - SAUCE: pwm: opencores: Add PWM driver support",
                            "    - riscv: dts: starfive: jh7110-common: drop no-sdio property from mmc1",
                            "    - dt-bindings: memory-controllers: add StarFive JH7110 SoC DMC",
                            "    - riscv: dts: starfive: jh7110: add DMC memory controller",
                            "    - riscv: dts: starfive: jh7110: bootph-pre-ram hinting needed by boot",
                            "      loader",
                            "    - riscv: dts: starfive: jh7110-common: drop no-mmc property from mmc1",
                            "    - riscv: dts: starfive: jh7110-common: drop mmc post-power-on-delay-ms",
                            "    - riscv: dts: starfive: add common board dtsi for Milk-V Mars CM variants",
                            "    - dt-bindings: riscv: starfive: add milkv,marscm-emmc",
                            "    - riscv: dts: starfive: add Milk-V Mars CM system-on-module",
                            "    - dt-bindings: riscv: starfive: add milkv,marscm-lite",
                            "    - riscv: dts: starfive: add Milk-V Mars CM Lite system-on-module",
                            "    - SAUCE: dts: starfive: jh7110-common: split out mmc0 reset pins from",
                            "      common into boards",
                            "    - SAUCE: dt-bindings: riscv: Add StarFive JH7110S SoC and VisionFive 2",
                            "      Lite board",
                            "    - SAUCE: riscv: dts: starfive: jh7110-common: Move out some nodes to the",
                            "      board dts",
                            "    - SAUCE: riscv: dts: starfive: Add common board dtsi for VisionFive 2 Lite",
                            "      variants",
                            "    - SAUCE: riscv: dts: starfive: Add VisionFive 2 Lite board device tree",
                            "    - SAUCE: riscv: dts: starfive: Add VisionFive 2 Lite eMMC board device",
                            "      tree",
                            "    - SAUCE: dt-bindings: riscv: starfive: add xunlong,orangepi-rv",
                            "    - SAUCE: riscv: dts: starfive: add Orange Pi RV",
                            "    - [Config] riscv: updateconfigs for JH7110 support",
                            "",
                            "  * Miscellaneous Ubuntu changes",
                            "    - SAUCE: tools/lib/perf: Fix -Werror=alloc-size-larger-than in cpumap.c",
                            "    - [Config] Enable pre-RVA23 hardware",
                            ""
                        ],
                        "package": "linux-riscv-6.17",
                        "version": "6.17.0-9.9.1~24.04.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2133507,
                            1975592,
                            2013232
                        ],
                        "author": "Emil Renner Berthing <emil.renner.berthing@canonical.com>",
                        "date": "Thu, 18 Dec 2025 14:49:05 +0100"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Create Noble backport",
                            "",
                            "  [ Ubuntu: 6.17.0-9.9.1 ]",
                            ""
                        ],
                        "package": "linux-riscv-6.17",
                        "version": "6.17.0-9.9.1~24.04.0",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [],
                        "author": "Emil Renner Berthing <emil.renner.berthing@canonical.com>",
                        "date": "Thu, 18 Dec 2025 14:06:20 +0100"
                    }
                ],
                "notes": "For a newly added package only the three most recent changelog entries are shown.",
                "is_version_downgrade": false
            },
            {
                "name": "linux-tools-6.17.0-14-generic",
                "from_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "to_version": {
                    "source_package_name": "linux-riscv-6.17",
                    "source_package_version": "6.17.0-14.14.1~24.04.1",
                    "version": "6.17.0-14.14.1~24.04.1"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-40256",
                        "url": "https://ubuntu.com/security/CVE-2025-40256",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68204",
                        "url": "https://ubuntu.com/security/CVE-2025-68204",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68203",
                        "url": "https://ubuntu.com/security/CVE-2025-68203",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40267",
                        "url": "https://ubuntu.com/security/CVE-2025-40267",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68198",
                        "url": "https://ubuntu.com/security/CVE-2025-68198",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68199",
                        "url": "https://ubuntu.com/security/CVE-2025-68199",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40268",
                        "url": "https://ubuntu.com/security/CVE-2025-40268",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40269",
                        "url": "https://ubuntu.com/security/CVE-2025-40269",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68205",
                        "url": "https://ubuntu.com/security/CVE-2025-68205",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40270",
                        "url": "https://ubuntu.com/security/CVE-2025-40270",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40271",
                        "url": "https://ubuntu.com/security/CVE-2025-40271",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40272",
                        "url": "https://ubuntu.com/security/CVE-2025-40272",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68245",
                        "url": "https://ubuntu.com/security/CVE-2025-68245",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68240",
                        "url": "https://ubuntu.com/security/CVE-2025-68240",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68241",
                        "url": "https://ubuntu.com/security/CVE-2025-68241",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68211",
                        "url": "https://ubuntu.com/security/CVE-2025-68211",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68246",
                        "url": "https://ubuntu.com/security/CVE-2025-68246",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40273",
                        "url": "https://ubuntu.com/security/CVE-2025-40273",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40212",
                        "url": "https://ubuntu.com/security/CVE-2025-40212",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40274",
                        "url": "https://ubuntu.com/security/CVE-2025-40274",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68202",
                        "url": "https://ubuntu.com/security/CVE-2025-68202",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68239",
                        "url": "https://ubuntu.com/security/CVE-2025-68239",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68247",
                        "url": "https://ubuntu.com/security/CVE-2025-68247",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68208",
                        "url": "https://ubuntu.com/security/CVE-2025-68208",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68200",
                        "url": "https://ubuntu.com/security/CVE-2025-68200",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40275",
                        "url": "https://ubuntu.com/security/CVE-2025-40275",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68242",
                        "url": "https://ubuntu.com/security/CVE-2025-68242",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68243",
                        "url": "https://ubuntu.com/security/CVE-2025-68243",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40276",
                        "url": "https://ubuntu.com/security/CVE-2025-40276",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40277",
                        "url": "https://ubuntu.com/security/CVE-2025-40277",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68206",
                        "url": "https://ubuntu.com/security/CVE-2025-68206",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68209",
                        "url": "https://ubuntu.com/security/CVE-2025-68209",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40278",
                        "url": "https://ubuntu.com/security/CVE-2025-40278",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40279",
                        "url": "https://ubuntu.com/security/CVE-2025-40279",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40280",
                        "url": "https://ubuntu.com/security/CVE-2025-40280",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40281",
                        "url": "https://ubuntu.com/security/CVE-2025-40281",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40282",
                        "url": "https://ubuntu.com/security/CVE-2025-40282",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40283",
                        "url": "https://ubuntu.com/security/CVE-2025-40283",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40284",
                        "url": "https://ubuntu.com/security/CVE-2025-40284",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68210",
                        "url": "https://ubuntu.com/security/CVE-2025-68210",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40285",
                        "url": "https://ubuntu.com/security/CVE-2025-40285",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40286",
                        "url": "https://ubuntu.com/security/CVE-2025-40286",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40287",
                        "url": "https://ubuntu.com/security/CVE-2025-40287",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40288",
                        "url": "https://ubuntu.com/security/CVE-2025-40288",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40289",
                        "url": "https://ubuntu.com/security/CVE-2025-40289",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68201",
                        "url": "https://ubuntu.com/security/CVE-2025-68201",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68207",
                        "url": "https://ubuntu.com/security/CVE-2025-68207",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68244",
                        "url": "https://ubuntu.com/security/CVE-2025-68244",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68316",
                        "url": "https://ubuntu.com/security/CVE-2025-68316",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40292",
                        "url": "https://ubuntu.com/security/CVE-2025-40292",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68180",
                        "url": "https://ubuntu.com/security/CVE-2025-68180",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40327",
                        "url": "https://ubuntu.com/security/CVE-2025-40327",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40328",
                        "url": "https://ubuntu.com/security/CVE-2025-40328",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40291",
                        "url": "https://ubuntu.com/security/CVE-2025-40291",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68322",
                        "url": "https://ubuntu.com/security/CVE-2025-68322",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40293",
                        "url": "https://ubuntu.com/security/CVE-2025-40293",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40294",
                        "url": "https://ubuntu.com/security/CVE-2025-40294",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40329",
                        "url": "https://ubuntu.com/security/CVE-2025-40329",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40295",
                        "url": "https://ubuntu.com/security/CVE-2025-40295",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40296",
                        "url": "https://ubuntu.com/security/CVE-2025-40296",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40297",
                        "url": "https://ubuntu.com/security/CVE-2025-40297",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68320",
                        "url": "https://ubuntu.com/security/CVE-2025-68320",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68169",
                        "url": "https://ubuntu.com/security/CVE-2025-68169",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68197",
                        "url": "https://ubuntu.com/security/CVE-2025-68197",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40330",
                        "url": "https://ubuntu.com/security/CVE-2025-40330",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68192",
                        "url": "https://ubuntu.com/security/CVE-2025-68192",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40331",
                        "url": "https://ubuntu.com/security/CVE-2025-40331",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68187",
                        "url": "https://ubuntu.com/security/CVE-2025-68187",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68167",
                        "url": "https://ubuntu.com/security/CVE-2025-68167",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68319",
                        "url": "https://ubuntu.com/security/CVE-2025-68319",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40298",
                        "url": "https://ubuntu.com/security/CVE-2025-40298",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40299",
                        "url": "https://ubuntu.com/security/CVE-2025-40299",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40301",
                        "url": "https://ubuntu.com/security/CVE-2025-40301",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40358",
                        "url": "https://ubuntu.com/security/CVE-2025-40358",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68186",
                        "url": "https://ubuntu.com/security/CVE-2025-68186",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68184",
                        "url": "https://ubuntu.com/security/CVE-2025-68184",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40302",
                        "url": "https://ubuntu.com/security/CVE-2025-40302",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40303",
                        "url": "https://ubuntu.com/security/CVE-2025-40303",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40362",
                        "url": "https://ubuntu.com/security/CVE-2025-40362",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40332",
                        "url": "https://ubuntu.com/security/CVE-2025-40332",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40304",
                        "url": "https://ubuntu.com/security/CVE-2025-40304",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40305",
                        "url": "https://ubuntu.com/security/CVE-2025-40305",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68318",
                        "url": "https://ubuntu.com/security/CVE-2025-68318",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40209",
                        "url": "https://ubuntu.com/security/CVE-2025-40209",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68183",
                        "url": "https://ubuntu.com/security/CVE-2025-68183",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68173",
                        "url": "https://ubuntu.com/security/CVE-2025-68173",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40306",
                        "url": "https://ubuntu.com/security/CVE-2025-40306",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40307",
                        "url": "https://ubuntu.com/security/CVE-2025-40307",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40308",
                        "url": "https://ubuntu.com/security/CVE-2025-40308",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40309",
                        "url": "https://ubuntu.com/security/CVE-2025-40309",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68174",
                        "url": "https://ubuntu.com/security/CVE-2025-68174",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40310",
                        "url": "https://ubuntu.com/security/CVE-2025-40310",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40361",
                        "url": "https://ubuntu.com/security/CVE-2025-40361",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40311",
                        "url": "https://ubuntu.com/security/CVE-2025-40311",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68185",
                        "url": "https://ubuntu.com/security/CVE-2025-68185",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68176",
                        "url": "https://ubuntu.com/security/CVE-2025-68176",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68190",
                        "url": "https://ubuntu.com/security/CVE-2025-68190",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68168",
                        "url": "https://ubuntu.com/security/CVE-2025-68168",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40312",
                        "url": "https://ubuntu.com/security/CVE-2025-40312",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40333",
                        "url": "https://ubuntu.com/security/CVE-2025-40333",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68321",
                        "url": "https://ubuntu.com/security/CVE-2025-68321",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40334",
                        "url": "https://ubuntu.com/security/CVE-2025-40334",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68191",
                        "url": "https://ubuntu.com/security/CVE-2025-68191",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68309",
                        "url": "https://ubuntu.com/security/CVE-2025-68309",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40313",
                        "url": "https://ubuntu.com/security/CVE-2025-40313",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40335",
                        "url": "https://ubuntu.com/security/CVE-2025-40335",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40314",
                        "url": "https://ubuntu.com/security/CVE-2025-40314",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40336",
                        "url": "https://ubuntu.com/security/CVE-2025-40336",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68193",
                        "url": "https://ubuntu.com/security/CVE-2025-68193",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68175",
                        "url": "https://ubuntu.com/security/CVE-2025-68175",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68188",
                        "url": "https://ubuntu.com/security/CVE-2025-68188",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68315",
                        "url": "https://ubuntu.com/security/CVE-2025-68315",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40337",
                        "url": "https://ubuntu.com/security/CVE-2025-40337",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40338",
                        "url": "https://ubuntu.com/security/CVE-2025-40338",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40339",
                        "url": "https://ubuntu.com/security/CVE-2025-40339",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68194",
                        "url": "https://ubuntu.com/security/CVE-2025-68194",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40363",
                        "url": "https://ubuntu.com/security/CVE-2025-40363",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68311",
                        "url": "https://ubuntu.com/security/CVE-2025-68311",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40340",
                        "url": "https://ubuntu.com/security/CVE-2025-40340",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68196",
                        "url": "https://ubuntu.com/security/CVE-2025-68196",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68178",
                        "url": "https://ubuntu.com/security/CVE-2025-68178",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40341",
                        "url": "https://ubuntu.com/security/CVE-2025-40341",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40342",
                        "url": "https://ubuntu.com/security/CVE-2025-40342",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40343",
                        "url": "https://ubuntu.com/security/CVE-2025-40343",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68177",
                        "url": "https://ubuntu.com/security/CVE-2025-68177",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68317",
                        "url": "https://ubuntu.com/security/CVE-2025-68317",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40315",
                        "url": "https://ubuntu.com/security/CVE-2025-40315",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40316",
                        "url": "https://ubuntu.com/security/CVE-2025-40316",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40360",
                        "url": "https://ubuntu.com/security/CVE-2025-40360",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68179",
                        "url": "https://ubuntu.com/security/CVE-2025-68179",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68310",
                        "url": "https://ubuntu.com/security/CVE-2025-68310",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40317",
                        "url": "https://ubuntu.com/security/CVE-2025-40317",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40359",
                        "url": "https://ubuntu.com/security/CVE-2025-40359",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68181",
                        "url": "https://ubuntu.com/security/CVE-2025-68181",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68170",
                        "url": "https://ubuntu.com/security/CVE-2025-68170",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40213",
                        "url": "https://ubuntu.com/security/CVE-2025-40213",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40318",
                        "url": "https://ubuntu.com/security/CVE-2025-40318",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68312",
                        "url": "https://ubuntu.com/security/CVE-2025-68312",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40344",
                        "url": "https://ubuntu.com/security/CVE-2025-40344",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68172",
                        "url": "https://ubuntu.com/security/CVE-2025-68172",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40319",
                        "url": "https://ubuntu.com/security/CVE-2025-40319",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68182",
                        "url": "https://ubuntu.com/security/CVE-2025-68182",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68314",
                        "url": "https://ubuntu.com/security/CVE-2025-68314",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68189",
                        "url": "https://ubuntu.com/security/CVE-2025-68189",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68171",
                        "url": "https://ubuntu.com/security/CVE-2025-68171",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-68313",
                        "url": "https://ubuntu.com/security/CVE-2025-68313",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40320",
                        "url": "https://ubuntu.com/security/CVE-2025-40320",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40321",
                        "url": "https://ubuntu.com/security/CVE-2025-40321",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40322",
                        "url": "https://ubuntu.com/security/CVE-2025-40322",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40211",
                        "url": "https://ubuntu.com/security/CVE-2025-40211",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40323",
                        "url": "https://ubuntu.com/security/CVE-2025-40323",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40210",
                        "url": "https://ubuntu.com/security/CVE-2025-40210",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40324",
                        "url": "https://ubuntu.com/security/CVE-2025-40324",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40326",
                        "url": "https://ubuntu.com/security/CVE-2025-40326",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40084",
                        "url": "https://ubuntu.com/security/CVE-2025-40084",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40222",
                        "url": "https://ubuntu.com/security/CVE-2025-40222",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40223",
                        "url": "https://ubuntu.com/security/CVE-2025-40223",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40106",
                        "url": "https://ubuntu.com/security/CVE-2025-40106",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40224",
                        "url": "https://ubuntu.com/security/CVE-2025-40224",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40225",
                        "url": "https://ubuntu.com/security/CVE-2025-40225",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40226",
                        "url": "https://ubuntu.com/security/CVE-2025-40226",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40227",
                        "url": "https://ubuntu.com/security/CVE-2025-40227",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40228",
                        "url": "https://ubuntu.com/security/CVE-2025-40228",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40229",
                        "url": "https://ubuntu.com/security/CVE-2025-40229",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40230",
                        "url": "https://ubuntu.com/security/CVE-2025-40230",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40231",
                        "url": "https://ubuntu.com/security/CVE-2025-40231",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40233",
                        "url": "https://ubuntu.com/security/CVE-2025-40233",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40235",
                        "url": "https://ubuntu.com/security/CVE-2025-40235",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40236",
                        "url": "https://ubuntu.com/security/CVE-2025-40236",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40237",
                        "url": "https://ubuntu.com/security/CVE-2025-40237",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40238",
                        "url": "https://ubuntu.com/security/CVE-2025-40238",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40239",
                        "url": "https://ubuntu.com/security/CVE-2025-40239",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40240",
                        "url": "https://ubuntu.com/security/CVE-2025-40240",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40241",
                        "url": "https://ubuntu.com/security/CVE-2025-40241",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40242",
                        "url": "https://ubuntu.com/security/CVE-2025-40242",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40243",
                        "url": "https://ubuntu.com/security/CVE-2025-40243",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40244",
                        "url": "https://ubuntu.com/security/CVE-2025-40244",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40245",
                        "url": "https://ubuntu.com/security/CVE-2025-40245",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40086",
                        "url": "https://ubuntu.com/security/CVE-2025-40086",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40087",
                        "url": "https://ubuntu.com/security/CVE-2025-40087",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40088",
                        "url": "https://ubuntu.com/security/CVE-2025-40088",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40162",
                        "url": "https://ubuntu.com/security/CVE-2025-40162",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40085",
                        "url": "https://ubuntu.com/security/CVE-2025-40085",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40172",
                        "url": "https://ubuntu.com/security/CVE-2025-40172",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40177",
                        "url": "https://ubuntu.com/security/CVE-2025-40177",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40163",
                        "url": "https://ubuntu.com/security/CVE-2025-40163",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40174",
                        "url": "https://ubuntu.com/security/CVE-2025-40174",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40089",
                        "url": "https://ubuntu.com/security/CVE-2025-40089",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40176",
                        "url": "https://ubuntu.com/security/CVE-2025-40176",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40164",
                        "url": "https://ubuntu.com/security/CVE-2025-40164",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40091",
                        "url": "https://ubuntu.com/security/CVE-2025-40091",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40175",
                        "url": "https://ubuntu.com/security/CVE-2025-40175",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40173",
                        "url": "https://ubuntu.com/security/CVE-2025-40173",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40092",
                        "url": "https://ubuntu.com/security/CVE-2025-40092",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40093",
                        "url": "https://ubuntu.com/security/CVE-2025-40093",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40094",
                        "url": "https://ubuntu.com/security/CVE-2025-40094",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40095",
                        "url": "https://ubuntu.com/security/CVE-2025-40095",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40165",
                        "url": "https://ubuntu.com/security/CVE-2025-40165",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40096",
                        "url": "https://ubuntu.com/security/CVE-2025-40096",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40097",
                        "url": "https://ubuntu.com/security/CVE-2025-40097",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40098",
                        "url": "https://ubuntu.com/security/CVE-2025-40098",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40099",
                        "url": "https://ubuntu.com/security/CVE-2025-40099",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40100",
                        "url": "https://ubuntu.com/security/CVE-2025-40100",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40101",
                        "url": "https://ubuntu.com/security/CVE-2025-40101",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40167",
                        "url": "https://ubuntu.com/security/CVE-2025-40167",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40102",
                        "url": "https://ubuntu.com/security/CVE-2025-40102",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40103",
                        "url": "https://ubuntu.com/security/CVE-2025-40103",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40104",
                        "url": "https://ubuntu.com/security/CVE-2025-40104",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40166",
                        "url": "https://ubuntu.com/security/CVE-2025-40166",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40105",
                        "url": "https://ubuntu.com/security/CVE-2025-40105",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40019",
                        "url": "https://ubuntu.com/security/CVE-2025-40019",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    },
                    {
                        "cve": "CVE-2025-40214",
                        "url": "https://ubuntu.com/security/CVE-2025-40214",
                        "cve_description": "",
                        "cve_priority": "n/a",
                        "cve_public_date": ""
                    }
                ],
                "launchpad_bugs_fixed": [
                    2137844,
                    2013232,
                    2074082,
                    2137845,
                    1786013,
                    2137849,
                    1786013,
                    2136820,
                    2137698,
                    2129812,
                    2125022,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136850,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136833,
                    2136813,
                    2132317,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2134982,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2133557,
                    2132095,
                    2131046,
                    2115860,
                    2128792,
                    2121852,
                    2131259,
                    2131259,
                    2131702,
                    2129610,
                    2138113,
                    2138115,
                    2133507,
                    1975592,
                    2013232
                ],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-40256",
                                "url": "https://ubuntu.com/security/CVE-2025-40256",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68204",
                                "url": "https://ubuntu.com/security/CVE-2025-68204",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68203",
                                "url": "https://ubuntu.com/security/CVE-2025-68203",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40267",
                                "url": "https://ubuntu.com/security/CVE-2025-40267",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68198",
                                "url": "https://ubuntu.com/security/CVE-2025-68198",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68199",
                                "url": "https://ubuntu.com/security/CVE-2025-68199",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40268",
                                "url": "https://ubuntu.com/security/CVE-2025-40268",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40269",
                                "url": "https://ubuntu.com/security/CVE-2025-40269",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68205",
                                "url": "https://ubuntu.com/security/CVE-2025-68205",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40270",
                                "url": "https://ubuntu.com/security/CVE-2025-40270",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40271",
                                "url": "https://ubuntu.com/security/CVE-2025-40271",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40272",
                                "url": "https://ubuntu.com/security/CVE-2025-40272",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68245",
                                "url": "https://ubuntu.com/security/CVE-2025-68245",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68240",
                                "url": "https://ubuntu.com/security/CVE-2025-68240",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68241",
                                "url": "https://ubuntu.com/security/CVE-2025-68241",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68211",
                                "url": "https://ubuntu.com/security/CVE-2025-68211",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68246",
                                "url": "https://ubuntu.com/security/CVE-2025-68246",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40273",
                                "url": "https://ubuntu.com/security/CVE-2025-40273",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40212",
                                "url": "https://ubuntu.com/security/CVE-2025-40212",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40274",
                                "url": "https://ubuntu.com/security/CVE-2025-40274",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68202",
                                "url": "https://ubuntu.com/security/CVE-2025-68202",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68239",
                                "url": "https://ubuntu.com/security/CVE-2025-68239",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68247",
                                "url": "https://ubuntu.com/security/CVE-2025-68247",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68208",
                                "url": "https://ubuntu.com/security/CVE-2025-68208",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68200",
                                "url": "https://ubuntu.com/security/CVE-2025-68200",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40275",
                                "url": "https://ubuntu.com/security/CVE-2025-40275",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68242",
                                "url": "https://ubuntu.com/security/CVE-2025-68242",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68243",
                                "url": "https://ubuntu.com/security/CVE-2025-68243",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40276",
                                "url": "https://ubuntu.com/security/CVE-2025-40276",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40277",
                                "url": "https://ubuntu.com/security/CVE-2025-40277",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68206",
                                "url": "https://ubuntu.com/security/CVE-2025-68206",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68209",
                                "url": "https://ubuntu.com/security/CVE-2025-68209",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40278",
                                "url": "https://ubuntu.com/security/CVE-2025-40278",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40279",
                                "url": "https://ubuntu.com/security/CVE-2025-40279",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40280",
                                "url": "https://ubuntu.com/security/CVE-2025-40280",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40281",
                                "url": "https://ubuntu.com/security/CVE-2025-40281",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40282",
                                "url": "https://ubuntu.com/security/CVE-2025-40282",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40283",
                                "url": "https://ubuntu.com/security/CVE-2025-40283",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40284",
                                "url": "https://ubuntu.com/security/CVE-2025-40284",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68210",
                                "url": "https://ubuntu.com/security/CVE-2025-68210",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40285",
                                "url": "https://ubuntu.com/security/CVE-2025-40285",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40286",
                                "url": "https://ubuntu.com/security/CVE-2025-40286",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40287",
                                "url": "https://ubuntu.com/security/CVE-2025-40287",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40288",
                                "url": "https://ubuntu.com/security/CVE-2025-40288",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40289",
                                "url": "https://ubuntu.com/security/CVE-2025-40289",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68201",
                                "url": "https://ubuntu.com/security/CVE-2025-68201",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68207",
                                "url": "https://ubuntu.com/security/CVE-2025-68207",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68244",
                                "url": "https://ubuntu.com/security/CVE-2025-68244",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68316",
                                "url": "https://ubuntu.com/security/CVE-2025-68316",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40292",
                                "url": "https://ubuntu.com/security/CVE-2025-40292",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68180",
                                "url": "https://ubuntu.com/security/CVE-2025-68180",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40327",
                                "url": "https://ubuntu.com/security/CVE-2025-40327",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40328",
                                "url": "https://ubuntu.com/security/CVE-2025-40328",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40291",
                                "url": "https://ubuntu.com/security/CVE-2025-40291",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68322",
                                "url": "https://ubuntu.com/security/CVE-2025-68322",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40293",
                                "url": "https://ubuntu.com/security/CVE-2025-40293",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40294",
                                "url": "https://ubuntu.com/security/CVE-2025-40294",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40329",
                                "url": "https://ubuntu.com/security/CVE-2025-40329",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40295",
                                "url": "https://ubuntu.com/security/CVE-2025-40295",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40296",
                                "url": "https://ubuntu.com/security/CVE-2025-40296",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40297",
                                "url": "https://ubuntu.com/security/CVE-2025-40297",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68320",
                                "url": "https://ubuntu.com/security/CVE-2025-68320",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68169",
                                "url": "https://ubuntu.com/security/CVE-2025-68169",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68197",
                                "url": "https://ubuntu.com/security/CVE-2025-68197",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40330",
                                "url": "https://ubuntu.com/security/CVE-2025-40330",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68192",
                                "url": "https://ubuntu.com/security/CVE-2025-68192",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40331",
                                "url": "https://ubuntu.com/security/CVE-2025-40331",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68187",
                                "url": "https://ubuntu.com/security/CVE-2025-68187",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68167",
                                "url": "https://ubuntu.com/security/CVE-2025-68167",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68319",
                                "url": "https://ubuntu.com/security/CVE-2025-68319",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40298",
                                "url": "https://ubuntu.com/security/CVE-2025-40298",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40299",
                                "url": "https://ubuntu.com/security/CVE-2025-40299",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40301",
                                "url": "https://ubuntu.com/security/CVE-2025-40301",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40358",
                                "url": "https://ubuntu.com/security/CVE-2025-40358",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68186",
                                "url": "https://ubuntu.com/security/CVE-2025-68186",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68184",
                                "url": "https://ubuntu.com/security/CVE-2025-68184",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40302",
                                "url": "https://ubuntu.com/security/CVE-2025-40302",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40303",
                                "url": "https://ubuntu.com/security/CVE-2025-40303",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40362",
                                "url": "https://ubuntu.com/security/CVE-2025-40362",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40332",
                                "url": "https://ubuntu.com/security/CVE-2025-40332",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40304",
                                "url": "https://ubuntu.com/security/CVE-2025-40304",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40305",
                                "url": "https://ubuntu.com/security/CVE-2025-40305",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68318",
                                "url": "https://ubuntu.com/security/CVE-2025-68318",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40209",
                                "url": "https://ubuntu.com/security/CVE-2025-40209",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68183",
                                "url": "https://ubuntu.com/security/CVE-2025-68183",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68173",
                                "url": "https://ubuntu.com/security/CVE-2025-68173",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40306",
                                "url": "https://ubuntu.com/security/CVE-2025-40306",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40307",
                                "url": "https://ubuntu.com/security/CVE-2025-40307",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40308",
                                "url": "https://ubuntu.com/security/CVE-2025-40308",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40309",
                                "url": "https://ubuntu.com/security/CVE-2025-40309",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68174",
                                "url": "https://ubuntu.com/security/CVE-2025-68174",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40310",
                                "url": "https://ubuntu.com/security/CVE-2025-40310",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40361",
                                "url": "https://ubuntu.com/security/CVE-2025-40361",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40311",
                                "url": "https://ubuntu.com/security/CVE-2025-40311",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68185",
                                "url": "https://ubuntu.com/security/CVE-2025-68185",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68176",
                                "url": "https://ubuntu.com/security/CVE-2025-68176",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68190",
                                "url": "https://ubuntu.com/security/CVE-2025-68190",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68168",
                                "url": "https://ubuntu.com/security/CVE-2025-68168",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40312",
                                "url": "https://ubuntu.com/security/CVE-2025-40312",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40333",
                                "url": "https://ubuntu.com/security/CVE-2025-40333",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68321",
                                "url": "https://ubuntu.com/security/CVE-2025-68321",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40334",
                                "url": "https://ubuntu.com/security/CVE-2025-40334",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68191",
                                "url": "https://ubuntu.com/security/CVE-2025-68191",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68309",
                                "url": "https://ubuntu.com/security/CVE-2025-68309",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40313",
                                "url": "https://ubuntu.com/security/CVE-2025-40313",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40335",
                                "url": "https://ubuntu.com/security/CVE-2025-40335",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40314",
                                "url": "https://ubuntu.com/security/CVE-2025-40314",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40336",
                                "url": "https://ubuntu.com/security/CVE-2025-40336",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68193",
                                "url": "https://ubuntu.com/security/CVE-2025-68193",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68175",
                                "url": "https://ubuntu.com/security/CVE-2025-68175",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68188",
                                "url": "https://ubuntu.com/security/CVE-2025-68188",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68315",
                                "url": "https://ubuntu.com/security/CVE-2025-68315",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40337",
                                "url": "https://ubuntu.com/security/CVE-2025-40337",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40338",
                                "url": "https://ubuntu.com/security/CVE-2025-40338",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40339",
                                "url": "https://ubuntu.com/security/CVE-2025-40339",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68194",
                                "url": "https://ubuntu.com/security/CVE-2025-68194",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40363",
                                "url": "https://ubuntu.com/security/CVE-2025-40363",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68311",
                                "url": "https://ubuntu.com/security/CVE-2025-68311",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40340",
                                "url": "https://ubuntu.com/security/CVE-2025-40340",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68196",
                                "url": "https://ubuntu.com/security/CVE-2025-68196",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68178",
                                "url": "https://ubuntu.com/security/CVE-2025-68178",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40341",
                                "url": "https://ubuntu.com/security/CVE-2025-40341",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40342",
                                "url": "https://ubuntu.com/security/CVE-2025-40342",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40343",
                                "url": "https://ubuntu.com/security/CVE-2025-40343",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68177",
                                "url": "https://ubuntu.com/security/CVE-2025-68177",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68317",
                                "url": "https://ubuntu.com/security/CVE-2025-68317",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40315",
                                "url": "https://ubuntu.com/security/CVE-2025-40315",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40316",
                                "url": "https://ubuntu.com/security/CVE-2025-40316",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40360",
                                "url": "https://ubuntu.com/security/CVE-2025-40360",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68179",
                                "url": "https://ubuntu.com/security/CVE-2025-68179",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68310",
                                "url": "https://ubuntu.com/security/CVE-2025-68310",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40317",
                                "url": "https://ubuntu.com/security/CVE-2025-40317",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40359",
                                "url": "https://ubuntu.com/security/CVE-2025-40359",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68181",
                                "url": "https://ubuntu.com/security/CVE-2025-68181",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68170",
                                "url": "https://ubuntu.com/security/CVE-2025-68170",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40213",
                                "url": "https://ubuntu.com/security/CVE-2025-40213",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40318",
                                "url": "https://ubuntu.com/security/CVE-2025-40318",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68312",
                                "url": "https://ubuntu.com/security/CVE-2025-68312",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40344",
                                "url": "https://ubuntu.com/security/CVE-2025-40344",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68172",
                                "url": "https://ubuntu.com/security/CVE-2025-68172",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40319",
                                "url": "https://ubuntu.com/security/CVE-2025-40319",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68182",
                                "url": "https://ubuntu.com/security/CVE-2025-68182",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68314",
                                "url": "https://ubuntu.com/security/CVE-2025-68314",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68189",
                                "url": "https://ubuntu.com/security/CVE-2025-68189",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68171",
                                "url": "https://ubuntu.com/security/CVE-2025-68171",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-68313",
                                "url": "https://ubuntu.com/security/CVE-2025-68313",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40320",
                                "url": "https://ubuntu.com/security/CVE-2025-40320",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40321",
                                "url": "https://ubuntu.com/security/CVE-2025-40321",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40322",
                                "url": "https://ubuntu.com/security/CVE-2025-40322",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40211",
                                "url": "https://ubuntu.com/security/CVE-2025-40211",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40323",
                                "url": "https://ubuntu.com/security/CVE-2025-40323",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40210",
                                "url": "https://ubuntu.com/security/CVE-2025-40210",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40324",
                                "url": "https://ubuntu.com/security/CVE-2025-40324",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40326",
                                "url": "https://ubuntu.com/security/CVE-2025-40326",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40084",
                                "url": "https://ubuntu.com/security/CVE-2025-40084",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40222",
                                "url": "https://ubuntu.com/security/CVE-2025-40222",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40223",
                                "url": "https://ubuntu.com/security/CVE-2025-40223",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40106",
                                "url": "https://ubuntu.com/security/CVE-2025-40106",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40224",
                                "url": "https://ubuntu.com/security/CVE-2025-40224",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40225",
                                "url": "https://ubuntu.com/security/CVE-2025-40225",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40226",
                                "url": "https://ubuntu.com/security/CVE-2025-40226",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40227",
                                "url": "https://ubuntu.com/security/CVE-2025-40227",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40228",
                                "url": "https://ubuntu.com/security/CVE-2025-40228",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40229",
                                "url": "https://ubuntu.com/security/CVE-2025-40229",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40230",
                                "url": "https://ubuntu.com/security/CVE-2025-40230",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40231",
                                "url": "https://ubuntu.com/security/CVE-2025-40231",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40233",
                                "url": "https://ubuntu.com/security/CVE-2025-40233",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40235",
                                "url": "https://ubuntu.com/security/CVE-2025-40235",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40236",
                                "url": "https://ubuntu.com/security/CVE-2025-40236",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40237",
                                "url": "https://ubuntu.com/security/CVE-2025-40237",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40238",
                                "url": "https://ubuntu.com/security/CVE-2025-40238",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40239",
                                "url": "https://ubuntu.com/security/CVE-2025-40239",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40240",
                                "url": "https://ubuntu.com/security/CVE-2025-40240",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40241",
                                "url": "https://ubuntu.com/security/CVE-2025-40241",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40242",
                                "url": "https://ubuntu.com/security/CVE-2025-40242",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40243",
                                "url": "https://ubuntu.com/security/CVE-2025-40243",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40244",
                                "url": "https://ubuntu.com/security/CVE-2025-40244",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40245",
                                "url": "https://ubuntu.com/security/CVE-2025-40245",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40086",
                                "url": "https://ubuntu.com/security/CVE-2025-40086",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40087",
                                "url": "https://ubuntu.com/security/CVE-2025-40087",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40088",
                                "url": "https://ubuntu.com/security/CVE-2025-40088",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40162",
                                "url": "https://ubuntu.com/security/CVE-2025-40162",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40085",
                                "url": "https://ubuntu.com/security/CVE-2025-40085",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40172",
                                "url": "https://ubuntu.com/security/CVE-2025-40172",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40177",
                                "url": "https://ubuntu.com/security/CVE-2025-40177",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40163",
                                "url": "https://ubuntu.com/security/CVE-2025-40163",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40174",
                                "url": "https://ubuntu.com/security/CVE-2025-40174",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40089",
                                "url": "https://ubuntu.com/security/CVE-2025-40089",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40176",
                                "url": "https://ubuntu.com/security/CVE-2025-40176",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40164",
                                "url": "https://ubuntu.com/security/CVE-2025-40164",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40091",
                                "url": "https://ubuntu.com/security/CVE-2025-40091",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40175",
                                "url": "https://ubuntu.com/security/CVE-2025-40175",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40173",
                                "url": "https://ubuntu.com/security/CVE-2025-40173",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40092",
                                "url": "https://ubuntu.com/security/CVE-2025-40092",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40093",
                                "url": "https://ubuntu.com/security/CVE-2025-40093",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40094",
                                "url": "https://ubuntu.com/security/CVE-2025-40094",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40095",
                                "url": "https://ubuntu.com/security/CVE-2025-40095",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40165",
                                "url": "https://ubuntu.com/security/CVE-2025-40165",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40096",
                                "url": "https://ubuntu.com/security/CVE-2025-40096",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40097",
                                "url": "https://ubuntu.com/security/CVE-2025-40097",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40098",
                                "url": "https://ubuntu.com/security/CVE-2025-40098",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40099",
                                "url": "https://ubuntu.com/security/CVE-2025-40099",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40100",
                                "url": "https://ubuntu.com/security/CVE-2025-40100",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40101",
                                "url": "https://ubuntu.com/security/CVE-2025-40101",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40167",
                                "url": "https://ubuntu.com/security/CVE-2025-40167",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40102",
                                "url": "https://ubuntu.com/security/CVE-2025-40102",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40103",
                                "url": "https://ubuntu.com/security/CVE-2025-40103",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40104",
                                "url": "https://ubuntu.com/security/CVE-2025-40104",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40166",
                                "url": "https://ubuntu.com/security/CVE-2025-40166",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40105",
                                "url": "https://ubuntu.com/security/CVE-2025-40105",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40019",
                                "url": "https://ubuntu.com/security/CVE-2025-40019",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            },
                            {
                                "cve": "CVE-2025-40214",
                                "url": "https://ubuntu.com/security/CVE-2025-40214",
                                "cve_description": "",
                                "cve_priority": "n/a",
                                "cve_public_date": ""
                            }
                        ],
                        "log": [
                            "",
                            "  * noble/linux-riscv-6.17: 6.17.0-14.14.1~24.04.1 -proposed tracker (LP: #2137844)",
                            "",
                            "  * Enable StarFive VisionFive 2 board (LP: #2013232)",
                            "    - SAUCE: PCI: starfive: Use regulator APIs instead of GPIO APIs to control",
                            "      the 3V3 power supply of PCIe slots",
                            "",
                            "  * Enable Microchip PIC64GX Curiosity Kit (LP: #2074082)",
                            "    - dt-bindings: cache: sifive,ccache0: add a pic64gx compatible",
                            "    - dt-bindings: interrupt-controller: sifive,plic: Add pic64gx",
                            "      compatibility",
                            "    - dt-bindings: gpio: mpfs-gpio: Add pic64gx GPIO compatibility",
                            "    - dt-bindings: net: cdns,macb: Add pic64gx compatibility",
                            "    - riscv: dts: microchip: Minor whitespace cleanup",
                            "    - riscv: dts: microchip: add common board dtsi for icicle kit variants",
                            "    - dt-bindings: riscv: microchip: document icicle kit with production",
                            "      device",
                            "    - riscv: dts: microchip: add icicle kit with production device",
                            "    - riscv: dts: microchip: rename icicle kit ccc clock and other minor fixes",
                            "    - dt-bindings: riscv: microchip: document Discovery Kit",
                            "    - riscv: dts: microchip: add a device tree for Discovery Kit",
                            "    - dt-bindings: soc: microchip: document the simple-mfd syscon on PolarFire",
                            "      SoC",
                            "    - soc: microchip: add mfd drivers for two syscon regions on PolarFire SoC",
                            "    - MAINTAINERS: add new soc drivers to Microchip RISC-V entry",
                            "    - MAINTAINERS: rename Microchip RISC-V entry",
                            "    - dt-bindings: pinctrl: document pic64gx \"gpio2\" pinmux",
                            "    - pinctrl: add pic64gx \"gpio2\" pinmux driver",
                            "    - dt-bindings: pinctrl: document polarfire soc iomux0 pinmux",
                            "    - pinctrl: add polarfire soc iomux0 pinmux driver",
                            "    - MAINTAINERS: add Microchip RISC-V pinctrl drivers/bindings to entry",
                            "    - dt-bindings: clk: microchip: mpfs: remove first reg region",
                            "    - clk: microchip: mpfs: use regmap for clocks",
                            "    - reset: mpfs: add non-auxiliary bus probing",
                            "    - pinctrl: pic64gx-gpio2: Add REGMAP_MMIO dependency",
                            "    - pinctrl: add CONFIG_OF dependencies for microchip drivers",
                            "    - SAUCE: pinctrl: move microchip riscv pinctrl drivers to a folder",
                            "    - SAUCE: pinctrl: add generic functions + pins mapper",
                            "    - SAUCE: dt-bindings: pinctrl: document polarfire soc mssio pin controller",
                            "    - SAUCE: pinctrl: add polarfire soc mssio pinctrl driver",
                            "    - SAUCE: MAINTAINERS: add Microchip mpfs mssio driver/bindings to entry",
                            "    - SAUCE: dt-bindings: soc: microchip: add compatible for the mss-top-",
                            "      sysreg on pic64gx",
                            "    - SAUCE: dt-bindings: soc: microchip: mpfs-sys-controller: Add pic64gx",
                            "      compatibility",
                            "    - SAUCE: soc: microchip: mpfs-sys-controller: add support for pic64gx",
                            "    - SAUCE: dt-bindings: timer: sifive,clint: add pic64gx compatibility",
                            "    - SAUCE: clk: microchip: drop POLARFIRE from ARCH_MICROCHIP_POLARFIRE",
                            "    - SAUCE: dt-bindings: clock: mpfs-ccc: Add pic64gx compatibility",
                            "    - SAUCE: dt-bindings: clock: mpfs-clkcfg: Add pic64gx compatibility",
                            "    - SAUCE: dt-bindings: mbox: add pic64gx mailbox compatibility to mpfs",
                            "      mailbox",
                            "    - SAUCE: mailbox: mpfs: drop POLARFIRE from ARCH_MICROCHIP_POLARFIRE",
                            "    - SAUCE: dt-bindings: riscv: microchip: document the PIC64GX curiosity kit",
                            "    - SAUCE: riscv: dts: microchip: add pic64gx and its curiosity kit",
                            "    - SAUCE: riscv: dts: microchip: remove POLARFIRE mention in Makefile",
                            "    - [Config] riscv: updateconfigs for PIC64GX support",
                            "",
                            "  [ Ubuntu-riscv: 6.17.0-14.14.1 ]",
                            "",
                            "  * questing/linux-riscv: 6.17.0-14.14.1 -proposed tracker (LP: #2137845)",
                            "  * Packaging resync (LP: #1786013)",
                            "    - [Packaging] debian.riscv/dkms-versions -- update from kernel-versions",
                            "      (main/2026.01.12)",
                            "  [ Ubuntu: 6.17.0-14.14 ]",
                            "  * questing/linux: 6.17.0-14.14 -proposed tracker (LP: #2137849)",
                            "  * Packaging resync (LP: #1786013)",
                            "    - [Packaging] debian.master/dkms-versions -- update from kernel-versions",
                            "      (main/2026.01.12)",
                            "  * ubuntu_kselftests:_net/net:gre_gso.sh failing (LP: #2136820)",
                            "    - SAUCE increase socat timeout in gre_gso.sh",
                            "  * ubuntu_blktrace_smoke_test fails on questing with rust coreutils",
                            "    (LP: #2137698)",
                            "    - SAUCE: Revert \"ext4: fail unaligned direct IO write with EINVAL\"",
                            "  * bareudp.sh in ubuntu_kselftests_net fails because of dash default shell",
                            "    (LP: #2129812)",
                            "    - selftests: net: use BASH for bareudp testing",
                            "  * CVE-2025-40256",
                            "    - xfrm: also call xfrm_state_delete_tunnel at destroy time for states that",
                            "      were never added",
                            "  * Enable PMF on AMD HPT/STX/KRK (LP: #2125022)",
                            "    - platform/x86/amd/pmf: Add support for adjusting PMF PPT and PPT APU",
                            "      thresholds",
                            "    - platform/x86/amd/pmf: Extend custom BIOS inputs for more policies",
                            "    - platform/x86/amd/pmf: Update ta_pmf_action structure member",
                            "    - platform/x86/amd/pmf: Add helper to verify BIOS input notifications are",
                            "      enable/disable",
                            "    - platform/x86/amd/pmf: Add custom BIOS input support for AMD_CPU_ID_PS",
                            "    - platform/x86/amd/pmf: Preserve custom BIOS inputs for evaluating the",
                            "      policies",
                            "    - platform/x86/amd/pmf: Call enact function sooner to process early",
                            "      pending requests",
                            "    - platform/x86/amd/pmf: Add debug logs for pending requests and custom",
                            "      BIOS inputs",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850)",
                            "    - iommufd/selftest: Fix ioctl return value in _test_cmd_trigger_vevents()",
                            "    - drm/mediatek: Add pm_runtime support for GCE power control",
                            "    - drm/i915: Fix conversion between clock ticks and nanoseconds",
                            "    - drm/amdgpu: set default gfx reset masks for gfx6-8",
                            "    - drm/amd/display: Don't stretch non-native images by default in eDP",
                            "    - smb: client: fix refcount leak in smb2_set_path_attr",
                            "    - iommufd: Make vfio_compat's unmap succeed if the range is already empty",
                            "    - futex: Optimize per-cpu reference counting",
                            "    - drm/amd: Fix suspend failure with secure display TA",
                            "    - drm/xe: Move declarations under conditional branch",
                            "    - drm/xe: Do clean shutdown also when using flr",
                            "    - drm/amd/display: Add pixel_clock to amd_pp_display_configuration",
                            "    - drm/amd/pm: Use pm_display_cfg in legacy DPM (v2)",
                            "    - drm/amd/display: Disable fastboot on DCE 6 too",
                            "    - drm/amd/pm: Disable MCLK switching on SI at high pixel clocks",
                            "    - drm/amd: Disable ASPM on SI",
                            "    - arm64: kprobes: check the return value of set_memory_rox()",
                            "    - compiler_types: Move unused static inline functions warning to W=2",
                            "    - riscv: Build loader.bin exclusively for Canaan K210",
                            "    - RISC-V: clear hot-unplugged cores from all task mm_cpumasks to avoid",
                            "      rfence errors",
                            "    - riscv: acpi: avoid errors caused by probing DT devices when ACPI is used",
                            "    - fs: return EOPNOTSUPP from file_setattr/file_getattr syscalls",
                            "    - ASoC: nau8821: Avoid unnecessary blocking in IRQ handler",
                            "    - NFS4: Fix state renewals missing after boot",
                            "    - drm/amdkfd: fix suspend/resume all calls in mes based eviction path",
                            "    - NFS4: Apply delay_retrans to async operations",
                            "    - HID: intel-thc-hid: intel-quickspi: Add ARL PCI Device Id's",
                            "    - HID: quirks: avoid Cooler Master MM712 dongle wakeup bug",
                            "    - ixgbe: handle IXGBE_VF_GET_PF_LINK_STATE mailbox operation",
                            "    - HID: nintendo: Wait longer for initial probe",
                            "    - NFS: check if suid/sgid was cleared after a write as needed",
                            "    - HID: quirks: Add ALWAYS_POLL quirk for VRS R295 steering wheel",
                            "    - io_uring: fix unexpected placement on same size resizing",
                            "    - HID: logitech-hidpp: Add HIDPP_QUIRK_RESET_HI_RES_SCROLL",
                            "    - ASoC: max98090/91: fixed max98091 ALSA widget powering up/down",
                            "    - ALSA: hda/realtek: Fix mute led for HP Omen 17-cb0xxx",
                            "    - ixgbe: handle IXGBE_VF_FEATURES_NEGOTIATE mbox cmd",
                            "    - wifi: ath11k: zero init info->status in wmi_process_mgmt_tx_comp()",
                            "    - selftests: net: local_termination: Wait for interfaces to come up",
                            "    - net: fec: correct rx_bytes statistic for the case SHIFT16 is set",
                            "    - net: phy: micrel: Introduce lanphy_modify_page_reg",
                            "    - net: phy: micrel: Replace hardcoded pages with defines",
                            "    - net: phy: micrel: lan8814 fix reset of the QSGMII interface",
                            "    - rust: Add -fno-isolate-erroneous-paths-dereference to",
                            "      bindgen_skip_c_flags",
                            "    - NFSD: Skip close replay processing if XDR encoding fails",
                            "    - Bluetooth: 6lowpan: fix BDADDR_LE vs ADDR_LE_DEV address type confusion",
                            "    - Bluetooth: 6lowpan: Don't hold spin lock over sleeping functions",
                            "    - Bluetooth: hci_conn: Fix not cleaning up PA_LINK connections",
                            "    - net: dsa: tag_brcm: do not mark link local traffic as offloaded",
                            "    - net/smc: fix mismatch between CLC header and proposal",
                            "    - net/handshake: Fix memory leak in tls_handshake_accept()",
                            "    - net: ethernet: ti: am65-cpsw-qos: fix IET verify/response timeout",
                            "    - net: ethernet: ti: am65-cpsw-qos: fix IET verify retry mechanism",
                            "    - net: mdio: fix resource leak in mdiobus_register_device()",
                            "    - wifi: mac80211: skip rate verification for not captured PSDUs",
                            "    - Bluetooth: hci_event: Fix not handling PA Sync Lost event",
                            "    - net/mlx5e: Fix missing error assignment in mlx5e_xfrm_add_state()",
                            "    - net/mlx5e: Fix maxrate wraparound in threshold between units",
                            "    - net/mlx5e: Fix wraparound in rate limiting for values above 255 Gbps",
                            "    - net/mlx5e: Fix potentially misleading debug message",
                            "    - net/mlx5: Fix typo of MLX5_EQ_DOORBEL_OFFSET",
                            "    - net/mlx5: Store the global doorbell in mlx5_priv",
                            "    - net/mlx5e: Prepare for using different CQ doorbells",
                            "    - net_sched: limit try_bulk_dequeue_skb() batches",
                            "    - wifi: iwlwifi: mvm: fix beacon template/fixed rate",
                            "    - wifi: iwlwifi: mld: always take beacon ies in link grading",
                            "    - virtio-net: fix incorrect flags recording in big mode",
                            "    - hsr: Fix supervision frame sending on HSRv0",
                            "    - hsr: Follow standard for HSRv0 supervision frames",
                            "    - ACPI: CPPC: Detect preferred core availability on online CPUs",
                            "    - ACPI: CPPC: Check _CPC validity for only the online CPUs",
                            "    - ACPI: CPPC: Perform fast check switch only for online CPUs",
                            "    - ACPI: CPPC: Limit perf ctrs in PCC check only to online CPUs",
                            "    - cpufreq: intel_pstate: Check IDA only before MSR_IA32_PERF_CTL writes",
                            "    - Bluetooth: L2CAP: export l2cap_chan_hold for modules",
                            "    - io_uring/rsrc: don't use blk_rq_nr_phys_segments() as number of bvecs",
                            "    - acpi,srat: Fix incorrect device handle check for Generic Initiator",
                            "    - regulator: fixed: fix GPIO descriptor leak on register failure",
                            "    - ASoC: cs4271: Fix regulator leak on probe failure",
                            "    - ASoC: codecs: va-macro: fix resource leak in probe error path",
                            "    - drm/vmwgfx: Restore Guest-Backed only cursor plane support",
                            "    - ASoC: tas2781: fix getting the wrong device number",
                            "    - pnfs: Fix TLS logic in _nfs4_pnfs_v3_ds_connect()",
                            "    - pnfs: Fix TLS logic in _nfs4_pnfs_v4_ds_connect()",
                            "    - pnfs: Set transport security policy to RPC_XPRTSEC_NONE unless using TLS",
                            "    - simplify nfs_atomic_open_v23()",
                            "    - NFSv2/v3: Fix error handling in nfs_atomic_open_v23()",
                            "    - NFS: sysfs: fix leak when nfs_client kobject add fails",
                            "    - NFSv4: Fix an incorrect parameter when calling nfs4_call_sync()",
                            "    - drm/amd/amdgpu: Ensure isp_kernel_buffer_alloc() creates a new BO",
                            "    - acpi/hmat: Fix lockdep warning for hmem_register_resource()",
                            "    - ASoC: rsnd: fix OF node reference leak in rsnd_ssiu_probe()",
                            "    - drm/client: fix MODULE_PARM_DESC string for \"active\"",
                            "    - irqchip/riscv-intc: Add missing free() callback in riscv_intc_domain_ops",
                            "    - lib/crypto: arm/curve25519: Disable on CPU_BIG_ENDIAN",
                            "    - hostfs: Fix only passing host root in boot stage with new mount",
                            "    - afs: Fix dynamic lookup to fail on cell lookup failure",
                            "    - mtd: onenand: Pass correct pointer to IRQ handler",
                            "    - virtio-fs: fix incorrect check for fsvq->kobj",
                            "    - fs/namespace: correctly handle errors returned by grab_requested_mnt_ns",
                            "    - perf header: Write bpf_prog (infos|btfs)_cnt to data file",
                            "    - perf build: Don't fail fast path feature detection when binutils-devel",
                            "      is not available",
                            "    - perf lock: Fix segfault due to missing kernel map",
                            "    - perf test shell lock_contention: Extra debug diagnostics",
                            "    - perf test: Fix lock contention test",
                            "    - arm64: dts: rockchip: Set correct pinctrl for I2S1 8ch TX on odroid-m1",
                            "    - arm64: dts: rockchip: Fix PCIe power enable pin for BigTreeTech CB2 and",
                            "      Pi2",
                            "    - arm64: dts: rockchip: Make RK3588 GPU OPP table naming less generic",
                            "    - ARM: dts: imx6ull-engicam-microgea-rmm: fix report-rate-hz value",
                            "    - ARM: dts: imx51-zii-rdu1: Fix audmux node names",
                            "    - arm64: dts: imx8-ss-img: Avoid gpio0_mipi_csi GPIOs being deferred",
                            "    - arm64: dts: imx8mp-kontron: Fix USB OTG role switching",
                            "    - HID: hid-ntrig: Prevent memory leak in ntrig_report_version()",
                            "    - ARM: dts: BCM53573: Fix address of Luxul XAP-1440's Ethernet PHY",
                            "    - arm64: dts: rockchip: Fix USB power enable pin for BTT CB2 and Pi2",
                            "    - arm64: dts: rockchip: drop reset from rk3576 i2c9 node",
                            "    - pwm: adp5585: Correct mismatched pwm chip info",
                            "    - HID: playstation: Fix memory leak in dualshock4_get_calibration_data()",
                            "    - HID: uclogic: Fix potential memory leak in error path",
                            "    - LoongArch: KVM: Restore guest PMU if it is enabled",
                            "    - LoongArch: KVM: Add delay until timer interrupt injected",
                            "    - LoongArch: KVM: Fix max supported vCPUs set with EIOINTC",
                            "    - KVM: arm64: Make all 32bit ID registers fully writable",
                            "    - KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated",
                            "    - KVM: nSVM: Always recalculate LBR MSR intercepts in svm_update_lbrv()",
                            "    - KVM: nSVM: Fix and simplify LBR virtualization handling with nested",
                            "    - KVM: VMX: Fix check for valid GVA on an EPT violation",
                            "    - nfsd: add missing FATTR4_WORD2_CLONE_BLKSIZE from supported attributes",
                            "    - gcov: add support for GCC 15",
                            "    - kho: warn and exit when unpreserved page wasn't preserved",
                            "    - strparser: Fix signed/unsigned mismatch bug",
                            "    - dma-mapping: benchmark: Restore padding to ensure uABI remained",
                            "      consistent",
                            "    - maple_tree: fix tracepoint string pointers",
                            "    - LoongArch: Consolidate early_ioremap()/ioremap_prot()",
                            "    - LoongArch: Use correct accessor to read FWPC/MWPC",
                            "    - LoongArch: Let {pte,pmd}_modify() record the status of _PAGE_DIRTY",
                            "    - mm/damon/sysfs: change next_update_jiffies to a global variable",
                            "    - selftests/tracing: Run sample events to clear page cache events",
                            "    - wifi: mac80211: reject address change while connecting",
                            "    - mm/huge_memory: preserve PG_has_hwpoisoned if a folio is split to >0",
                            "      order",
                            "    - mm/mm_init: fix hash table order logging in alloc_large_system_hash()",
                            "    - mm/damon/stat: change last_refresh_jiffies to a global variable",
                            "    - mm/kmsan: fix kmsan kmalloc hook when no stack depots are allocated yet",
                            "    - mm/shmem: fix THP allocation and fallback loop",
                            "    - mm/mremap: honour writable bit in mremap pte batching",
                            "    - mm/huge_memory: fix folio split check for anon folios in swapcache",
                            "    - mmc: sdhci-of-dwcmshc: Change DLL_STRBIN_TAPNUM_DEFAULT to 0x4",
                            "    - mmc: pxamci: Simplify pxamci_probe() error handling using devm APIs",
                            "    - mmc: dw_mmc-rockchip: Fix wrong internal phase calculate",
                            "    - ASoC: sdw_utils: fix device reference leak in is_sdca_endpoint_present()",
                            "    - crypto: hisilicon/qm - Fix device reference leak in qm_get_qos_value",
                            "    - smb: client: fix cifs_pick_channel when channel needs reconnect",
                            "    - spi: Try to get ACPI GPIO IRQ earlier",
                            "    - x86/microcode/AMD: Add Zen5 model 0x44, stepping 0x1 minrev",
                            "    - x86/CPU/AMD: Add additional fixed RDSEED microcode revisions",
                            "    - selftests/user_events: fix type cast for write_index packed member in",
                            "      perf_test",
                            "    - gendwarfksyms: Skip files with no exports",
                            "    - ftrace: Fix BPF fexit with livepatch",
                            "    - LoongArch: Consolidate max_pfn & max_low_pfn calculation",
                            "    - LoongArch: Use physical addresses for CSR_MERRENTRY/CSR_TLBRENTRY",
                            "    - EDAC/altera: Handle OCRAM ECC enable after warm reset",
                            "    - EDAC/altera: Use INTTEST register for Ethernet and USB SBE injection",
                            "    - PM: hibernate: Emit an error when image writing fails",
                            "    - PM: hibernate: Use atomic64_t for compressed_size variable",
                            "    - btrfs: zoned: fix conventional zone capacity calculation",
                            "    - btrfs: zoned: fix stripe width calculation",
                            "    - btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe()",
                            "    - btrfs: do not update last_log_commit when logging inode due to a new",
                            "      name",
                            "    - btrfs: release root after error in data_reloc_print_warning_inode()",
                            "    - drm/amdkfd: relax checks for over allocation of save area",
                            "    - drm/amdgpu: disable peer-to-peer access for DCC-enabled GC12 VRAM",
                            "      surfaces",
                            "    - drm/i915/psr: fix pipe to vblank conversion",
                            "    - drm/xe/xe3lpg: Extend Wa_15016589081 for xe3lpg",
                            "    - drm/xe/xe3: Extend wa_14023061436",
                            "    - drm/xe/xe3: Add WA_14024681466 for Xe3_LPG",
                            "    - pmdomain: imx: Fix reference count leak in imx_gpc_remove",
                            "    - pmdomain: samsung: plug potential memleak during probe",
                            "    - pmdomain: samsung: Rework legacy splash-screen handover workaround",
                            "    - selftests: mptcp: connect: fix fallback note due to OoO",
                            "    - selftests: mptcp: join: rm: set backup flag",
                            "    - selftests: mptcp: join: endpoints: longer transfer",
                            "    - selftests: mptcp: connect: trunc: read all recv data",
                            "    - selftests: mptcp: join: userspace: longer transfer",
                            "    - selftests: mptcp: join: properly kill background tasks",
                            "    - mm/huge_memory: do not change split_huge_page*() target order silently",
                            "    - mm/memory: do not populate page table entries beyond i_size",
                            "    - scripts/decode_stacktrace.sh: symbol: avoid trailing whitespaces",
                            "    - scripts/decode_stacktrace.sh: symbol: preserve alignment",
                            "    - scripts/decode_stacktrace.sh: fix build ID and PC source parsing",
                            "    - ASoC: da7213: Convert to DEFINE_RUNTIME_DEV_PM_OPS()",
                            "    - ASoC: da7213: Use component driver suspend/resume",
                            "    - KVM: x86: Rename local \"ecx\" variables to \"msr\" and \"pmc\" as appropriate",
                            "    - KVM: x86: Add support for RDMSR/WRMSRNS w/ immediate on Intel",
                            "    - KVM: VMX: Inject #UD if guest tries to execute SEAMCALL or TDCALL",
                            "    - isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe()",
                            "    - net: phy: micrel: Fix lan8814_config_init",
                            "    - Linux 6.17.9",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68204",
                            "    - pmdomain: arm: scmi: Fix genpd leak on provider registration failure",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68203",
                            "    - drm/amdgpu: fix lock warning in amdgpu_userq_fence_driver_process",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40267",
                            "    - io_uring/rw: ensure allocated iovec gets cleared for early failure",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68198",
                            "    - crash: fix crashkernel resource shrink",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68199",
                            "    - codetag: debug: handle existing CODETAG_EMPTY in mark_objexts_empty for",
                            "      slabobj_ext",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40268",
                            "    - cifs: client: fix memory leak in smb3_fs_context_parse_param",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40269",
                            "    - ALSA: usb-audio: Fix potential overflow of PCM transfer buffer",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68205",
                            "    - ALSA: hda/hdmi: Fix breakage at probing nvhdmi-mcp driver",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40270",
                            "    - mm, swap: fix potential UAF issue for VMA readahead",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40271",
                            "    - fs/proc: fix uaf in proc_readdir_de()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40272",
                            "    - mm/secretmem: fix use-after-free race in fault handler",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68245",
                            "    - net: netpoll: fix incorrect refcount handling causing incorrect cleanup",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68240",
                            "    - nilfs2: avoid having an active sc_timer before freeing sci",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68241",
                            "    - ipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68211",
                            "    - ksm: use range-walk function to jump over holes in",
                            "      scan_get_next_rmap_item",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68246",
                            "    - ksmbd: close accepted socket when per-IP limit rejects connection",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40273",
                            "    - NFSD: free copynotify stateid in nfs4_free_ol_stateid()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40212",
                            "    - nfsd: fix refcount leak in nfsd_set_fh_dentry()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40274",
                            "    - KVM: guest_memfd: Remove bindings on memslot deletion when gmem is dying",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68202",
                            "    - sched_ext: Fix unsafe locking in the scx_dump_state()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68239",
                            "    - binfmt_misc: restore write access before closing files opened by",
                            "      open_exec()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68247",
                            "    - posix-timers: Plug potential memory leak in do_timer_create()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68208",
                            "    - bpf: account for current allocated stack depth in",
                            "      widen_imprecise_scalars()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68200",
                            "    - bpf: Add bpf_prog_run_data_pointers()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40275",
                            "    - ALSA: usb-audio: Fix NULL pointer dereference in",
                            "      snd_usb_mixer_controls_badd",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68242",
                            "    - NFS: Fix LTP test failures when timestamps are delegated",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68243",
                            "    - NFS: Check the TLS certificate fields in nfs_match_client()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40276",
                            "    - drm/panthor: Flush shmem writes before mapping buffers CPU-uncached",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40277",
                            "    - drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68206",
                            "    - netfilter: nft_ct: add seqadj extension for natted connections",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68209",
                            "    - mlx5: Fix default values in create CQ",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40278",
                            "    - net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-",
                            "      infoleak",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40279",
                            "    - net: sched: act_connmark: initialize struct tc_ife to fix kernel leak",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40280",
                            "    - tipc: Fix use-after-free in tipc_mon_reinit_self().",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40281",
                            "    - sctp: prevent possible shift-out-of-bounds in sctp_transport_update_rto",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40282",
                            "    - Bluetooth: 6lowpan: reset link-local header on ipv6 recv path",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40283",
                            "    - Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40284",
                            "    - Bluetooth: MGMT: cancel mesh send timer when hdev removed",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68210",
                            "    - erofs: avoid infinite loop due to incomplete zstd-compressed data",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40285",
                            "    - smb/server: fix possible refcount leak in smb2_sess_setup()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40286",
                            "    - smb/server: fix possible memory leak in smb2_read()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40287",
                            "    - exfat: fix improper check of dentry.stream.valid_size",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40288",
                            "    - drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-40289",
                            "    - drm/amdgpu: hide VRAM sysfs attributes on GPUs without VRAM",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68201",
                            "    - drm/amdgpu: remove two invalid BUG_ON()s",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68207",
                            "    - drm/xe/guc: Synchronize Dead CT worker with unbind",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136850) //",
                            "    CVE-2025-68244",
                            "    - drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833)",
                            "    - Revert \"Bluetooth: L2CAP: convert timeouts to secs_to_jiffies()\"",
                            "    - sched_ext: Mark scx_bpf_dsq_move_set_[slice|vtime]() with KF_RCU",
                            "    - net: usb: asix_devices: Check return value of usbnet_get_endpoints",
                            "    - fbdev: atyfb: Check if pll_ops->init_pll failed",
                            "    - ACPI: button: Call input_free_device() on failing input device",
                            "      registration",
                            "    - ACPI: fan: Use platform device for devres-related actions",
                            "    - virtio-net: drop the multi-buffer XDP packet in zerocopy",
                            "    - batman-adv: Release references to inactive interfaces",
                            "    - Bluetooth: rfcomm: fix modem control handling",
                            "    - net: phy: dp83867: Disable EEE support as not implemented",
                            "    - fbdev: pvr2fb: Fix leftover reference to ONCHIP_NR_DMA_CHANNELS",
                            "    - fbdev: valkyriefb: Fix reference count leak in valkyriefb_init",
                            "    - mptcp: drop bogus optimization in __mptcp_check_push()",
                            "    - mptcp: restore window probe",
                            "    - ASoC: qdsp6: q6asm: do not sleep while atomic",
                            "    - ASoC: renesas: rz-ssi: Use proper dma_buffer_pos after resume",
                            "    - s390/pci: Restore IRQ unconditionally for the zPCI device",
                            "    - x86/build: Disable SSE4a",
                            "    - wifi: ath10k: Fix memory leak on unsupported WMI command",
                            "    - wifi: ath11k: Add missing platform IDs for quirk table",
                            "    - wifi: ath12k: free skb during idr cleanup callback",
                            "    - wifi: ath11k: avoid bit operation on key flags",
                            "    - drm/msm/a6xx: Fix GMU firmware parser",
                            "    - ALSA: usb-audio: fix control pipe direction",
                            "    - ASoC: cs-amp-lib-test: Fix missing include of kunit/test-bug.h",
                            "    - wifi: mac80211: reset FILS discovery and unsol probe resp intervals",
                            "    - wifi: mac80211: fix key tailroom accounting leak",
                            "    - wifi: nl80211: call kfree without a NULL check",
                            "    - kunit: test_dev_action: Correctly cast 'priv' pointer to long*",
                            "    - scsi: ufs: core: Initialize value of an attribute returned by uic cmd",
                            "    - scsi: core: Fix the unit attention counter implementation",
                            "    - bpf: Do not audit capability check in do_jit()",
                            "    - nvmet-auth: update sc_c in host response",
                            "    - crypto: s390/phmac - Do not modify the req->nbytes value",
                            "    - ASoC: Intel: avs: Unprepare a stream when XRUN occurs",
                            "    - ASoC: fsl_sai: fix bit order for DSD format",
                            "    - ASoC: fsl_micfil: correct the endian format for DSD",
                            "    - libbpf: Fix powerpc's stack register definition in bpf_tracing.h",
                            "    - ASoC: mediatek: Fix double pm_runtime_disable in remove functions",
                            "    - Bluetooth: ISO: Fix BIS connection dst_type handling",
                            "    - Bluetooth: btmtksdio: Add pmctrl handling for BT closed state during",
                            "      reset",
                            "    - Bluetooth: HCI: Fix tracking of advertisement set/instance 0x00",
                            "    - Bluetooth: ISO: Fix another instance of dst_type handling",
                            "    - Bluetooth: btintel_pcie: Fix event packet loss issue",
                            "    - Bluetooth: hci_conn: Fix connection cleanup with BIG with 2 or more BIS",
                            "    - Bluetooth: hci_core: Fix tracking of periodic advertisement",
                            "    - bpf: Conditionally include dynptr copy kfuncs",
                            "    - drm/msm: Ensure vm is created in VM_BIND ioctl",
                            "    - ALSA: usb-audio: add mono main switch to Presonus S1824c",
                            "    - ALSA: usb-audio: don't log messages meant for 1810c when initializing",
                            "      1824c",
                            "    - ACPI: MRRM: Check revision of MRRM table",
                            "    - drm/etnaviv: fix flush sequence logic",
                            "    - tools: ynl: fix string attribute length to include null terminator",
                            "    - net: hns3: return error code when function fails",
                            "    - sfc: fix potential memory leak in efx_mae_process_mport()",
                            "    - tools: ynl: avoid print_field when there is no reply",
                            "    - dpll: spec: add missing module-name and clock-id to pin-get reply",
                            "    - ASoC: fsl_sai: Fix sync error in consumer mode",
                            "    - ASoC: soc_sdw_utils: remove cs42l43 component_name",
                            "    - drm/amd/pm: fix smu table id bound check issue in smu_cmn_update_table()",
                            "    - drm/amd/pm/powerplay/smumgr: Fix PCIeBootLinkLevel value on Fiji",
                            "    - drm/amd/pm/powerplay/smumgr: Fix PCIeBootLinkLevel value on Iceland",
                            "    - drm/amdgpu: fix SPDX headers on amdgpu_cper.c/h",
                            "    - drm/amdgpu: fix SPDX header on amd_cper.h",
                            "    - drm/amdgpu: fix SPDX header on irqsrcs_vcn_5_0.h",
                            "    - ACPI: fan: Use ACPI handle when retrieving _FST",
                            "    - block: fix op_is_zone_mgmt() to handle REQ_OP_ZONE_RESET_ALL",
                            "    - block: make REQ_OP_ZONE_OPEN a write operation",
                            "    - dma-fence: Fix safe access wrapper to call timeline name method",
                            "    - kbuild: align modinfo section for Secureboot Authenticode EDK2 compat",
                            "    - regmap: irq: Correct documentation of wake_invert flag",
                            "    - [Config] Disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP for s390x",
                            "    - s390/mm: Fix memory leak in add_marker() when kvrealloc() fails",
                            "    - drm/xe: Do not wake device during a GT reset",
                            "    - drm/sched: avoid killing parent entity on child SIGKILL",
                            "    - drm/sched: Fix race in drm_sched_entity_select_rq()",
                            "    - drm/nouveau: Fix race in nouveau_sched_fini()",
                            "    - drm/i915/dmc: Clear HRR EVT_CTL/HTP to zero on ADL-S",
                            "    - drm/ast: Clear preserved bits from register output value",
                            "    - drm/amd: Check that VPE has reached DPM0 in idle handler",
                            "    - drm/amd/display: Fix incorrect return of vblank enable on unconfigured",
                            "      crtc",
                            "    - drm/amd/display: Don't program BLNDGAM_MEM_PWR_FORCE when CM low-power",
                            "      is disabled on DCN30",
                            "    - drm/amd/display: Add HDR workaround for a specific eDP",
                            "    - mptcp: leverage skb deferral free",
                            "    - mptcp: fix MSG_PEEK stream corruption",
                            "    - cpuidle: governors: menu: Rearrange main loop in menu_select()",
                            "    - cpuidle: governors: menu: Select polling state in some more cases",
                            "    - PM: hibernate: Combine return paths in power_down()",
                            "    - PM: sleep: Allow pm_restrict_gfp_mask() stacking",
                            "    - mfd: kempld: Switch back to earlier ->init() behavior",
                            "    - soc: aspeed: socinfo: Add AST27xx silicon IDs",
                            "    - firmware: qcom: scm: preserve assign_mem() error return value",
                            "    - soc: qcom: smem: Fix endian-unaware access of num_entries",
                            "    - spi: loopback-test: Don't use %pK through printk",
                            "    - spi: spi-qpic-snand: handle 'use_ecc' parameter of",
                            "      qcom_spi_config_cw_read()",
                            "    - soc: ti: pruss: don't use %pK through printk",
                            "    - bpf: Don't use %pK through printk",
                            "    - mmc: sdhci: Disable SD card clock before changing parameters",
                            "    - pinctrl: single: fix bias pull up/down handling in pin_config_set",
                            "    - mmc: host: renesas_sdhi: Fix the actual clock",
                            "    - memstick: Add timeout to prevent indefinite waiting",
                            "    - cpufreq: ti: Add support for AM62D2",
                            "    - bpf: Use tnums for JEQ/JNE is_branch_taken logic",
                            "    - firmware: ti_sci: Enable abort handling of entry to LPM",
                            "    - firewire: ohci: move self_id_complete tracepoint after validating",
                            "      register",
                            "    - irqchip/sifive-plic: Respect mask state when setting affinity",
                            "    - irqchip/loongson-eiointc: Route interrupt parsed from bios table",
                            "    - ACPI: sysfs: Use ACPI_FREE() for freeing an ACPI object",
                            "    - ACPI: video: force native for Lenovo 82K8",
                            "    - libbpf: Fix USDT SIB argument handling causing unrecognized register",
                            "      error",
                            "    - selftests/bpf: Fix bpf_prog_detach2 usage in test_lirc_mode2",
                            "    - arm64: versal-net: Update rtc calibration value",
                            "    - Revert \"UBUNTU: SAUCE: firmware: qcom: scm: Allow QSEECOM on Dell",
                            "      Inspiron 7441 / Latitude 7455\"",
                            "    - firmware: qcom: scm: Allow QSEECOM on Dell Inspiron 7441 / Latitude 7455",
                            "    - kselftest/arm64: tpidr2: Switch to waitpid() over wait4()",
                            "    - arc: Fix __fls() const-foldability via __builtin_clzl()",
                            "    - selftests/bpf: Upon failures, exit with code 1 in test_xsk.sh",
                            "    - irqchip/gic-v2m: Handle Multiple MSI base IRQ Alignment",
                            "    - ACPI: PRM: Skip handlers with NULL handler_address or NULL VA",
                            "    - ACPI: resource: Skip IRQ override on ASUS Vivobook Pro N6506CU",
                            "    - ACPI: scan: Add Intel CVS ACPI HIDs to acpi_ignore_dep_ids[]",
                            "    - thermal: gov_step_wise: Allow cooling level to be reduced earlier",
                            "    - thermal: intel: selftests: workload_hint: Mask unsupported types",
                            "    - power: supply: qcom_battmgr: add OOI chemistry",
                            "    - hwmon: (k10temp) Add thermal support for AMD Family 1Ah-based models",
                            "    - hwmon: (k10temp) Add device ID for Strix Halo",
                            "    - hwmon: (lenovo-ec-sensors) Update P8 supprt",
                            "    - hwmon: (sbtsi_temp) AMD CPU extended temperature range support",
                            "    - pinctrl: renesas: rzg2l: Add suspend/resume support for Schmitt control",
                            "      registers",
                            "    - pinctrl: keembay: release allocated memory in detach path",
                            "    - power: supply: sbs-charger: Support multiple devices",
                            "    - io_uring/rsrc: respect submitter_task in io_register_clone_buffers()",
                            "    - hwmon: sy7636a: add alias",
                            "    - selftests/bpf: Fix incorrect array size calculation",
                            "    - block: check for valid bio while splitting",
                            "    - irqchip/loongson-pch-lpc: Use legacy domain for PCH-LPC IRQ controller",
                            "    - cpufreq: ondemand: Update the efficient idle check for Intel extended",
                            "      Families",
                            "    - arm64: zynqmp: Disable coresight by default",
                            "    - arm64: zynqmp: Revert usb node drive strength and slew rate for zcu106",
                            "    - soc/tegra: fuse: Add Tegra114 nvmem cells and fuse lookups",
                            "    - ARM: tegra: p880: set correct touchscreen clipping",
                            "    - ARM: tegra: transformer-20: add missing magnetometer interrupt",
                            "    - ARM: tegra: transformer-20: fix audio-codec interrupt",
                            "    - firmware: qcom: tzmem: disable sc7180 platform",
                            "    - soc: ti: k3-socinfo: Add information for AM62L SR1.1",
                            "    - mmc: sdhci-msm: Enable tuning for SDR50 mode for SD card",
                            "    - pwm: pca9685: Use bulk write to atomicially update registers",
                            "    - ACPICA: dispatcher: Use acpi_ds_clear_operands() in",
                            "      acpi_ds_call_control_method()",
                            "    - tee: allow a driver to allocate a tee_device without a pool",
                            "    - kunit: Enable PCI on UML without triggering WARN()",
                            "    - selftests/bpf: Fix arena_spin_lock selftest failure",
                            "    - bpf: Do not limit bpf_cgroup_from_id to current's namespace",
                            "    - i3c: mipi-i3c-hci-pci: Add support for Intel Wildcat Lake-U I3C",
                            "    - rust: kunit: allow `cfg` on `test`s",
                            "    - video: backlight: lp855x_bl: Set correct EPROM start for LP8556",
                            "    - i3c: dw: Add shutdown support to dw_i3c_master driver",
                            "    - io_uring/zcrx: check all niovs filled with dma addresses",
                            "    - tools/cpupower: fix error return value in cpupower_write_sysfs()",
                            "    - io_uring/zcrx: account niov arrays to cgroup",
                            "    - pmdomain: apple: Add \"apple,t8103-pmgr-pwrstate\"",
                            "    - power: supply: qcom_battmgr: handle charging state change notifications",
                            "    - bpftool: Fix -Wuninitialized-const-pointer warnings with clang >= 21",
                            "    - cpuidle: Fail cpuidle device registration if there is one already",
                            "    - selftests/bpf: Fix selftest verifier_arena_large failure",
                            "    - selftests: ublk: fix behavior when fio is not installed",
                            "    - spi: rpc-if: Add resume support for RZ/G3E",
                            "    - ACPI: SPCR: Support Precise Baud Rate field",
                            "    - clocksource/drivers/vf-pit: Replace raw_readl/writel to readl/writel",
                            "    - clocksource/drivers/timer-rtl-otto: Work around dying timers",
                            "    - clocksource/drivers/timer-rtl-otto: Do not interfere with interrupts",
                            "    - riscv: bpf: Fix uninitialized symbol 'retval_off'",
                            "    - bpf: Clear pfmemalloc flag when freeing all fragments",
                            "    - selftests: drv-net: Pull data before parsing headers",
                            "    - nvme: Use non zero KATO for persistent discovery connections",
                            "    - uprobe: Do not emulate/sstep original instruction when ip is changed",
                            "    - hwmon: (asus-ec-sensors) increase timeout for locking ACPI mutex",
                            "    - hwmon: (dell-smm) Remove Dell Precision 490 custom config data",
                            "    - hwmon: (dell-smm) Add support for Dell OptiPlex 7040",
                            "    - tools/cpupower: Fix incorrect size in cpuidle_state_disable()",
                            "    - selftests/bpf: Fix flaky bpf_cookie selftest",
                            "    - tools/power turbostat: Fix incorrect sorting of PMT telemetry",
                            "    - tools/power x86_energy_perf_policy: Fix incorrect fopen mode usage",
                            "    - tools/power x86_energy_perf_policy: Enhance HWP enable",
                            "    - tools/power x86_energy_perf_policy: Prefer driver HWP limits",
                            "    - mfd: simple-mfd-i2c: Add compatible strings for Layerscape QIXIS FPGA",
                            "    - mfd: stmpe: Remove IRQ domain upon removal",
                            "    - mfd: stmpe-i2c: Add missing MODULE_LICENSE",
                            "    - mfd: qnap-mcu: Handle errors returned from qnap_mcu_write",
                            "    - mfd: qnap-mcu: Include linux/types.h in qnap-mcu.h shared header",
                            "    - mfd: madera: Work around false-positive -Wininitialized warning",
                            "    - mfd: da9063: Split chip variant reading in two bus transactions",
                            "    - mfd: macsmc: Add \"apple,t8103-smc\" compatible",
                            "    - mfd: core: Increment of_node's refcount before linking it to the",
                            "      platform device",
                            "    - mfd: cs42l43: Move IRQ enable/disable to encompass force suspend",
                            "    - mfd: intel-lpss: Add Intel Wildcat Lake LPSS PCI IDs",
                            "    - drm/xe/ptl: Apply Wa_16026007364",
                            "    - drm/xe/configfs: Enforce canonical device names",
                            "    - drm/amd/display: Update tiled to tiled copy command",
                            "    - drm/amd/display: fix condition for setting timing_adjust_pending",
                            "    - drm/amd/display: ensure committing streams is seamless",
                            "    - drm/amdgpu: add range check for RAS bad page address",
                            "    - drm/amdgpu: Check vcn sram load return value",
                            "    - drm/amd/display: Remove check DPIA HPD status for BW Allocation",
                            "    - drm/amd/display: Increase AUX Intra-Hop Done Max Wait Duration",
                            "    - drm/amd/display: Fix dmub_cmd header alignment",
                            "    - drm/xe/guc: Add more GuC load error status codes",
                            "    - drm/xe/pf: Don't resume device from restart worker",
                            "    - drm/amdgpu: Fix build error when CONFIG_SUSPEND is disabled",
                            "    - drm/amdgpu: Update IPID value for bad page threshold CPER",
                            "    - drm/amdgpu: Avoid rma causes GPU duplicate reset",
                            "    - drm/amdgpu: Effective health check before reset",
                            "    - drm/amd/amdgpu: Release xcp drm memory after unplug",
                            "    - drm/amdgpu: Fix vcn v5.0.1 poison irq call trace",
                            "    - drm/xe: Extend wa_13012615864 to additional Xe2 and Xe3 platforms",
                            "    - drm/amdgpu: Skip poison aca bank from UE channel",
                            "    - drm/amd/display: add more cyan skillfish devices",
                            "    - drm/amdgpu: Initialize jpeg v5_0_1 ras function",
                            "    - drm/amdgpu: skip mgpu fan boost for multi-vf",
                            "    - drm/amd/display: fix dmub access race condition",
                            "    - drm/amd/display: update dpp/disp clock from smu clock table",
                            "    - drm/amd/pm: Use cached metrics data on aldebaran",
                            "    - drm/amd/pm: Use cached metrics data on arcturus",
                            "    - accel/amdxdna: Unify pm and rpm suspend and resume callbacks",
                            "    - drm/amdgpu/jpeg: Hold pg_lock before jpeg poweroff",
                            "    - drm/xe/pf: Program LMTT directory pointer on all GTs within a tile",
                            "    - drm/nouveau: replace snprintf() with scnprintf() in nvkm_snprintbf()",
                            "    - ASoC: tas2781: Add keyword \"init\" in profile section",
                            "    - ASoC: mediatek: Use SND_JACK_AVOUT for HDMI/DP jacks",
                            "    - drm/amd/display: Reset apply_eamless_boot_optimization when dpms_off",
                            "    - drm/amdgpu: add to custom amdgpu_drm_release drm_dev_enter/exit",
                            "    - drm/amd/display: Wait until OTG enable state is cleared",
                            "    - drm/xe: rework PDE PAT index selection",
                            "    - docs: kernel-doc: avoid script crash on ancient Python",
                            "    - drm/sharp-memory: Do not access GEM-DMA vaddr directly",
                            "    - PCI: Disable MSI on RDC PCI to PCIe bridges",
                            "    - drm/nouveau: always set RMDevidCheckIgnore for GSP-RM",
                            "    - drm/panel-edp: Add SHP LQ134Z1 panel for Dell XPS 9345",
                            "    - selftests/net: Replace non-standard __WORDSIZE with sizeof(long) * 8",
                            "    - selftests/net: Ensure assert() triggers in psock_tpacket.c",
                            "    - wifi: rtw89: print just once for unknown C2H events",
                            "    - wifi: rtw88: sdio: use indirect IO for device registers before power-on",
                            "    - wifi: rtw89: add dummy C2H handlers for BCN resend and update done",
                            "    - drm/amdkfd: return -ENOTTY for unsupported IOCTLs",
                            "    - selftests: drv-net: devmem: add / correct the IPv6 support",
                            "    - selftests: drv-net: devmem: flip the direction of Tx tests",
                            "    - media: pci: ivtv: Don't create fake v4l2_fh",
                            "    - media: amphion: Delete v4l2_fh synchronously in .release()",
                            "    - drm/tidss: Use the crtc_* timings when programming the HW",
                            "    - drm/bridge: cdns-dsi: Fix REG_WAKEUP_TIME value",
                            "    - drm/bridge: cdns-dsi: Don't fail on MIPI_DSI_MODE_VIDEO_BURST",
                            "    - drm/tidss: Set crtc modesetting parameters with adjusted mode",
                            "    - drm/tidss: Remove early fb",
                            "    - RDMA/mana_ib: Drain send wrs of GSI QP",
                            "    - media: i2c: Kconfig: Ensure a dependency on HAVE_CLK for",
                            "      VIDEO_CAMERA_SENSOR",
                            "    - PCI/ERR: Update device error_state already after reset",
                            "    - x86/vsyscall: Do not require X86_PF_INSTR to emulate vsyscall",
                            "    - net: stmmac: Check stmmac_hw_setup() in stmmac_resume()",
                            "    - ice: Don't use %pK through printk or tracepoints",
                            "    - thunderbolt: Use is_pciehp instead of is_hotplug_bridge",
                            "    - ASoC: es8323: enable DAPM power widgets for playback DAC and output",
                            "    - powerpc/eeh: Use result of error_detected() in uevent",
                            "    - s390/pci: Use pci_uevent_ers() in PCI recovery",
                            "    - bridge: Redirect to backup port when port is administratively down",
                            "    - selftests: drv-net: wait for carrier",
                            "    - net: phy: mscc: report and configure in-band auto-negotiation for",
                            "      SGMII/QSGMII",
                            "    - scsi: ufs: host: mediatek: Fix auto-hibern8 timer configuration",
                            "    - scsi: ufs: host: mediatek: Fix PWM mode switch issue",
                            "    - scsi: ufs: host: mediatek: Assign power mode userdata before FASTAUTO",
                            "      mode change",
                            "    - scsi: ufs: host: mediatek: Change reset sequence for improved stability",
                            "    - scsi: ufs: host: mediatek: Fix invalid access in vccqx handling",
                            "    - gpu: nova-core: register: allow fields named `offset`",
                            "    - drm/panthor: Serialize GPU cache flush operations",
                            "    - HID: pidff: Use direction fix only for conditional effects",
                            "    - HID: pidff: PERMISSIVE_CONTROL quirk autodetection",
                            "    - drm/bridge: display-connector: don't set OP_DETECT for DisplayPorts",
                            "    - drm/amdkfd: Handle lack of READ permissions in SVM mapping",
                            "    - drm/amdgpu: refactor bad_page_work for corner case handling",
                            "    - hwrng: timeriomem - Use us_to_ktime() where appropriate",
                            "    - iio: adc: spear_adc: mask SPEAR_ADC_STATUS channel and avg sample before",
                            "      setting register",
                            "    - iio: adc: imx93_adc: load calibrated values even calibration failed",
                            "    - usb: gadget: f_ncm: Fix MAC assignment NCM ethernet",
                            "    - ASoC: es8323: remove DAC enablement write from es8323_probe",
                            "    - ASoC: es8323: add proper left/right mixer controls via DAPM",
                            "    - ASoC: codecs: wsa883x: Handle shared reset GPIO for WSA883x speakers",
                            "    - drm/xe: Make page size consistent in loop",
                            "    - wifi: rtw89: wow: remove notify during WoWLAN net-detect",
                            "    - wifi: rtw89: fix BSSID comparison for non-transmitted BSSID",
                            "    - wifi: rtw89: 8851b: rfk: update IQK TIA setting",
                            "    - dm error: mark as DM_TARGET_PASSES_INTEGRITY",
                            "    - char: misc: Make misc_register() reentry for miscdevice who wants",
                            "      dynamic minor",
                            "    - char: misc: Does not request module for miscdevice with dynamic minor",
                            "    - net: When removing nexthops, don't call synchronize_net if it is not",
                            "      necessary",
                            "    - net: Call trace_sock_exceed_buf_limit() for memcg failure with",
                            "      SK_MEM_RECV.",
                            "    - dmaengine: idxd: Add a new IAA device ID for Wildcat Lake family",
                            "      platforms",
                            "    - PCI/P2PDMA: Fix incorrect pointer usage in devm_kfree() call",
                            "    - bnxt_en: Add Hyper-V VF ID",
                            "    - tty: serial: Modify the use of dev_err_probe()",
                            "    - ALSA: usb-audio: Add validation of UAC2/UAC3 effect units",
                            "    - Octeontx2-af: Broadcast XON on all channels",
                            "    - idpf: do not linearize big TSO packets",
                            "    - drm/xe/pcode: Initialize data0 for pcode read routine",
                            "    - drm/panel: ilitek-ili9881c: turn off power-supply when init fails",
                            "    - drm/panel: ilitek-ili9881c: move display_on/_off dcs calls to",
                            "      (un-)prepare",
                            "    - rds: Fix endianness annotation for RDS_MPATH_HASH",
                            "    - net: wangxun: limit tx_max_coalesced_frames_irq",
                            "    - iio: imu: bmi270: Match PNP ID found on newer GPD firmware",
                            "    - media: ipu6: isys: Set embedded data type correctly for metadata formats",
                            "    - rpmsg: char: Export alias for RPMSG ID rpmsg-raw from table",
                            "    - net: ipv4: allow directed broadcast routes to use dst hint",
                            "    - scsi: mpi3mr: Fix device loss during enclosure reboot due to zero link",
                            "      speed",
                            "    - wifi: rtw89: coex: Limit Wi-Fi scan slot cost to avoid A2DP glitch",
                            "    - scsi: mpi3mr: Fix I/O failures during controller reset",
                            "    - scsi: mpi3mr: Fix controller init failure on fault during queue creation",
                            "    - scsi: pm80xx: Fix race condition caused by static variables",
                            "    - extcon: adc-jack: Fix wakeup source leaks on device unbind",
                            "    - extcon: fsa9480: Fix wakeup source leaks on device unbind",
                            "    - extcon: axp288: Fix wakeup source leaks on device unbind",
                            "    - drm/xe: Set GT as wedged before sending wedged uevent",
                            "    - remoteproc: wkup_m3: Use devm_pm_runtime_enable() helper",
                            "    - drm/xe/wcl: Extend L3bank mask workaround",
                            "    - net: phy: fixed_phy: let fixed_phy_unregister free the phy_device",
                            "    - selftests: drv-net: hds: restore hds settings",
                            "    - fuse: zero initialize inode private data",
                            "    - virtio_fs: fix the hash table using in virtio_fs_enqueue_req()",
                            "    - selftests: pci_endpoint: Skip IRQ test if IRQ is out of range.",
                            "    - drm/xe: Ensure GT is in C0 during resumes",
                            "    - misc: pci_endpoint_test: Skip IRQ tests if irq is out of range",
                            "    - drm/amdgpu: Correct the loss of aca bank reg info",
                            "    - drm/amdgpu: Correct the counts of nr_banks and nr_errors",
                            "    - drm/amdkfd: fix vram allocation failure for a special case",
                            "    - drm/amd/display: Support HW cursor 180 rot for any number of pipe splits",
                            "    - drm/amdkfd: Tie UNMAP_LATENCY to queue_preemption",
                            "    - drm/amd/display: wait for otg update pending latch before clock",
                            "      optimization",
                            "    - drm/amd/display: Consider sink max slice width limitation for dsc",
                            "    - drm/amdgpu/vpe: cancel delayed work in hw_fini",
                            "    - drm/xe: Cancel pending TLB inval workers on teardown",
                            "    - net: Prevent RPS table overwrite of active flows",
                            "    - eth: fbnic: Reset hw stats upon PCI error",
                            "    - wifi: iwlwifi: mld: trigger mlo scan only when not in EMLSR",
                            "    - platform/x86/intel-uncore-freq: Fix warning in partitioned system",
                            "    - drm/msm/dpu: Filter modes based on adjusted mode clock",
                            "    - drm/msm: Use of_reserved_mem_region_to_resource() for \"memory-region\"",
                            "    - selftests: drv-net: rss_ctx: fix the queue count check",
                            "    - media: fix uninitialized symbol warnings",
                            "    - media: pci: mgb4: Fix timings comparison in VIDIOC_S_DV_TIMINGS",
                            "    - ASoC: SOF: ipc4-pcm: Add fixup for channels",
                            "    - drm/amdgpu: Notify pmfw bad page threshold exceeded",
                            "    - drm/amd/display: Increase minimum clock for TMDS 420 with pipe splitting",
                            "    - drm/amdgpu: Avoid jpeg v5.0.1 poison irq call trace on sriov guest",
                            "    - drm/amd/display: incorrect conditions for failing dto calculations",
                            "    - drm/amdgpu: Avoid vcn v5.0.1 poison irq call trace on sriov guest",
                            "    - drm/amdgpu: Respect max pixel clock for HDMI and DVI-D (v2)",
                            "    - mips: lantiq: danube: add missing properties to cpu node",
                            "    - mips: lantiq: danube: add model to EASY50712 dts",
                            "    - mips: lantiq: danube: add missing device_type in pci node",
                            "    - mips: lantiq: xway: sysctrl: rename stp clock",
                            "    - mips: lantiq: danube: rename stp node on EASY50712 reference board",
                            "    - inet_diag: annotate data-races in inet_diag_bc_sk()",
                            "    - microchip: lan865x: add ndo_eth_ioctl handler to enable PHY ioctl",
                            "      support",
                            "    - crypto: qat - use kcalloc() in qat_uclo_map_objs_from_mof()",
                            "    - scsi: pm8001: Use int instead of u32 to store error codes",
                            "    - iio: adc: ad7124: do not require mclk",
                            "    - scsi: ufs: exynos: fsd: Gate ref_clk and put UFS device in reset on",
                            "      suspend",
                            "    - media: imx-mipi-csis: Only set clock rate when specified in DT",
                            "    - wifi: iwlwifi: pcie: remember when interrupts are disabled",
                            "    - drm/st7571-i2c: add support for inverted pixel format",
                            "    - ptp: Limit time setting of PTP clocks",
                            "    - dmaengine: sh: setup_xref error handling",
                            "    - dmaengine: mv_xor: match alloc_wc and free_wc",
                            "    - dmaengine: dw-edma: Set status for callback_result",
                            "    - netfilter: nf_tables: all transaction allocations can now sleep",
                            "    - drm/msm/dsi/phy: Toggle back buffer resync after preparing PLL",
                            "    - drm/msm/dsi/phy_7nm: Fix missing initial VCO rate",
                            "    - drm/amdgpu: Allow kfd CRIU with no buffer objects",
                            "    - drm/xe/guc: Increase GuC crash dump buffer size",
                            "    - drm/amd/pm: Increase SMC timeout on SI and warn (v3)",
                            "    - move_mount(2): take sanity checks in 'beneath' case into do_lock_mount()",
                            "    - selftests: drv-net: rss_ctx: make the test pass with few queues",
                            "    - ipv6: Add sanity checks on ipv6_devconf.rpl_seg_enabled",
                            "    - drm/xe: Extend Wa_22021007897 to Xe3 platforms",
                            "    - wifi: mac80211: count reg connection element in the size",
                            "    - drm/panthor: check bo offset alignment in vm bind",
                            "    - drm: panel-backlight-quirks: Make EDID match optional",
                            "    - ixgbe: reduce number of reads when getting OROM data",
                            "    - netlink: specs: fou: change local-v6/peer-v6 check",
                            "    - net: nfc: nci: Increase NCI_DATA_TIMEOUT to 3000 ms",
                            "    - media: adv7180: Add missing lock in suspend callback",
                            "    - media: adv7180: Do not write format to device in set_fmt",
                            "    - media: adv7180: Only validate format in querystd",
                            "    - media: verisilicon: Explicitly disable selection api ioctls for decoders",
                            "    - wifi: mac80211: Fix 6 GHz Band capabilities element advertisement in",
                            "      lower bands",
                            "    - platform/x86: think-lmi: Add extra TC BIOS error messages",
                            "    - platform/x86/intel-uncore-freq: Present unique domain ID per package",
                            "    - ALSA: usb-audio: apply quirk for MOONDROP Quark2",
                            "    - PCI: imx6: Enable the Vaux supply if available",
                            "    - drm/xe/guc: Set upper limit of H2G retries over CTB",
                            "    - net: call cond_resched() less often in __release_sock()",
                            "    - smsc911x: add second read of EEPROM mac when possible corruption seen",
                            "    - drm/xe: improve dma-resv handling for backup object",
                            "    - iommu/amd: Add support to remap/unmap IOMMU buffers for kdump",
                            "    - iommu/amd: Skip enabling command/event buffers for kdump",
                            "    - iommu/amd: Reuse device table for kdump",
                            "    - crypto: ccp: Skip SEV and SNP INIT for kdump boot",
                            "    - iommu/apple-dart: Clear stream error indicator bits for T8110 DARTs",
                            "    - bus: mhi: host: pci_generic: Add support for all Foxconn T99W696 SKU",
                            "      variants",
                            "    - drm/amdgpu: Correct info field of bad page threshold exceed CPER",
                            "    - drm/amd: add more cyan skillfish PCI ids",
                            "    - drm/amdgpu: don't enable SMU on cyan skillfish",
                            "    - drm/amdgpu: add support for cyan skillfish gpu_info",
                            "    - drm/amd/display: Fix pbn_div Calculation Error",
                            "    - drm/amd/display: dont wait for pipe update during medupdate/highirq",
                            "    - drm/amd/pm: refine amdgpu pm sysfs node error code",
                            "    - drm/amd/display: Indicate when custom brightness curves are in use",
                            "    - selftests: ncdevmem: don't retry EFAULT",
                            "    - net: dsa: felix: support phy-mode = \"10g-qxgmii\"",
                            "    - usb: gadget: f_hid: Fix zero length packet transfer",
                            "    - serial: qcom-geni: Add DFS clock mode support to GENI UART driver",
                            "    - serdev: Drop dev_pm_domain_detach() call",
                            "    - tty/vt: Add missing return value for VT_RESIZE in vt_ioctl()",
                            "    - eeprom: at25: support Cypress FRAMs without device ID",
                            "    - drm/msm/adreno: Add speedbins for A663 GPU",
                            "    - drm/msm: Fix 32b size truncation",
                            "    - dt-bindings: display/msm/gmu: Update Adreno 623 bindings",
                            "    - drm/msm: make sure to not queue up recovery more than once",
                            "    - char: Use list_del_init() in misc_deregister() to reinitialize list",
                            "      pointer",
                            "    - drm/msm/adreno: Add speedbin data for A623 GPU",
                            "    - drm/msm/adreno: Add fenced regwrite support",
                            "    - drm/msm/a6xx: Switch to GMU AO counter",
                            "    - idpf: link NAPIs to queues",
                            "    - selftests: net: make the dump test less sensitive to mem accounting",
                            "    - PCI: endpoint: pci-epf-test: Limit PCIe BAR size for fixed BARs",
                            "    - wifi: rtw89: Add USB ID 2001:332a for D-Link AX9U rev. A1",
                            "    - wifi: rtw89: Add USB ID 2001:3327 for D-Link AX18U rev. A1",
                            "    - wifi: iwlwifi: fw: Add ASUS to PPAG and TAS list",
                            "    - drm/xe/i2c: Enable bus mastering",
                            "    - media: ov08x40: Fix the horizontal flip control",
                            "    - media: i2c: og01a1b: Specify monochrome media bus format instead of",
                            "      Bayer",
                            "    - media: qcom: camss: csiphy-3ph: Add CSIPHY 2ph DPHY v2.0.1 init sequence",
                            "    - drm/bridge: write full Audio InfoFrame",
                            "    - drm/xe/guc: Always add CT disable action during second init step",
                            "    - f2fs: fix wrong layout information on 16KB page",
                            "    - selftests: mptcp: join: allow more time to send ADD_ADDR",
                            "    - scsi: ufs: host: mediatek: Enhance recovery on resume failure",
                            "    - scsi: ufs: ufs-qcom: Align programming sequence of Shared ICE for UFS",
                            "      controller v5",
                            "    - scsi: ufs: host: mediatek: Fix unbalanced IRQ enable issue",
                            "    - scsi: ufs: host: mediatek: Enhance recovery on hibernation exit failure",
                            "    - net: phy: marvell: Fix 88e1510 downshift counter errata",
                            "    - scsi: ufs: host: mediatek: Correct system PM flow",
                            "    - scsi: ufs: host: mediatek: Disable auto-hibern8 during power mode",
                            "      changes",
                            "    - scsi: ufs: host: mediatek: Fix adapt issue after PA_Init",
                            "    - wifi: cfg80211: update the time stamps in hidden ssid",
                            "    - wifi: mac80211: Fix HE capabilities element check",
                            "    - fbcon: Use screen info to find primary device",
                            "    - phy: cadence: cdns-dphy: Enable lower resolutions in dphy",
                            "    - Fix access to video_is_primary_device() when compiled without",
                            "      CONFIG_VIDEO",
                            "    - phy: renesas: r8a779f0-ether-serdes: add new step added to latest",
                            "      datasheet",
                            "    - phy: rockchip: phy-rockchip-inno-csidphy: allow writes to grf register 0",
                            "    - drm/msm/registers: Generate _HI/LO builders for reg64",
                            "    - net: sh_eth: Disable WoL if system can not suspend",
                            "    - selftests: net: replace sleeps in fcnal-test with waits",
                            "    - media: redrat3: use int type to store negative error codes",
                            "    - platform/x86/amd/pmf: Fix the custom bios input handling mechanism",
                            "    - selftests: traceroute: Use require_command()",
                            "    - selftests: traceroute: Return correct value on failure",
                            "    - openrisc: Add R_OR1K_32_PCREL relocation type module support",
                            "    - netfilter: nf_reject: don't reply to icmp error messages",
                            "    - x86/kvm: Prefer native qspinlock for dedicated vCPUs irrespective of",
                            "      PV_UNHALT",
                            "    - x86/virt/tdx: Use precalculated TDVPR page physical address",
                            "    - selftests: Disable dad for ipv6 in fcnal-test.sh",
                            "    - eth: 8139too: Make 8139TOO_PIO depend on !NO_IOPORT_MAP",
                            "    - [Config] No longer enable `CONFIG_8139TOO_PIO` for armhf",
                            "    - selftests: Replace sleep with slowwait",
                            "    - net: devmem: expose tcp_recvmsg_locked errors",
                            "    - selftests: net: lib.sh: Don't defer failed commands",
                            "    - HID: asus: add Z13 folio to generic group for multitouch to work",
                            "    - watchdog: s3c2410_wdt: Fix max_timeout being calculated larger",
                            "    - crypto: sun8i-ce - remove channel timeout field",
                            "    - PCI: dwc: Verify the single eDMA IRQ in dw_pcie_edma_irq_verify()",
                            "    - crypto: ccp - Fix incorrect payload size calculation in",
                            "      psp_poulate_hsti()",
                            "    - crypto: caam - double the entropy delay interval for retry",
                            "    - can: rcar_canfd: Update bit rate constants for RZ/G3E and R-Car Gen4",
                            "    - net: mana: Reduce waiting time if HWC not responding",
                            "    - ionic: use int type for err in ionic_get_module_eeprom_by_page",
                            "    - net/cls_cgroup: Fix task_get_classid() during qdisc run",
                            "    - wifi: mt76: mt7921: Add 160MHz beamformee capability for mt7922 device",
                            "    - wifi: mt76: mt7925: add pci restore for hibernate",
                            "    - wifi: mt76: mt7996: Fix mt7996_reverse_frag0_hdr_trans for MLO",
                            "    - wifi: mt76: mt7996: Set def_wcid pointer in mt7996_mac_sta_init_link()",
                            "    - wifi: mt76: mt7996: Temporarily disable EPCS",
                            "    - wifi: mt76: mt7996: support writing MAC TXD for AddBA Request",
                            "    - wifi: mt76: mt76_eeprom_override to int",
                            "    - ALSA: serial-generic: remove shared static buffer",
                            "    - wifi: mt76: mt7996: fix memory leak on mt7996_mcu_sta_key_tlv error",
                            "    - wifi: mt76: mt7996: disable promiscuous mode by default",
                            "    - wifi: mt76: use altx queue for offchannel tx on connac+",
                            "    - wifi: mt76: improve phy reset on hw restart",
                            "    - drm/amdgpu: Use memdup_array_user in amdgpu_cs_wait_fences_ioctl",
                            "    - drm/amdgpu: Release hive reference properly",
                            "    - drm/amd/display: Fix DMCUB loading sequence for DCN3.2",
                            "    - drm/amd/display: Set up pixel encoding for YCBCR422",
                            "    - drm/amd/display: fix dml ms order of operations",
                            "    - drm/amd/display: Don't use non-registered VUPDATE on DCE 6",
                            "    - drm/amd/display: Keep PLL0 running on DCE 6.0 and 6.4",
                            "    - drm/amd/display: Fix DVI-D/HDMI adapters",
                            "    - drm/amd/display: Disable VRR on DCE 6",
                            "    - drm/amd/display/dml2: Guard dml21_map_dc_state_into_dml_display_cfg with",
                            "      DC_FP_START",
                            "    - net: phy: clear EEE runtime state in PHY_HALTED/PHY_ERROR",
                            "    - ethernet: Extend device_get_mac_address() to use NVMEM",
                            "    - scsi: ufs: ufs-qcom: Disable lane clocks during phy hibern8",
                            "    - HID: i2c-hid: Resolve touchpad issues on Dell systems during S4",
                            "    - hinic3: Queue pair endianness improvements",
                            "    - hinic3: Fix missing napi->dev in netif_queue_set_napi",
                            "    - tools: ynl-gen: validate nested arrays",
                            "    - drm/xe/guc: Return an error code if the GuC load fails",
                            "    - drm/amdgpu: reject gang submissions under SRIOV",
                            "    - selftests/Makefile: include $(INSTALL_DEP_TARGETS) in clean target to",
                            "      clean net/lib dependency",
                            "    - scsi: ufs: core: Disable timestamp functionality if not supported",
                            "    - scsi: lpfc: Clean up allocated queues when queue setup mbox commands",
                            "      fail",
                            "    - scsi: lpfc: Decrement ndlp kref after FDISC retries exhausted",
                            "    - scsi: lpfc: Check return status of lpfc_reset_flush_io_context during",
                            "      TGT_RESET",
                            "    - scsi: lpfc: Remove ndlp kref decrement clause for F_Port_Ctrl in",
                            "      lpfc_cleanup",
                            "    - scsi: lpfc: Define size of debugfs entry for xri rebalancing",
                            "    - scsi: lpfc: Ensure PLOGI_ACC is sent prior to PRLI in Point to Point",
                            "      topology",
                            "    - allow finish_no_open(file, ERR_PTR(-E...))",
                            "    - usb: mon: Increase BUFF_MAX to 64 MiB to support multi-MB URBs",
                            "    - usb: xhci: plat: Facilitate using autosuspend for xhci plat devices",
                            "    - wifi: rtw89: disable RTW89_PHYSTS_IE09_FTR_0 for ppdu status",
                            "    - wifi: rtw89: obtain RX path from ppdu status IE00",
                            "    - wifi: rtw89: renew a completion for each H2C command waiting C2H event",
                            "    - usb: xhci-pci: add support for hosts with zero USB3 ports",
                            "    - ipv6: np->rxpmtu race annotation",
                            "    - RDMA/irdma: Update Kconfig",
                            "    - IB/ipoib: Ignore L3 master device",
                            "    - bnxt_en: Add fw log trace support for 5731X/5741X chips",
                            "    - mei: make a local copy of client uuid in connect",
                            "    - ASoC: qcom: sc8280xp: explicitly set S16LE format in",
                            "      sc8280xp_be_hw_params_fixup()",
                            "    - net: phy: clear link parameters on admin link down",
                            "    - net: ethernet: microchip: sparx5: make it selectable for ARCH_LAN969X",
                            "    - bus: mhi: core: Improve mhi_sync_power_up handling for SYS_ERR state",
                            "    - iommu/vt-d: Replace snprintf with scnprintf in dmar_latency_snapshot()",
                            "    - wifi: ath10k: Fix connection after GTK rekeying",
                            "    - iommu/vt-d: Remove LPIG from page group response descriptor",
                            "    - wifi: mac80211: Get the correct interface for non-netdev skb status",
                            "    - wifi: mac80211: Track NAN interface start/stop",
                            "    - net: intel: fm10k: Fix parameter idx set but not used",
                            "    - sparc/module: Add R_SPARC_UA64 relocation handling",
                            "    - sparc64: fix prototypes of reads[bwl]()",
                            "    - vfio: return -ENOTTY for unsupported device feature",
                            "    - ptp_ocp: make ptp_ocp driver compatible with PTP_EXTTS_REQUEST2",
                            "    - crypto: hisilicon/qm - invalidate queues in use",
                            "    - crypto: hisilicon/qm - clear all VF configurations in the hardware",
                            "    - ASoC: ops: improve snd_soc_get_volsw",
                            "    - PCI/PM: Skip resuming to D0 if device is disconnected",
                            "    - selftests: forwarding: Reorder (ar)ping arguments to obey POSIX getopt",
                            "    - remoteproc: qcom: q6v5: Avoid handling handover twice",
                            "    - wifi: ath12k: Increase DP_REO_CMD_RING_SIZE to 256",
                            "    - net: dsa: microchip: Set SPI as bus interface during reset for KSZ8463",
                            "    - bng_en: make bnge_alloc_ring() self-unwind on failure",
                            "    - ALSA: usb-audio: don't apply interface quirk to Presonus S1824c",
                            "    - tcp: Update bind bucket state on port release",
                            "    - ovl: make sure that ovl_create_real() returns a hashed dentry",
                            "    - drm/amd/display: Add missing post flip calls",
                            "    - drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream",
                            "    - drm/amd/display: Add fast sync field in ultra sleep more for DMUB",
                            "    - drm/amd/display: Init dispclk from bootup clock for DCN314",
                            "    - drm/amd/display: Fix for test crash due to power gating",
                            "    - drm/amd/display: change dc stream color settings only in atomic commit",
                            "    - NFSv4: handle ERR_GRACE on delegation recalls",
                            "    - NFSv4.1: fix mount hang after CREATE_SESSION failure",
                            "    - net: bridge: Install FDB for bridge MAC on VLAN 0",
                            "    - net: phy: dp83640: improve phydev and driver removal handling",
                            "    - scsi: ufs: core: Change MCQ interrupt enable flow",
                            "    - scsi: libfc: Fix potential buffer overflow in fc_ct_ms_fill()",
                            "    - accel/habanalabs/gaudi2: fix BMON disable configuration",
                            "    - scsi: mpt3sas: Add support for 22.5 Gbps SAS link rate",
                            "    - accel/habanalabs: return ENOMEM if less than requested pages were pinned",
                            "    - accel/habanalabs/gaudi2: read preboot status after recovering from dirty",
                            "      state",
                            "    - ASoC: renesas: msiof: add .symmetric_xxx on snd_soc_dai_driver",
                            "    - ASoC: renesas: msiof: use reset controller",
                            "    - ASoC: renesas: msiof: tidyup DMAC stop timing",
                            "    - ASoC: renesas: msiof: set SIFCTR register",
                            "    - ext4: increase IO priority of fastcommit",
                            "    - drm/amdgpu: Add fallback to pipe reset if KCQ ring reset fails",
                            "    - drm/amdgpu: Fix fence signaling race condition in userqueue",
                            "    - ASoC: stm32: sai: manage context in set_sysclk callback",
                            "    - ASoC: tlv320aic3x: Fix class-D initialization for tlv320aic3007",
                            "    - ACPI: scan: Update honor list for RPMI System MSI",
                            "    - platform/x86: x86-android-tablets: Stop using EPROBE_DEFER",
                            "    - vfio/pci: Fix INTx handling on legacy non-PCI 2.3 devices",
                            "    - vfio/nvgrace-gpu: Add GB300 SKU to the devid table",
                            "    - selftest: net: Fix error message if empty variable",
                            "    - net/mlx5e: Don't query FEC statistics when FEC is disabled",
                            "    - Bluetooth: btintel: Add support for BlazarIW core",
                            "    - net: macb: avoid dealing with endianness in macb_set_hwaddr()",
                            "    - Bluetooth: btusb: Add new VID/PID 13d3/3627 for MT7925",
                            "    - Bluetooth: btintel_pcie: Define hdev->wakeup() callback",
                            "    - Bluetooth: ISO: Don't initiate CIS connections if there are no buffers",
                            "    - Bluetooth: btusb: Check for unexpected bytes when defragmenting HCI",
                            "      frames",
                            "    - Bluetooth: ISO: Use sk_sndtimeo as conn_timeout",
                            "    - Bluetooth: btusb: Add new VID/PID 13d3/3633 for MT7922",
                            "    - net: stmmac: est: Drop frames causing HLBS error",
                            "    - exfat: limit log print for IO error",
                            "    - 6pack: drop redundant locking and refcounting",
                            "    - page_pool: Clamp pool size to max 16K pages",
                            "    - net/mlx5e: Prevent entering switchdev mode with inconsistent netns",
                            "    - ksmbd: use sock_create_kern interface to create kernel socket",
                            "    - smb: client: update cfid->last_access_time in",
                            "      open_cached_dir_by_dentry()",
                            "    - smb: client: transport: avoid reconnects triggered by pending task work",
                            "    - usb: xhci-pci: Fix USB2-only root hub registration",
                            "    - drm/amd/display: Add fallback path for YCBCR422",
                            "    - ACPICA: Update dsmethod.c to get rid of unused variable warning",
                            "    - RDMA/bnxt_re: Fix a potential memory leak in destroy_gsi_sqp",
                            "    - RDMA/irdma: Fix SD index calculation",
                            "    - RDMA/irdma: Remove unused struct irdma_cq fields",
                            "    - RDMA/irdma: Set irdma_cq cq_num field during CQ create",
                            "    - RDMA/uverbs: Fix umem release in UVERBS_METHOD_CQ_CREATE",
                            "    - RDMA/hns: Fix recv CQ and QP cache affinity",
                            "    - RDMA/hns: Fix the modification of max_send_sge",
                            "    - RDMA/hns: Fix wrong WQE data when QP wraps around",
                            "    - btrfs: mark dirty extent range for out of bound prealloc extents",
                            "    - clk: qcom: gcc-ipq6018: rework nss_port5 clock to multiple conf",
                            "    - clk: renesas: rzv2h: Re-assert reset on deassert timeout",
                            "    - clk: samsung: exynos990: Add missing USB clock registers to HSI0",
                            "    - fs/hpfs: Fix error code for new_inode() failure in",
                            "      mkdir/create/mknod/symlink",
                            "    - clocksource: hyper-v: Skip unnecessary checks for the root partition",
                            "    - hyperv: Add missing field to hv_output_map_device_interrupt",
                            "    - um: Fix help message for ssl-non-raw",
                            "    - clk: sunxi-ng: sun6i-rtc: Add A523 specifics",
                            "    - rtc: pcf2127: clear minute/second interrupt",
                            "    - ARM: at91: pm: save and restore ACR during PLL disable/enable",
                            "    - clk: at91: add ACR in all PLL settings",
                            "    - clk: at91: sam9x7: Add peripheral clock id for pmecc",
                            "    - clk: at91: clk-master: Add check for divide by 3",
                            "    - clk: at91: clk-sam9x60-pll: force write to PLL_UPDT register",
                            "    - clk: ti: am33xx: keep WKUP_DEBUGSS_CLKCTRL enabled",
                            "    - clk: scmi: Add duty cycle ops only when duty cycle is supported",
                            "    - clk: clocking-wizard: Fix output clock register offset for Versal",
                            "      platforms",
                            "    - NTB: epf: Allow arbitrary BAR mapping",
                            "    - 9p: fix /sys/fs/9p/caches overwriting itself",
                            "    - cpufreq: tegra186: Initialize all cores to max frequencies",
                            "    - 9p: sysfs_init: don't hardcode error to ENOMEM",
                            "    - scsi: ufs: core: Include UTP error in INT_FATAL_ERRORS",
                            "    - fbdev: core: Fix ubsan warning in pixel_to_pat",
                            "    - ACPI: property: Return present device nodes only on fwnode interface",
                            "    - LoongArch: Handle new atomic instructions for probes",
                            "    - tools bitmap: Add missing asm-generic/bitsperlong.h include",
                            "    - tools: lib: thermal: don't preserve owner in install",
                            "    - tools: lib: thermal: use pkg-config to locate libnl3",
                            "    - ALSA: hda/realtek: Add quirk for ASUS ROG Zephyrus Duo",
                            "    - rtc: zynqmp: Restore alarm functionality after kexec transition",
                            "    - rtc: pcf2127: fix watchdog interrupt mask on pcf2131",
                            "    - net: wwan: t7xx: add support for HP DRMR-H01",
                            "    - kbuild: uapi: Strip comments before size type check",
                            "    - ASoC: meson: aiu-encoder-i2s: fix bit clock polarity",
                            "    - ASoC: rt722: add settings for rt722VB",
                            "    - drm/amdgpu: Report individual reset error",
                            "    - ceph: add checking of wait_for_completion_killable() return value",
                            "    - ceph: fix potential race condition in ceph_ioctl_lazyio()",
                            "    - ceph: refactor wake_up_bit() pattern of calling",
                            "    - x86: uaccess: don't use runtime-const rewriting in modules",
                            "    - rust: condvar: fix broken intra-doc link",
                            "    - rust: devres: fix private intra-doc link",
                            "    - rust: kbuild: workaround `rustdoc` doctests modifier bug",
                            "    - rust: kbuild: treat `build_error` and `rustdoc` as kernel objects",
                            "    - media: uvcvideo: Use heuristic to find stream entity",
                            "    - Revert \"wifi: ath10k: avoid unnecessary wait for service ready message\"",
                            "    - tracing: tprobe-events: Fix to register tracepoint correctly",
                            "    - tracing: tprobe-events: Fix to put tracepoint_user when disable the",
                            "      tprobe",
                            "    - net: libwx: fix device bus LAN ID",
                            "    - scsi: ufs: core: Fix a race condition related to the \"hid\" attribute",
                            "      group",
                            "    - riscv: ptdump: use seq_puts() in pt_dump_seq_puts() macro",
                            "    - Revert \"wifi: ath12k: Fix missing station power save configuration\"",
                            "    - scsi: ufs: core: Revert \"Make HID attributes visible\"",
                            "    - Bluetooth: btrtl: Fix memory leak in rtlbt_parse_firmware_v2()",
                            "    - net: dsa: tag_brcm: legacy: fix untagged rx on unbridged ports for",
                            "      bcm63xx",
                            "    - selftests/net: fix out-of-order delivery of FIN in gro:tcp test",
                            "    - selftests/net: use destination options instead of hop-by-hop",
                            "    - selftests: netdevsim: Fix ethtool-coalesce.sh fail by installing",
                            "      ethtool-common.sh",
                            "    - net: vlan: sync VLAN features with lower device",
                            "    - net: dsa: b53: fix resetting speed and pause on forced link",
                            "    - net: dsa: b53: fix bcm63xx RGMII port link adjustment",
                            "    - net: dsa: b53: fix enabling ip multicast",
                            "    - net: dsa: b53: stop reading ARL entries if search is done",
                            "    - net: dsa: b53: properly bound ARL searches for < 4 ARL bin chips",
                            "    - sctp: Hold RCU read lock while iterating over address list",
                            "    - sctp: Hold sock lock while iterating over address list",
                            "    - net: ionic: add dma_wmb() before ringing TX doorbell",
                            "    - net: ionic: map SKB after pseudo-header checksum prep",
                            "    - octeontx2-pf: Fix devm_kcalloc() error checking",
                            "    - bnxt_en: Fix a possible memory leak in bnxt_ptp_init",
                            "    - bnxt_en: Always provide max entry and entry size in coredump segments",
                            "    - bnxt_en: Fix warning in bnxt_dl_reload_down()",
                            "    - wifi: mac80211_hwsim: Limit destroy_on_close radio removal to netgroup",
                            "    - io_uring: fix types for region size calulation",
                            "    - net/mlx5e: Fix return value in case of module EEPROM read error",
                            "    - net: ti: icssg-prueth: Fix fdb hash size configuration",
                            "    - net/mlx5e: SHAMPO, Fix header mapping for 64K pages",
                            "    - net/mlx5e: SHAMPO, Fix skb size check for 64K pages",
                            "    - net/mlx5e: SHAMPO, Fix header formulas for higher MTUs and 64K pages",
                            "    - net: wan: framer: pef2256: Switch to devm_mfd_add_devices()",
                            "    - net: dsa: microchip: Fix reserved multicast address table programming",
                            "    - net: bridge: fix MST static key usage",
                            "    - selftests/vsock: avoid false-positives when checking dmesg",
                            "    - tracing: Fix memory leaks in create_field_var()",
                            "    - drm/amd/display: Enable mst when it's detected but yet to be initialized",
                            "    - wifi: cfg80211: add an hrtimer based delayed work item",
                            "    - wifi: mac80211: use wiphy_hrtimer_work for ml_reconf_work",
                            "    - wifi: mac80211: use wiphy_hrtimer_work for ttlm_work",
                            "    - wifi: mac80211: use wiphy_hrtimer_work for csa.switch_work",
                            "    - riscv: Fix memory leak in module_frob_arch_sections()",
                            "    - rtc: rx8025: fix incorrect register reference",
                            "    - x86/microcode/AMD: Add more known models to entry sign checking",
                            "    - smb: client: validate change notify buffer before copy",
                            "    - x86/amd_node: Fix AMD root device caching",
                            "    - xfs: fix delalloc write failures in software-provided atomic writes",
                            "    - xfs: fix various problems in xfs_atomic_write_cow_iomap_begin",
                            "    - x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode",
                            "    - drm: define NVIDIA DRM format modifiers for GB20x",
                            "    - drm/nouveau: Advertise correct modifiers on GB20x",
                            "    - drm/amdgpu/smu: Handle S0ix for vangogh",
                            "    - drm/amdkfd: Don't clear PT after process killed",
                            "    - virtio_net: fix alignment for virtio_net_hdr_v1_hash",
                            "    - lib/crypto: curve25519-hacl64: Fix older clang KASAN workaround for GCC",
                            "    - scsi: ufs: ufs-pci: Fix S0ix/S3 for Intel controllers",
                            "    - scsi: ufs: ufs-pci: Set UFSHCD_QUIRK_PERFORM_LINK_STARTUP_ONCE for Intel",
                            "      ADL",
                            "    - scsi: ufs: core: Add a quirk to suppress link_startup_again",
                            "    - drm/amd/display: update color on atomic commit time",
                            "    - extcon: adc-jack: Cleanup wakeup source only if it was enabled",
                            "    - kunit: Extend kconfig help text for KUNIT_UML_PCI",
                            "    - ALSA: hda/tas2781: Enable init_profile_id for device initialization",
                            "    - ACPI: SPCR: Check for table version when using precise baudrate",
                            "    - kbuild: Strip trailing padding bytes from modules.builtin.modinfo",
                            "    - drm/amdgpu: Fix unintended error log in VCN5_0_0",
                            "    - drm/amd/display: Fix vupdate_offload_work doc",
                            "    - drm/amdgpu: Fix function header names in amdgpu_connectors.c",
                            "    - drm/amdgpu/userq: assign an error code for invalid userq va",
                            "    - drm/msm/dpu: Fix adjusted mode clock check for 3d merge",
                            "    - drm/amd/display: Reject modes with too high pixel clock on DCE6-10",
                            "    - drm/amd/display: use GFP_NOWAIT for allocation in interrupt handler",
                            "    - drm/amd/display: Fix black screen with HDMI outputs",
                            "    - selftests: drv-net: Reload pkt pointer after calling filter_udphdr",
                            "    - dt-bindings: eeprom: at25: use \"size\" for FRAMs without device ID",
                            "    - Linux 6.17.8",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68316",
                            "    - scsi: ufs: core: Fix invalid probe error return value",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40292",
                            "    - virtio-net: fix received length check in big packets",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68180",
                            "    - drm/amd/display: Fix NULL deref in debugfs odm_combine_segments",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40327",
                            "    - perf/core: Fix system hang caused by cpu-clock usage",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40328",
                            "    - smb: client: fix potential UAF in smb2_close_cached_fid()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40291",
                            "    - io_uring: fix regbuf vector size truncation",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68322",
                            "    - parisc: Avoid crash due to unaligned access in unwinder",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40293",
                            "    - iommufd: Don't overflow during division for dirty tracking",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40294",
                            "    - Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40329",
                            "    - drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40295",
                            "    - fscrypt: fix left shift underflow when inode->i_blkbits > PAGE_SHIFT",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40296",
                            "    - platform/x86: int3472: Fix double free of GPIO device during unregister",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40297",
                            "    - net: bridge: fix use-after-free due to MST port state bypass",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68320",
                            "    - lan966x: Fix sleeping in atomic context",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68169",
                            "    - netpoll: Fix deadlock in memory allocation under spinlock",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68197",
                            "    - bnxt_en: Fix null pointer dereference in bnxt_bs_trace_check_wrap()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40330",
                            "    - bnxt_en: Shutdown FW DMA in bnxt_shutdown()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68192",
                            "    - net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40331",
                            "    - sctp: Prevent TOCTOU out-of-bounds write",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68187",
                            "    - net: mdio: Check regmap pointer returned by device_node_to_regmap()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68167",
                            "    - gpiolib: fix invalid pointer access in debugfs",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68319",
                            "    - netconsole: Acquire su_mutex before navigating configs hierarchy",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40298",
                            "    - gve: Implement settime64 with -EOPNOTSUPP",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40299",
                            "    - gve: Implement gettimex64 with -EOPNOTSUPP",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40301",
                            "    - Bluetooth: hci_event: validate skb length for unknown CC opcode",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40358",
                            "    - riscv: stacktrace: Disable KASAN checks for non-current tasks",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68186",
                            "    - ring-buffer: Do not warn in ring_buffer_map_get_reader() when reader",
                            "      catches up",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68184",
                            "    - drm/mediatek: Disable AFBC support on Mediatek DRM driver",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40302",
                            "    - media: videobuf2: forbid remove_bufs when legacy fileio is active",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40303",
                            "    - btrfs: ensure no dirty metadata is written back for an fs with errors",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40362",
                            "    - ceph: fix multifs mds auth caps issue",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40332",
                            "    - drm/amdkfd: Fix mmap write lock not release",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40304",
                            "    - fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40305",
                            "    - 9p/trans_fd: p9_fd_request: kick rx thread if EPOLLIN",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68318",
                            "    - clk: thead: th1520-ap: set all AXI clocks to CLK_IS_CRITICAL",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40209",
                            "    - btrfs: fix memory leak of qgroup_list in btrfs_add_qgroup_relation",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68183",
                            "    - ima: don't clear IMA_DIGSIG flag when setting or removing non-IMA xattr",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68173",
                            "    - ftrace: Fix softlockup in ftrace_module_enable",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40306",
                            "    - orangefs: fix xattr related buffer overflow...",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40307",
                            "    - exfat: validate cluster allocation bits of the allocation bitmap",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40308",
                            "    - Bluetooth: bcsp: receive data only if registered",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40309",
                            "    - Bluetooth: SCO: Fix UAF on sco_conn_free",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68174",
                            "    - amd/amdkfd: enhance kfd process check in switch partition",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40310",
                            "    - amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40361",
                            "    - fs: ext4: change GFP_KERNEL to GFP_NOFS to avoid deadlock",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40311",
                            "    - accel/habanalabs: support mapping cb with vmalloc-backed coherent memory",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68185",
                            "    - nfs4_setup_readdir(): insufficient locking for ->d_parent->d_inode",
                            "      dereferencing",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68176",
                            "    - PCI: cadence: Check for the existence of cdns_pcie::ops before using it",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68190",
                            "    - drm/amdgpu/atom: Check kcalloc() for WS buffer in",
                            "      amdgpu_atom_execute_table_locked()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68168",
                            "    - jfs: fix uninitialized waitqueue in transaction manager",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40312",
                            "    - jfs: Verify inode mode when loading from disk",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40333",
                            "    - f2fs: fix infinite loop in __insert_extent_tree()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68321",
                            "    - page_pool: always add GFP_NOWARN for ATOMIC allocations",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40334",
                            "    - drm/amdgpu: validate userq buffer virtual address and size",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68191",
                            "    - udp_tunnel: use netdev_warn() instead of netdev_WARN()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68309",
                            "    - PCI/AER: Fix NULL pointer access by aer_info",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40313",
                            "    - ntfs3: pretend $Extend records as regular files",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40335",
                            "    - drm/amdgpu: validate userq input args",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40314",
                            "    - usb: cdns3: gadget: Use-after-free during failed initialization and exit",
                            "      of cdnsp gadget",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40336",
                            "    - drm/gpusvm: fix hmm_pfn_to_map_order() usage",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68193",
                            "    - drm/xe/guc: Add devm release action to safely tear down CT",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68175",
                            "    - media: nxp: imx8-isi: Fix streaming cleanup on release",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68188",
                            "    - tcp: use dst_dev_rcu() in tcp_fastopen_active_disable_ofo_check()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68315",
                            "    - f2fs: fix to detect potential corrupted nid in free_nid_list",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40337",
                            "    - net: stmmac: Correctly handle Rx checksum offload errors",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40338",
                            "    - ASoC: Intel: avs: Do not share the name pointer between components",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40339",
                            "    - drm/amdgpu: fix nullptr err of vm_handle_moved",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68194",
                            "    - media: imon: make send_packet() more robust",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40363",
                            "    - net: ipv6: fix field-spanning memcpy warning in AH output",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68311",
                            "    - tty: serial: ip22zilog: Use platform device for probing",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40340",
                            "    - drm/xe: Fix oops in xe_gem_fault when running core_hotunplug test.",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68196",
                            "    - drm/amd/display: Cache streams targeting link when performing LT",
                            "      automation",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68178",
                            "    - blk-cgroup: fix possible deadlock while configuring policy",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40341",
                            "    - futex: Don't leak robust_list pointer on exec race",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40342",
                            "    - nvme-fc: use lock accessing port_state and rport state",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40343",
                            "    - nvmet-fc: avoid scheduling association deletion twice",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68177",
                            "    - cpufreq/longhaul: handle NULL policy in longhaul_exit",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68317",
                            "    - io_uring/zctx: check chained notif contexts",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40315",
                            "    - usb: gadget: f_fs: Fix epfile null pointer access after ep enable.",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40316",
                            "    - drm/mediatek: Fix device use-after-free on unbind",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40360",
                            "    - drm/sysfb: Do not dereference NULL pointer in plane reset",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68179",
                            "    - s390: Disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68310",
                            "    - s390/pci: Avoid deadlock between PCI error recovery and mlx5 crdump",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40317",
                            "    - regmap: slimbus: fix bus_context pointer in regmap init calls",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40359",
                            "    - perf/x86/intel: Fix KASAN global-out-of-bounds warning",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68181",
                            "    - drm/radeon: Remove calls to drm_put_dev()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68170",
                            "    - drm/radeon: Do not kfree() devres managed rdev",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40213",
                            "    - Bluetooth: MGMT: fix crash in set_mesh_sync and set_mesh_complete",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40318",
                            "    - Bluetooth: hci_sync: fix race in hci_cmd_sync_dequeue_once",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68312",
                            "    - usbnet: Prevents free active kevent",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40344",
                            "    - ASoC: Intel: avs: Disable periods-elapsed work when closing PCM",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68172",
                            "    - crypto: aspeed - fix double free caused by devm",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40319",
                            "    - bpf: Sync pending IRQ work before freeing ring buffer",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68182",
                            "    - wifi: iwlwifi: fix potential use after free in iwl_mld_remove_link()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68314",
                            "    - drm/msm: make sure last_fence is always updated",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68189",
                            "    - drm/msm: Fix GEM free for imported dma-bufs",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68171",
                            "    - x86/fpu: Ensure XFD state on signal delivery",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-68313",
                            "    - x86/CPU/AMD: Add RDSEED fix for Zen5",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40320",
                            "    - smb: client: fix potential cfid UAF in smb2_query_info_compound",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40321",
                            "    - wifi: brcmfmac: fix crash while sending Action Frames in standalone AP",
                            "      Mode",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40322",
                            "    - fbdev: bitblit: bound-check glyph index in bit_putcs*",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40211",
                            "    - ACPI: video: Fix use-after-free in acpi_video_switch_brightness()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40323",
                            "    - fbcon: Set fb_display[i]->mode to NULL when the mode is released",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40210",
                            "    - Revert \"NFSD: Remove the cap on number of operations per NFSv4 COMPOUND\"",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40324",
                            "    - NFSD: Fix crash in nfsd4_read_release()",
                            "  * Questing update: v6.17.8 upstream stable release (LP: #2136833) //",
                            "    CVE-2025-40326",
                            "    - NFSD: Define actions for the new time_deleg FATTR4 attributes",
                            "  * Questing update: v6.17.7 upstream stable release (LP: #2136813)",
                            "    - sched_ext: Move internal type and accessor definitions to ext_internal.h",
                            "    - sched_ext: Put event_stats_cpu in struct scx_sched_pcpu",
                            "    - sched_ext: Sync error_irq_work before freeing scx_sched",
                            "    - timekeeping: Fix aux clocks sysfs initialization loop bound",
                            "    - x86/bugs: Report correct retbleed mitigation status",
                            "    - x86/bugs: Qualify RETBLEED_INTEL_MSG",
                            "    - genirq/chip: Add buslock back in to irq_set_handler()",
                            "    - genirq/manage: Add buslock back in to __disable_irq_nosync()",
                            "    - genirq/manage: Add buslock back in to enable_irq()",
                            "    - audit: record fanotify event regardless of presence of rules",
                            "    - EDAC/ie31200: Add two more Intel Alder Lake-S SoCs for EDAC support",
                            "    - perf/x86/intel: Add ICL_FIXED_0_ADAPTIVE bit into INTEL_FIXED_BITS_MASK",
                            "    - perf: Use current->flags & PF_KTHREAD|PF_USER_WORKER instead of",
                            "      current->mm == NULL",
                            "    - perf: Have get_perf_callchain() return NULL if crosstask and user are",
                            "      set",
                            "    - perf: Skip user unwind if the task is a kernel thread",
                            "    - EDAC: Fix wrong executable file modes for C source files",
                            "    - seccomp: passthrough uprobe systemcall without filtering",
                            "    - sched_ext: Keep bypass on between enable failure and",
                            "      scx_disable_workfn()",
                            "    - x86/bugs: Add attack vector controls for VMSCAPE",
                            "    - x86/bugs: Fix reporting of LFENCE retpoline",
                            "    - EDAC/mc_sysfs: Increase legacy channel support to 16",
                            "    - cpuset: Use new excpus for nocpu error check when enabling root",
                            "      partition",
                            "    - btrfs: abort transaction on specific error places when walking log tree",
                            "    - btrfs: abort transaction in the process_one_buffer() log tree walk",
                            "      callback",
                            "    - btrfs: zoned: return error from btrfs_zone_finish_endio()",
                            "    - btrfs: zoned: refine extent allocator hint selection",
                            "    - btrfs: scrub: replace max_t()/min_t() with clamp() in",
                            "      scrub_throttle_dev_io()",
                            "    - btrfs: always drop log root tree reference in btrfs_replay_log()",
                            "    - btrfs: use level argument in log tree walk callback replay_one_buffer()",
                            "    - btrfs: abort transaction if we fail to update inode in log replay dir",
                            "      fixup",
                            "    - btrfs: tree-checker: add inode extref checks",
                            "    - btrfs: use smp_mb__after_atomic() when forcing COW in",
                            "      create_pending_snapshot()",
                            "    - sched_ext: Make qmap dump operation non-destructive",
                            "    - arch: Add the macro COMPILE_OFFSETS to all the asm-offsets.c",
                            "    - btrfs: tree-checker: fix bounds check in check_inode_extref()",
                            "    - Linux 6.17.7",
                            "  * [UBUNTU 24.04] KVM: s390: improve interrupt cpu for wakeup (LP: #2132317)",
                            "    - KVM: s390: improve interrupt cpu for wakeup",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982)",
                            "    - sched/fair: Block delayed tasks on throttled hierarchy during dequeue",
                            "    - vfio/cdx: update driver to build without CONFIG_GENERIC_MSI_IRQ",
                            "    - expfs: Fix exportfs_can_encode_fh() for EXPORT_FH_FID",
                            "    - cgroup/misc: fix misc_res_type kernel-doc warning",
                            "    - dlm: move to rinfo for all middle conversion cases",
                            "    - exec: Fix incorrect type for ret",
                            "    - s390/pkey: Forward keygenflags to ep11_unwrapkey",
                            "    - hfs: clear offset and space out of valid records in b-tree node",
                            "    - hfs: make proper initalization of struct hfs_find_data",
                            "    - hfs: validate record offset in hfsplus_bmap_alloc",
                            "    - hfsplus: fix KMSAN uninit-value issue in hfsplus_delete_cat()",
                            "    - dlm: check for defined force value in dlm_lockspace_release",
                            "    - hfsplus: return EIO when type of hidden directory mismatch in",
                            "      hfsplus_fill_super()",
                            "    - PCI: Test for bit underflow in pcie_set_readrq()",
                            "    - lkdtm: fortify: Fix potential NULL dereference on kmalloc failure",
                            "    - arm64: sysreg: Correct sign definitions for EIESB and DoubleLock",
                            "    - m68k: bitops: Fix find_*_bit() signatures",
                            "    - powerpc/32: Remove PAGE_KERNEL_TEXT to fix startup failure",
                            "    - riscv: mm: Return intended SATP mode for noXlvl options",
                            "    - riscv: mm: Use mmu-type from FDT to limit SATP mode",
                            "    - riscv: cpufeature: add validation for zfa, zfh and zfhmin",
                            "    - drivers/perf: hisi: Relax the event ID check in the framework",
                            "    - s390/mm: Use __GFP_ACCOUNT for user page table allocations",
                            "    - smb: client: queue post_recv_credits_work also if the peer raises the",
                            "      credit target",
                            "    - smb: client: limit the range of info->receive_credit_target",
                            "    - smb: client: make use of ib_wc_status_msg() and skip IB_WC_WR_FLUSH_ERR",
                            "      logging",
                            "    - smb: server: let smb_direct_flush_send_list() invalidate a remote key",
                            "      first",
                            "    - Unbreak 'make tools/*' for user-space targets",
                            "    - platform/mellanox: mlxbf-pmc: add sysfs_attr_init() to count_clock init",
                            "    - cpufreq/amd-pstate: Fix a regression leading to EPP 0 after hibernate",
                            "    - net/mlx5e: Return 1 instead of 0 in invalid case in",
                            "      mlx5e_mpwrq_umr_entry_size()",
                            "    - rtnetlink: Allow deleting FDB entries in user namespace",
                            "    - net: enetc: fix the deadlock of enetc_mdio_lock",
                            "    - net: enetc: correct the value of ENETC_RXB_TRUESIZE",
                            "    - dpaa2-eth: fix the pointer passed to PTR_ALIGN on Tx path",
                            "    - net: phy: realtek: fix rtl8221b-vm-cg name",
                            "    - can: bxcan: bxcan_start_xmit(): use can_dev_dropped_skb() instead of",
                            "      can_dropped_invalid_skb()",
                            "    - can: esd: acc_start_xmit(): use can_dev_dropped_skb() instead of",
                            "      can_dropped_invalid_skb()",
                            "    - can: rockchip-canfd: rkcanfd_start_xmit(): use can_dev_dropped_skb()",
                            "      instead of can_dropped_invalid_skb()",
                            "    - selftests: net: fix server bind failure in sctp_vrf.sh",
                            "    - net/mlx5e: RX, Fix generating skb from non-linear xdp_buff for legacy RQ",
                            "    - net/mlx5e: RX, Fix generating skb from non-linear xdp_buff for striding",
                            "      RQ",
                            "    - net/smc: fix general protection fault in __smc_diag_dump",
                            "    - net: ethernet: ti: am65-cpts: fix timestamp loss due to race conditions",
                            "    - arm64, mm: avoid always making PTE dirty in pte_mkwrite()",
                            "    - erofs: avoid infinite loops due to corrupted subpage compact indexes",
                            "    - net: hibmcge: select FIXED_PHY",
                            "    - ptp: ocp: Fix typo using index 1 instead of i in SMA initialization loop",
                            "    - net: hsr: prevent creation of HSR device with slaves from another netns",
                            "    - espintcp: use datagram_poll_queue for socket readiness",
                            "    - net: datagram: introduce datagram_poll_queue for custom receive queues",
                            "    - ovpn: use datagram_poll_queue for socket readiness in TCP",
                            "    - net: bonding: fix possible peer notify event loss or dup issue",
                            "    - hung_task: fix warnings caused by unaligned lock pointers",
                            "    - mm: don't spin in add_stack_record when gfp flags don't allow",
                            "    - dma-debug: don't report false positives with",
                            "      DMA_BOUNCE_UNALIGNED_KMALLOC",
                            "    - arch_topology: Fix incorrect error check in",
                            "      topology_parse_cpu_capacity()",
                            "    - riscv: hwprobe: Fix stale vDSO data for late-initialized keys at boot",
                            "    - io_uring/sqpoll: switch away from getrusage() for CPU accounting",
                            "    - io_uring/sqpoll: be smarter on when to update the stime usage",
                            "    - btrfs: send: fix duplicated rmdir operations when using extrefs",
                            "    - btrfs: ref-verify: fix IS_ERR() vs NULL check in btrfs_build_ref_tree()",
                            "    - gpio: pci-idio-16: Define maximum valid register address offset",
                            "    - gpio: 104-idio-16: Define maximum valid register address offset",
                            "    - xfs: fix locking in xchk_nlinks_collect_dir",
                            "    - platform/x86: alienware-wmi-wmax: Add AWCC support to Dell G15 5530",
                            "    - Revert \"cpuidle: menu: Avoid discarding useful information\"",
                            "    - riscv: cpufeature: avoid uninitialized variable in",
                            "      has_thead_homogeneous_vlenb()",
                            "    - rust: device: fix device context of Device::parent()",
                            "    - slab: Avoid race on slab->obj_exts in alloc_slab_obj_exts",
                            "    - slab: Fix obj_ext mistakenly considered NULL due to race condition",
                            "    - smb: client: get rid of d_drop() in cifs_do_rename()",
                            "    - ACPICA: Work around bogus -Wstringop-overread warning since GCC 11",
                            "    - arm64: mte: Do not warn if the page is already tagged in copy_highpage()",
                            "    - can: netlink: can_changelink(): allow disabling of automatic restart",
                            "    - cifs: Fix TCP_Server_Info::credits to be signed",
                            "    - devcoredump: Fix circular locking dependency with devcd->mutex.",
                            "    - hwmon: (pmbus/max34440) Update adpm12160 coeff due to latest FW",
                            "    - MIPS: Malta: Fix keyboard resource preventing i8042 driver from",
                            "      registering",
                            "    - rv: Make rtapp/pagefault monitor depends on CONFIG_MMU",
                            "    - net: bonding: update the slave array for broadcast mode",
                            "    - net: stmmac: dwmac-rk: Fix disabling set_clock_selection",
                            "    - net: usb: rtl8150: Fix frame padding",
                            "    - net: ravb: Enforce descriptor type ordering",
                            "    - net: ravb: Ensure memory write completes before ringing TX doorbell",
                            "    - mptcp: pm: in-kernel: C-flag: handle late ADD_ADDR",
                            "    - selftests: mptcp: join: mark 'flush re-add' as skipped if not supported",
                            "    - selftests: mptcp: join: mark implicit tests as skipped if not supported",
                            "    - selftests: mptcp: join: mark 'delete re-add signal' as skipped if not",
                            "      supported",
                            "    - mm/mremap: correctly account old mapping after MREMAP_DONTUNMAP remap",
                            "    - drm/xe: Check return value of GGTT workqueue allocation",
                            "    - drm/amd/display: increase max link count and fix link->enc NULL pointer",
                            "      access",
                            "    - mm/damon/core: use damos_commit_quota_goal() for new goal commit",
                            "    - mm/damon/core: fix list_add_tail() call on damon_call()",
                            "    - spi: rockchip-sfc: Fix DMA-API usage",
                            "    - firmware: arm_ffa: Add support for IMPDEF value in the memory access",
                            "      descriptor",
                            "    - spi: spi-nxp-fspi: add the support for sample data from DQS pad",
                            "    - spi: spi-nxp-fspi: re-config the clock rate when operation require new",
                            "      clock rate",
                            "    - spi: spi-nxp-fspi: add extra delay after dll locked",
                            "    - spi: spi-nxp-fspi: limit the clock rate for different sample clock",
                            "      source selection",
                            "    - spi: cadence-quadspi: Fix pm_runtime unbalance on dma EPROBE_DEFER",
                            "    - arm64: dts: broadcom: bcm2712: Add default GIC address cells",
                            "    - arm64: dts: broadcom: bcm2712: Define VGIC interrupt",
                            "    - include: trace: Fix inflight count helper on failed initialization",
                            "    - firmware: arm_scmi: Fix premature SCMI_XFER_FLAG_IS_RAW clearing in raw",
                            "      mode",
                            "    - spi: airoha: return an error for continuous mode dirmap creation cases",
                            "    - spi: airoha: add support of dual/quad wires spi modes to exec_op()",
                            "      handler",
                            "    - spi: airoha: switch back to non-dma mode in the case of error",
                            "    - spi: airoha: fix reading/writing of flashes with more than one plane per",
                            "      lun",
                            "    - sysfs: check visibility before changing group attribute ownership",
                            "    - RISC-V: Define pgprot_dmacoherent() for non-coherent devices",
                            "    - RISC-V: Don't print details of CPUs disabled in DT",
                            "    - riscv: hwprobe: avoid uninitialized variable use in hwprobe_arch_id()",
                            "    - hwmon: (pmbus/isl68137) Fix child node reference leak on early return",
                            "    - hwmon: (sht3x) Fix error handling",
                            "    - io_uring: fix incorrect unlikely() usage in io_waitid_prep()",
                            "    - nbd: override creds to kernel when calling sock_{send,recv}msg()",
                            "    - drm/panic: Fix drawing the logo on a small narrow screen",
                            "    - drm/panic: Fix qr_code, ensure vmargin is positive",
                            "    - drm/panic: Fix 24bit pixel crossing page boundaries",
                            "    - of/irq: Convert of_msi_map_id() callers to of_msi_xlate()",
                            "    - of/irq: Add msi-parent check to of_msi_xlate()",
                            "    - block: require LBA dma_alignment when using PI",
                            "    - gpio: ljca: Fix duplicated IRQ mapping",
                            "    - io_uring: correct __must_hold annotation in io_install_fixed_file",
                            "    - sched: Remove never used code in mm_cid_get()",
                            "    - USB: serial: option: add UNISOC UIS7720",
                            "    - USB: serial: option: add Quectel RG255C",
                            "    - USB: serial: option: add Telit FN920C04 ECM compositions",
                            "    - usb/core/quirks: Add Huawei ME906S to wakeup quirk",
                            "    - usb: raw-gadget: do not limit transfer length",
                            "    - xhci: dbc: enable back DbC in resume if it was enabled before suspend",
                            "    - xhci: dbc: fix bogus 1024 byte prefix if ttyDBC read races with stall",
                            "      event",
                            "    - x86/microcode: Fix Entrysign revision check for Zen1/Naples",
                            "    - binder: remove \"invalid inc weak\" check",
                            "    - mei: me: add wildcat lake P DID",
                            "    - objtool/rust: add one more `noreturn` Rust function",
                            "    - nvmem: rcar-efuse: add missing MODULE_DEVICE_TABLE",
                            "    - misc: fastrpc: Fix dma_buf object leak in fastrpc_map_lookup",
                            "    - most: usb: hdm_probe: Fix calling put_device() before device",
                            "      initialization",
                            "    - tcpm: switch check for role_sw device with fw_node",
                            "    - dt-bindings: serial: sh-sci: Fix r8a78000 interrupts",
                            "    - dt-bindings: usb: dwc3-imx8mp: dma-range is required only for imx8mp",
                            "    - dt-bindings: usb: qcom,snps-dwc3: Fix bindings for X1E80100",
                            "    - serial: 8250_dw: handle reset control deassert error",
                            "    - serial: 8250_exar: add support for Advantech 2 port card with Device ID",
                            "      0x0018",
                            "    - serial: 8250_mtk: Enable baud clock and manage in runtime PM",
                            "    - serial: sc16is7xx: remove useless enable of enhanced features",
                            "    - staging: gpib: Fix device reference leak in fmh_gpib driver",
                            "    - staging: gpib: Fix no EOI on 1 and 2 byte writes",
                            "    - staging: gpib: Return -EINTR on device clear",
                            "    - staging: gpib: Fix sending clear and trigger events",
                            "    - mm/migrate: remove MIGRATEPAGE_UNMAP",
                            "    - treewide: remove MIGRATEPAGE_SUCCESS",
                            "    - vmw_balloon: indicate success when effectively deflating during",
                            "      migration",
                            "    - xfs: always warn about deprecated mount options",
                            "    - gpio: regmap: Allow to allocate regmap-irq device",
                            "    - gpio: regmap: add the .fixed_direction_output configuration parameter",
                            "    - gpio: idio-16: Define fixed direction of the GPIO lines",
                            "    - Linux 6.17.6",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40084",
                            "    - ksmbd: transport_ipc: validate payload size before reading handle",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40222",
                            "    - tty: serial: sh-sci: fix RSCI FIFO overrun handling",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40223",
                            "    - most: usb: Fix use-after-free in hdm_disconnect",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40106",
                            "    - comedi: fix divide-by-zero in comedi_buf_munge()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40224",
                            "    - hwmon: (cgbc-hwmon) Add missing NULL check after devm_kzalloc()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40225",
                            "    - drm/panthor: Fix kernel panic on partial unmap of a GPU VA region",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40226",
                            "    - firmware: arm_scmi: Account for failed debug initialization",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40227",
                            "    - mm/damon/sysfs: dealloc commit test ctx always",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40228",
                            "    - mm/damon/sysfs: catch commit test ctx alloc failure",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40229",
                            "    - mm/damon/core: fix potential memory leak by cleaning ops_filter in",
                            "      damon_destroy_scheme",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40230",
                            "    - mm: prevent poison consumption when splitting THP",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40231",
                            "    - vsock: fix lock inversion in vsock_assign_transport()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40233",
                            "    - ocfs2: clear extent cache after moving/defragmenting extents",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40235",
                            "    - btrfs: directly free partially initialized fs_info in",
                            "      btrfs_check_leaked_roots()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40236",
                            "    - virtio-net: zero unused hash fields",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40237",
                            "    - fs/notify: call exportfs_encode_fid with s_umount",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40238",
                            "    - net/mlx5: Fix IPsec cleanup over MPV device",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40239",
                            "    - net: phy: micrel: always set shared->phydev for LAN8814",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40240",
                            "    - sctp: avoid NULL dereference when chunk data buffer is missing",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40241",
                            "    - erofs: fix crafted invalid cases for encoded extents",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40242",
                            "    - gfs2: Fix unlikely race in gdlm_put_lock",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40243",
                            "    - hfs: fix KMSAN uninit-value issue in hfs_find_set_zero_bits()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40244",
                            "    - hfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent()",
                            "  * Questing update: v6.17.6 upstream stable release (LP: #2134982) //",
                            "    CVE-2025-40245",
                            "    - nios2: ensure that memblock.current_limit is set when setting pfn limits",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557)",
                            "    - docs: kdoc: handle the obsolescensce of docutils.ErrorString()",
                            "    - Revert \"fs: make vfs_fileattr_[get|set] return -EOPNOTSUPP\"",
                            "    - PCI: vmd: Override irq_startup()/irq_shutdown() in",
                            "      vmd_init_dev_msi_info()",
                            "    - ata: libata-core: relax checks in ata_read_log_directory()",
                            "    - arm64/sysreg: Fix GIC CDEOI instruction encoding",
                            "    - ixgbevf: fix getting link speed data for E610 devices",
                            "    - rust: cfi: only 64-bit arm and x86 support CFI_CLANG",
                            "    - x86/CPU/AMD: Prevent reset reasons from being retained across reboot",
                            "    - slab: reset slab->obj_ext when freeing and it is OBJEXTS_ALLOC_FAIL",
                            "    - Revert \"io_uring/rw: drop -EOPNOTSUPP check in",
                            "      __io_complete_rw_common()\"",
                            "    - io_uring: protect mem region deregistration",
                            "    - Revert \"drm/amd/display: Only restore backlight after amdgpu_dm_init or",
                            "      dm_resume\"",
                            "    - r8152: add error handling in rtl8152_driver_init",
                            "    - net: usb: lan78xx: Fix lost EEPROM write timeout error(-ETIMEDOUT) in",
                            "      lan78xx_write_raw_eeprom",
                            "    - f2fs: fix wrong block mapping for multi-devices",
                            "    - gve: Check valid ts bit on RX descriptor before hw timestamping",
                            "    - jbd2: ensure that all ongoing I/O complete before freeing blocks",
                            "    - ext4: wait for ongoing I/O to complete before freeing blocks",
                            "    - btrfs: fix clearing of BTRFS_FS_RELOC_RUNNING if relocation already",
                            "      running",
                            "    - btrfs: fix memory leak on duplicated memory in the qgroup assign ioctl",
                            "    - btrfs: only set the device specific options after devices are opened",
                            "    - btrfs: fix incorrect readahead expansion length",
                            "    - can: gs_usb: gs_make_candev(): populate net_device->dev_port",
                            "    - can: gs_usb: increase max interface to U8_MAX",
                            "    - cxl/acpi: Fix setup of memory resource in cxl_acpi_set_cache_size()",
                            "    - ALSA: hda/intel: Add MSI X870E Tomahawk to denylist",
                            "    - ALSA: hda/realtek: Add quirk entry for HP ZBook 17 G6",
                            "    - drm/amdgpu: use atomic functions with memory barriers for vm fault info",
                            "    - drm/amdgpu: fix gfx12 mes packet status return check",
                            "    - drm/xe: Increase global invalidation timeout to 1000us",
                            "    - perf/core: Fix address filter match with backing files",
                            "    - perf/core: Fix MMAP event path names with backing files",
                            "    - perf/core: Fix MMAP2 event device with backing files",
                            "    - drm/amd: Check whether secure display TA loaded successfully",
                            "    - PM: hibernate: Add pm_hibernation_mode_is_suspend()",
                            "    - drm/amd: Fix hybrid sleep",
                            "    - usb: gadget: Store endpoint pointer in usb_request",
                            "    - usb: gadget: Introduce free_usb_request helper",
                            "    - HID: multitouch: fix sticky fingers",
                            "    - dax: skip read lock assertion for read-only filesystems",
                            "    - coredump: fix core_pattern input validation",
                            "    - can: m_can: m_can_plat_remove(): add missing pm_runtime_disable()",
                            "    - can: m_can: m_can_handle_state_errors(): fix CAN state transition to",
                            "      Error Active",
                            "    - can: m_can: m_can_chip_config(): bring up interface in correct state",
                            "    - can: m_can: fix CAN state in system PM",
                            "    - net: mtk: wed: add dma mask limitation and GFP_DMA32 for device with",
                            "      more than 4GB DRAM",
                            "    - net: dlink: handle dma_map_single() failure properly",
                            "    - doc: fix seg6_flowlabel path",
                            "    - can: j1939: add missing calls in NETDEV_UNREGISTER notification handler",
                            "    - dpll: zl3073x: Refactor DPLL initialization",
                            "    - dpll: zl3073x: Handle missing or corrupted flash configuration",
                            "    - r8169: fix packet truncation after S4 resume on RTL8168H/RTL8111H",
                            "    - net: phy: bcm54811: Fix GMII/MII/MII-Lite selection",
                            "    - net: phy: realtek: Avoid PHYCR2 access if PHYCR2 not present",
                            "    - amd-xgbe: Avoid spurious link down messages during interface toggle",
                            "    - Octeontx2-af: Fix missing error code in cgx_probe()",
                            "    - tcp: fix tcp_tso_should_defer() vs large RTT",
                            "    - net: airoha: Take into account out-of-order tx completions in",
                            "      airoha_dev_xmit()",
                            "    - selftests: net: check jq command is supported",
                            "    - net: core: fix lockdep splat on device unregister",
                            "    - ksmbd: fix recursive locking in RPC handle list access",
                            "    - tg3: prevent use of uninitialized remote_adv and local_adv variables",
                            "    - tls: trim encrypted message to match the plaintext on short splice",
                            "    - tls: wait for async encrypt in case of error during latter iterations of",
                            "      sendmsg",
                            "    - tls: always set record_type in tls_process_cmsg",
                            "    - tls: don't rely on tx_work during send()",
                            "    - netdevsim: set the carrier when the device goes up",
                            "    - net: usb: lan78xx: fix use of improperly initialized dev->chipid in",
                            "      lan78xx_reset",
                            "    - drm/panthor: Ensure MCU is disabled on suspend",
                            "    - nvme-multipath: Skip nr_active increments in RETRY disposition",
                            "    - riscv: kprobes: Fix probe address validation",
                            "    - drm/bridge: lt9211: Drop check for last nibble of version register",
                            "    - powerpc/fadump: skip parameter area allocation when fadump is disabled",
                            "    - ASoC: codecs: Fix gain setting ranges for Renesas IDT821034 codec",
                            "    - ASoC: nau8821: Cancel jdet_work before handling jack ejection",
                            "    - ASoC: nau8821: Generalize helper to clear IRQ status",
                            "    - ASoC: nau8821: Consistently clear interrupts before unmasking",
                            "    - ASoC: nau8821: Add DMI quirk to bypass jack debounce circuit",
                            "    - drm/i915/guc: Skip communication warning on reset in progress",
                            "    - drm/i915/frontbuffer: Move bo refcounting",
                            "      intel_frontbuffer_{get,release}()",
                            "    - drm/i915/fb: Fix the set_tiling vs. addfb race, again",
                            "    - drm/amdgpu: add ip offset support for cyan skillfish",
                            "    - drm/amdgpu: add support for cyan skillfish without IP discovery",
                            "    - drm/amdgpu: fix handling of harvesting for ip_discovery firmware",
                            "    - drm/amdgpu: handle wrap around in reemit handling",
                            "    - drm/amdgpu: set an error on all fences from a bad context",
                            "    - drm/amdgpu: drop unused structures in amdgpu_drm.h",
                            "    - drm/amd/powerplay: Fix CIK shutdown temperature",
                            "    - drm/xe: Enable media sampler power gating",
                            "    - drm/draw: fix color truncation in drm_draw_fill24",
                            "    - drm/rockchip: vop2: use correct destination rectangle height check",
                            "    - HID: intel-thc-hid: Intel-quickspi: switch first interrupt from level to",
                            "      edge detection",
                            "    - sched/fair: Fix pelt lost idle time detection",
                            "    - ALSA: firewire: amdtp-stream: fix enum kernel-doc warnings",
                            "    - accel/qaic: Synchronize access to DBC request queue head & tail pointer",
                            "    - nvme-auth: update sc_c in host response",
                            "    - cxl/trace: Subtract to find an hpa_alias0 in cxl_poison events",
                            "    - selftests/bpf: make arg_parsing.c more robust to crashes",
                            "    - blk-mq: fix stale tag depth for shared sched tags in",
                            "      blk_mq_update_nr_requests()",
                            "    - block: Remove elevator_lock usage from blkg_conf frozen operations",
                            "    - HID: hid-input: only ignore 0 battery events for digitizers",
                            "    - HID: multitouch: fix name of Stylus input devices",
                            "    - drm/xe/evict: drop bogus assert",
                            "    - selftests: arg_parsing: Ensure data is flushed to disk before reading.",
                            "    - nvme/tcp: handle tls partially sent records in write_space()",
                            "    - rust: cpufreq: fix formatting",
                            "    - arm64: debug: always unmask interrupts in el0_softstp()",
                            "    - arm64: cputype: Add Neoverse-V3AE definitions",
                            "    - arm64: errata: Apply workarounds for Neoverse-V3AE",
                            "    - xfs: rename the old_crc variable in xlog_recover_process",
                            "    - xfs: fix log CRC mismatches between i386 and other architectures",
                            "    - NFSD: Rework encoding and decoding of nfsd4_deviceid",
                            "    - NFSD: Minor cleanup in layoutcommit processing",
                            "    - NFSD: Implement large extent array support in pNFS",
                            "    - NFSD: Fix last write offset handling in layoutcommit",
                            "    - phy: cdns-dphy: Store hs_clk_rate and return it",
                            "    - phy: cadence: cdns-dphy: Fix PLL lock and O_CMN_READY polling",
                            "    - x86/resctrl: Refactor resctrl_arch_rmid_read()",
                            "    - x86/resctrl: Fix miscount of bandwidth event when reactivating",
                            "      previously unavailable RMID",
                            "    - cxl: Fix match_region_by_range() to use region_res_match_cxl_range()",
                            "    - phy: cadence: cdns-dphy: Update calibration wait time for startup state",
                            "      machine",
                            "    - drm/xe: Use devm_ioremap_wc for VRAM mapping and drop manual unmap",
                            "    - drm/xe: Use dynamic allocation for tile and device VRAM region",
                            "      structures",
                            "    - drm/xe: Move struct xe_vram_region to a dedicated header",
                            "    - drm/xe: Unify the initialization of VRAM regions",
                            "    - drm/xe: Move rebar to be done earlier",
                            "    - PM: hibernate: Fix pm_hibernation_mode_is_suspend() build breakage",
                            "    - drm/xe: Fix an IS_ERR() vs NULL bug in xe_tile_alloc_vram()",
                            "    - Linux 6.17.5",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40086",
                            "    - drm/xe: Don't allow evicting of BOs in same VM in array of VM binds",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40087",
                            "    - NFSD: Define a proc_layoutcommit for the FlexFiles layout type",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40088",
                            "    - hfsplus: fix slab-out-of-bounds read in hfsplus_strcasecmp()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40162",
                            "    - ASoC: amd/sdw_utils: avoid NULL deref when devm_kasprintf() fails",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40085",
                            "    - ALSA: usb-audio: Fix NULL pointer deference in try_to_register_card",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40172",
                            "    - accel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40177",
                            "    - accel/qaic: Fix bootlog initialization ordering",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40163",
                            "    - sched/deadline: Stop dl_server before CPU goes offline",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40174",
                            "    - x86/mm: Fix SMP ordering in switch_mm_irqs_off()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40089",
                            "    - cxl/features: Add check for no entries in cxl_feature_info",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40176",
                            "    - tls: wait for pending async decryptions if tls_strp_msg_hold fails",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40164",
                            "    - usbnet: Fix using smp_processor_id() in preemptible code warnings",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40091",
                            "    - ixgbe: fix too early devlink_free() in ixgbe_remove()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40175",
                            "    - idpf: cleanup remaining SKBs in PTP flows",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40173",
                            "    - net/ip6_tunnel: Prevent perpetual tunnel growth",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40092",
                            "    - usb: gadget: f_ncm: Refactor bind path to use __free()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40093",
                            "    - usb: gadget: f_ecm: Refactor bind path to use __free()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40094",
                            "    - usb: gadget: f_acm: Refactor bind path to use __free()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40095",
                            "    - usb: gadget: f_rndis: Refactor bind path to use __free()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40165",
                            "    - media: nxp: imx8-isi: m2m: Fix streaming cleanup on release",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40096",
                            "    - drm/sched: Fix potential double free in",
                            "      drm_sched_job_add_resv_dependencies",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40097",
                            "    - ALSA: hda: Fix missing pointer check in hda_component_manager_init",
                            "      function",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40098",
                            "    - ALSA: hda: cs35l41: Fix NULL pointer dereference in",
                            "      cs35l41_get_acpi_mute_state()",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40099",
                            "    - cifs: parse_dfs_referrals: prevent oob on malformed input",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40100",
                            "    - btrfs: do not assert we found block group item when creating free space",
                            "      tree",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40101",
                            "    - btrfs: fix memory leaks when rejecting a non SINGLE data profile without",
                            "      an RST",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40167",
                            "    - ext4: detect invalid INLINE_DATA + EXTENTS flag combination",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40102",
                            "    - KVM: arm64: Prevent access to vCPU events before init",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40103",
                            "    - smb: client: Fix refcount leak for cifs_sb_tlink",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40104",
                            "    - ixgbevf: fix mailbox API compatibility by negotiating supported features",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40166",
                            "    - drm/xe/guc: Check GuC running state before deregistering exec queue",
                            "  * Questing update: v6.17.5 upstream stable release (LP: #2133557) //",
                            "    CVE-2025-40105",
                            "    - vfs: Don't leak disconnected dentries on umount",
                            "  * The machine didn’t go into suspend and got stuck (LP: #2132095)",
                            "    - platform/x86: alienware-wmi-wmax: Fix NULL pointer dereference in sleep",
                            "      handlers",
                            "  * CAP_PERFMON insufficient to get perf data (LP: #2131046)",
                            "    - SAUCE: perf/core: Allow CAP_PERFMON for paranoid level 4",
                            "  * Poweroff not working consistently after upgrading kernel 6.14.0-17.17 or",
                            "    later (LP: #2115860)",
                            "    - drm/amd: Unify shutdown() callback behavior",
                            "    - drm/amd: Stop exporting amdgpu_device_ip_suspend() outside amdgpu_device",
                            "    - drm/amd: Remove comment about handling errors in",
                            "      amdgpu_device_ip_suspend_phase1()",
                            "    - drm/amd: Don't always set IP block HW status to false",
                            "    - drm/amd: Pass IP suspend errors up to callers",
                            "    - drm/amd: Avoid evicting resources at S5",
                            "  * Re-enable INTEL_SKL_INT3472 for kernels >= 6.16 for Intel IPU camera",
                            "    (LP: #2128792)",
                            "    - Revert \"UBUNTU: [Config] FTBFS: disable INTEL_SKL_INT3472\"",
                            "    - Revert \"UBUNTU: SAUCE: platform/x86: int3472: Add handshake GPIO",
                            "      function\"",
                            "  * Support Samsung S5K3J1 sensor for Intel MIPI camera (LP: #2121852)",
                            "    - SAUCE: media: ipu-bridge: Support s5k3j1 sensor",
                            "  * Questing update: v6.17.4 upstream stable release (LP: #2131259)",
                            "    - fs: always return zero on success from replace_fd()",
                            "    - fscontext: do not consume log entries when returning -EMSGSIZE",
                            "    - btrfs: fix the incorrect max_bytes value for find_lock_delalloc_range()",
                            "    - arm64: map [_text, _stext) virtual address range non-executable+read-",
                            "      only",
                            "    - rseq: Protect event mask against membarrier IPI",
                            "    - statmount: don't call path_put() under namespace semaphore",
                            "    - listmount: don't call path_put() under namespace semaphore",
                            "    - clocksource/drivers/clps711x: Fix resource leaks in error paths",
                            "    - memcg: skip cgroup_file_notify if spinning is not allowed",
                            "    - page_pool: Fix PP_MAGIC_MASK to avoid crashing on some 32-bit arches",
                            "    - PM: runtime: Update kerneldoc return codes",
                            "    - dma-mapping: fix direction in dma_alloc direction traces",
                            "    - cpufreq: Make drivers using CPUFREQ_ETERNAL specify transition latency",
                            "    - nfsd: unregister with rpcbind when deleting a transport",
                            "    - KVM: x86: Add helper to retrieve current value of user return MSR",
                            "    - KVM: SVM: Emulate PERF_CNTR_GLOBAL_STATUS_SET for PerfMonV2",
                            "    - iio: frequency: adf4350: Fix ADF4350_REG3_12BIT_CLKDIV_MODE",
                            "    - media: v4l2-subdev: Fix alloc failure check in",
                            "      v4l2_subdev_call_state_try()",
                            "    - asm-generic/io.h: Skip trace helpers if rwmmio events are disabled",
                            "    - clk: npcm: select CONFIG_AUXILIARY_BUS",
                            "    - clk: thead: th1520-ap: describe gate clocks with clk_gate",
                            "    - clk: thead: th1520-ap: fix parent of padctrl0 clock",
                            "    - clk: thead: Correct parent for DPU pixel clocks",
                            "    - clk: renesas: r9a08g045: Add MSTOP for GPIO",
                            "    - perf disasm: Avoid undefined behavior in incrementing NULL",
                            "    - perf test trace_btf_enum: Skip if permissions are insufficient",
                            "    - perf evsel: Avoid container_of on a NULL leader",
                            "    - libperf event: Ensure tracing data is multiple of 8 sized",
                            "    - clk: qcom: common: Fix NULL vs IS_ERR() check in qcom_cc_icc_register()",
                            "    - clk: qcom: Select the intended config in QCS_DISPCC_615",
                            "    - perf parse-events: Handle fake PMUs in CPU terms",
                            "    - clk: at91: peripheral: fix return value",
                            "    - clk: renesas: cpg-mssr: Fix memory leak in cpg_mssr_reserved_init()",
                            "    - perf: Completely remove possibility to override MAX_NR_CPUS",
                            "    - perf drm_pmu: Fix fd_dir leaks in for_each_drm_fdinfo_in_dir()",
                            "    - perf util: Fix compression checks returning -1 as bool",
                            "    - rtc: x1205: Fix Xicor X1205 vendor prefix",
                            "    - rtc: optee: fix memory leak on driver removal",
                            "    - perf arm_spe: Correct setting remote access",
                            "    - perf arm_spe: Correct memory level for remote access",
                            "    - perf vendor events arm64 AmpereOneX: Fix typo - should be",
                            "      l1d_cache_access_prefetches",
                            "    - perf test: AMD IBS swfilt skip kernel tests if paranoia is >1",
                            "    - perf test shell lbr: Avoid failures with perf event paranoia",
                            "    - perf trace: Fix IS_ERR() vs NULL check bug",
                            "    - perf session: Fix handling when buffer exceeds 2 GiB",
                            "    - perf test: Don't leak workload gopipe in PERF_RECORD_*",
                            "    - perf evsel: Fix uniquification when PMU given without suffix",
                            "    - perf test: Avoid uncore_imc/clockticks in uniquification test",
                            "    - perf evsel: Ensure the fallback message is always written to",
                            "    - perf build-id: Ensure snprintf string is empty when size is 0",
                            "    - clk: mediatek: mt8195-infra_ao: Fix parent for infra_ao_hdmi_26m",
                            "    - clk: mediatek: clk-mux: Do not pass flags to",
                            "      clk_mux_determine_rate_flags()",
                            "    - clk: nxp: lpc18xx-cgu: convert from round_rate() to determine_rate()",
                            "    - clk: nxp: Fix pll0 rate check condition in LPC18xx CGU driver",
                            "    - clk: tegra: do not overallocate memory for bpmp clocks",
                            "    - nfsd: fix assignment of ia_ctime.tv_nsec on delegated mtime update",
                            "    - nfsd: ignore ATTR_DELEG when checking ia_valid before notify_change()",
                            "    - vfs: add ATTR_CTIME_SET flag",
                            "    - nfsd: use ATTR_CTIME_SET for delegated ctime updates",
                            "    - nfsd: track original timestamps in nfs4_delegation",
                            "    - nfsd: fix SETATTR updates for delegated timestamps",
                            "    - nfsd: fix timestamp updates in CB_GETATTR",
                            "    - tracing: Fix the bug where bpf_get_stackid returns -EFAULT on the ARM64",
                            "    - PM: core: Annotate loops walking device links as _srcu",
                            "    - PM: core: Add two macros for walking device links",
                            "    - PM: sleep: Do not wait on SYNC_STATE_ONLY device links",
                            "    - cpufreq: tegra186: Set target frequency for all cpus in policy",
                            "    - scsi: mvsas: Fix use-after-free bugs in mvs_work_queue",
                            "    - perf bpf-filter: Fix opts declaration on older libbpfs",
                            "    - scsi: ufs: sysfs: Make HID attributes visible",
                            "    - mshv: Handle NEED_RESCHED_LAZY before transferring to guest",
                            "    - perf bpf_counter: Fix handling of cpumap fixing hybrid",
                            "    - ASoC: SOF: ipc4-topology: Correct the minimum host DMA buffer size",
                            "    - ASoC: SOF: ipc4-topology: Account for different ChainDMA host buffer",
                            "      size",
                            "    - ASoC: SOF: Intel: hda-pcm: Place the constraint on period time instead",
                            "      of buffer time",
                            "    - LoongArch: Add cflag -fno-isolate-erroneous-paths-dereference",
                            "    - LoongArch: Fix build error for LTO with LLVM-18",
                            "    - LoongArch: Init acpi_gbl_use_global_lock to false",
                            "    - ASoC: SOF: Intel: Read the LLP via the associated Link DMA channel",
                            "    - net: usb: lan78xx: Fix lost EEPROM read timeout error(-ETIMEDOUT) in",
                            "      lan78xx_read_raw_eeprom",
                            "    - net/mlx4: prevent potential use after free in mlx4_en_do_uc_filter()",
                            "    - drm/xe/hw_engine_group: Fix double write lock release in error path",
                            "    - drm/xe/i2c: Don't rely on d3cold.allowed flag in system PM path",
                            "    - s390/cio: Update purge function to unregister the unused subchannels",
                            "    - drm/vmwgfx: Fix a null-ptr access in the cursor snooper",
                            "    - drm/vmwgfx: Fix Use-after-free in validation",
                            "    - drm/vmwgfx: Fix copy-paste typo in validation",
                            "    - net/sctp: fix a null dereference in sctp_disposition",
                            "      sctp_sf_do_5_1D_ce()",
                            "    - tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request().",
                            "    - net: mscc: ocelot: Fix use-after-free caused by cyclic delayed work",
                            "    - selftest: net: ovpn: Fix uninit return values",
                            "    - ice: ice_adapter: release xa entry on adapter allocation failure",
                            "    - net: fsl_pq_mdio: Fix device node reference leak in fsl_pq_mdio_probe",
                            "    - tools build: Align warning options with perf",
                            "    - perf python: split Clang options when invoking Popen",
                            "    - tcp: take care of zero tp->window_clamp in tcp_set_rcvlowat()",
                            "    - mailbox: zynqmp-ipi: Remove redundant mbox_controller_unregister() call",
                            "    - mailbox: zynqmp-ipi: Remove dev.parent check in zynqmp_ipi_free_mboxes",
                            "    - mailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop",
                            "    - mailbox: zynqmp-ipi: Fix SGI cleanup on unbind",
                            "    - bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}",
                            "    - net: mdio: mdio-i2c: Hold the i2c bus lock during smbus transactions",
                            "    - net: sparx5/lan969x: fix flooding configuration on bridge join/leave",
                            "    - net/mlx5: Prevent tunnel mode conflicts between FDB and NIC IPsec tables",
                            "    - net/mlx5e: Prevent tunnel reformat when tunnel mode not allowed",
                            "    - mailbox: mtk-cmdq: Remove pm_runtime APIs from cmdq_mbox_send_data()",
                            "    - drm/amdgpu: Add additional DCE6 SCL registers",
                            "    - drm/amd/display: Add missing DCE6 SCL_HORZ_FILTER_INIT* SRIs",
                            "    - drm/amd/display: Properly clear SCL_*_FILTER_CONTROL on DCE6",
                            "    - drm/amd/display: Properly disable scaling on DCE6",
                            "    - drm/amd/display: Disable scaling on DCE6 for now",
                            "    - drm/amdkfd: Fix kfd process ref leaking when userptr unmapping",
                            "    - net: pse-pd: tps23881: Fix current measurement scaling",
                            "    - crypto: skcipher - Fix reqsize handling",
                            "    - netfilter: nft_objref: validate objref and objrefmap expressions",
                            "    - bridge: br_vlan_fill_forward_path_pvid: use br_vlan_group_rcu()",
                            "    - selftests: netfilter: nft_fib.sh: fix spurious test failures",
                            "    - selftests: netfilter: query conntrack state to check for port clash",
                            "      resolution",
                            "    - io_uring/zcrx: increment fallback loop src offset",
                            "    - net: airoha: Fix loopback mode configuration for GDM2 port",
                            "    - cifs: Fix copy_to_iter return value check",
                            "    - smb: client: fix missing timestamp updates after utime(2)",
                            "    - rtc: isl12022: Fix initial enable_irq/disable_irq balance",
                            "    - cifs: Query EA $LXMOD in cifs_query_path_info() for WSL reparse points",
                            "    - tpm_tis: Fix incorrect arguments in tpm_tis_probe_irq_single",
                            "    - gpio: wcd934x: mark the GPIO controller as sleeping",
                            "    - bpf: Avoid RCU context warning when unpinning htab with internal structs",
                            "    - kbuild: always create intermediate vmlinux.unstripped",
                            "    - kbuild: keep .modinfo section in vmlinux.unstripped",
                            "    - kbuild: Restore pattern to avoid stripping .rela.dyn from vmlinux",
                            "    - kbuild: Add '.rel.*' strip pattern for vmlinux",
                            "    - s390: vmlinux.lds.S: Reorder sections",
                            "    - s390/vmlinux.lds.S: Move .vmlinux.info to end of allocatable sections",
                            "    - ACPICA: acpidump: drop ACPI_NONSTRING attribute from file_name",
                            "    - ACPI: property: Fix buffer properties extraction for subnodes",
                            "    - ACPI: TAD: Add missing sysfs_remove_group() for ACPI_TAD_RT",
                            "    - ACPICA: Debugger: drop ACPI_NONSTRING attribute from name_seg",
                            "    - ACPI: debug: fix signedness issues in read/write helpers",
                            "    - ACPI: battery: Add synchronization between interface updates",
                            "    - arm64: dts: qcom: msm8916: Add missing MDSS reset",
                            "    - arm64: dts: qcom: msm8939: Add missing MDSS reset",
                            "    - arm64: dts: qcom: sdm845: Fix slimbam num-channels/ees",
                            "    - Revert \"UBUNTU: SAUCE: arm64: dts: qcom: x1e80100-pmics: Disable pm8010",
                            "      by default\"",
                            "    - arm64: dts: qcom: x1e80100-pmics: Disable pm8010 by default",
                            "    - arm64: dts: ti: k3-am62a-main: Fix main padcfg length",
                            "    - arm64: dts: ti: k3-am62p: Fix supported hardware for 1GHz OPP",
                            "    - arm64: kprobes: call set_memory_rox() for kprobe page",
                            "    - arm64: mte: Do not flag the zero page as PG_mte_tagged",
                            "    - ARM: AM33xx: Implement TI advisory 1.0.36 (EMU0/EMU1 pins state on",
                            "      reset)",
                            "    - ARM: OMAP2+: pm33xx-core: ix device node reference leaks in",
                            "      amx3_idle_init",
                            "    - firmware: arm_scmi: quirk: Prevent writes to string constants",
                            "    - perf/arm-cmn: Fix CMN S3 DTM offset",
                            "    - KVM: s390: Fix to clear PTE when discarding a swapped page",
                            "    - KVM: arm64: Fix debug checking for np-guests using huge mappings",
                            "    - KVM: arm64: Fix page leak in user_mem_abort()",
                            "    - x86/kvm: Force legacy PCI hole to UC when overriding MTRRs for TDX/SNP",
                            "    - KVM: SVM: Re-load current, not host, TSC_AUX on #VMEXIT from SEV-ES",
                            "      guest",
                            "    - KVM: TDX: Fix uninitialized error code for __tdx_bringup()",
                            "    - dt-bindings: phy: rockchip-inno-csi-dphy: make power-domains non-",
                            "      required",
                            "    - xen: take system_transition_mutex on suspend",
                            "    - xen/events: Cleanup find_virq() return codes",
                            "    - xen/manage: Fix suspend error path",
                            "    - xen/events: Return -EEXIST for bound VIRQs",
                            "    - xen/events: Update virq_to_irq on migration",
                            "    - firmware: exynos-acpm: fix PMIC returned errno",
                            "    - firmware: meson_sm: fix device leak at probe",
                            "    - media: cec: extron-da-hd-4k-plus: drop external-module make commands",
                            "    - media: cx18: Add missing check after DMA map",
                            "    - media: i2c: mt9p031: fix mbus code initialization",
                            "    - media: i2c: mt9v111: fix incorrect type for ret",
                            "    - media: mc: Fix MUST_CONNECT handling for pads with no links",
                            "    - media: pci: ivtv: Add missing check after DMA map",
                            "    - media: pci: mg4b: fix uninitialized iio scan data",
                            "    - media: platform: mtk-mdp3: Add missing MT8188 compatible to comp_dt_ids",
                            "    - media: s5p-mfc: remove an unused/uninitialized variable",
                            "    - media: staging/ipu7: fix isys device runtime PM usage in firmware",
                            "      closing",
                            "    - media: uvcvideo: Avoid variable shadowing in uvc_ctrl_cleanup_fh",
                            "    - media: venus: firmware: Use correct reset sequence for IRIS2",
                            "    - media: venus: pm_helpers: add fallback for the opp-table",
                            "    - media: vivid: fix disappearing <Vendor Command With ID> messages",
                            "    - media: vsp1: Export missing vsp1_isp_free_buffer symbol",
                            "    - media: ti: j721e-csi2rx: Use devm_of_platform_populate",
                            "    - media: ti: j721e-csi2rx: Fix source subdev link creation",
                            "    - media: lirc: Fix error handling in lirc_register()",
                            "    - drm/exynos: exynos7_drm_decon: remove ctx->suspended",
                            "    - drm/panthor: Fix memory leak in panthor_ioctl_group_create()",
                            "    - drm/msm/a6xx: Fix PDC sleep sequence",
                            "    - drm/rcar-du: dsi: Fix 1/2/3 lane support",
                            "    - drm/nouveau: fix bad ret code in nouveau_bo_move_prep",
                            "    - drm/xe/uapi: loosen used tracking restriction",
                            "    - drm/amd/display: Incorrect Mirror Cositing",
                            "    - drm/amd/display: Enable Dynamic DTBCLK Switch",
                            "    - drm/amd/display: Fix unsafe uses of kernel mode FPU",
                            "    - blk-crypto: fix missing blktrace bio split events",
                            "    - btrfs: avoid potential out-of-bounds in btrfs_encode_fh()",
                            "    - bus: mhi: ep: Fix chained transfer handling in read path",
                            "    - bus: mhi: host: Do not use uninitialized 'dev' pointer in",
                            "      mhi_init_irq_setup()",
                            "    - cdx: Fix device node reference leak in cdx_msi_domain_init",
                            "    - clk: qcom: tcsrcc-x1e80100: Set the bi_tcxo as parent to eDP refclk",
                            "    - clk: samsung: exynos990: Use PLL_CON0 for PLL parent muxes",
                            "    - clk: samsung: exynos990: Fix CMU_TOP mux/div bit widths",
                            "    - clk: samsung: exynos990: Replace bogus divs with fixed-factor clocks",
                            "    - copy_sighand: Handle architectures where sizeof(unsigned long) <",
                            "      sizeof(u64)",
                            "    - cpufreq: CPPC: Avoid using CPUFREQ_ETERNAL as transition delay",
                            "    - cpufreq: intel_pstate: Fix object lifecycle issue in",
                            "      update_qos_request()",
                            "    - crypto: aspeed - Fix dma_unmap_sg() direction",
                            "    - crypto: atmel - Fix dma_unmap_sg() direction",
                            "    - crypto: rockchip - Fix dma_unmap_sg() nents value",
                            "    - eventpoll: Replace rwlock with spinlock",
                            "    - fbdev: Fix logic error in \"offb\" name match",
                            "    - fs/ntfs3: Fix a resource leak bug in wnd_extend()",
                            "    - fs: quota: create dedicated workqueue for quota_release_work",
                            "    - fsnotify: pass correct offset to fsnotify_mmap_perm()",
                            "    - fuse: fix possibly missing fuse_copy_finish() call in fuse_notify()",
                            "    - fuse: fix livelock in synchronous file put from fuseblk workers",
                            "    - gpio: mpfs: fix setting gpio direction to output",
                            "    - i3c: Fix default I2C adapter timeout value",
                            "    - iio/adc/pac1934: fix channel disable configuration",
                            "    - iio: dac: ad5360: use int type to store negative error codes",
                            "    - iio: dac: ad5421: use int type to store negative error codes",
                            "    - iio: frequency: adf4350: Fix prescaler usage.",
                            "    - iio: xilinx-ams: Fix AMS_ALARM_THR_DIRECT_MASK",
                            "    - iio: xilinx-ams: Unmask interrupts after updating alarms",
                            "    - init: handle bootloader identifier in kernel parameters",
                            "    - iio: imu: inv_icm42600: Simplify pm_runtime setup",
                            "    - iio: imu: inv_icm42600: Drop redundant pm_runtime reinitialization in",
                            "      resume",
                            "    - iio: imu: inv_icm42600: Avoid configuring if already pm_runtime",
                            "      suspended",
                            "    - iommu/vt-d: PRS isn't usable if PDS isn't supported",
                            "    - ipmi: Rework user message limit handling",
                            "    - ipmi:msghandler:Change seq_lock to a mutex",
                            "    - kernel/sys.c: fix the racy usage of task_lock(tsk->group_leader) in",
                            "      sys_prlimit64() paths",
                            "    - KEYS: trusted_tpm1: Compare HMAC values in constant time",
                            "    - kho: only fill kimage if KHO is finalized",
                            "    - lib/genalloc: fix device leak in of_gen_pool_get()",
                            "    - loop: fix backing file reference leak on validation error",
                            "    - md: fix mssing blktrace bio split events",
                            "    - of: unittest: Fix device reference count leak in",
                            "      of_unittest_pci_node_verify",
                            "    - openat2: don't trigger automounts with RESOLVE_NO_XDEV",
                            "    - padata: Reset next CPU when reorder sequence wraps around",
                            "    - parisc: don't reference obsolete termio struct for TC* constants",
                            "    - parisc: Remove spurious if statement from raw_copy_from_user()",
                            "    - nvme-pci: Add TUXEDO IBS Gen8 to Samsung sleep quirk",
                            "    - pinctrl: samsung: Drop unused S3C24xx driver data",
                            "    - PM: EM: Fix late boot with holes in CPU topology",
                            "    - PM: hibernate: Fix hybrid-sleep",
                            "    - PM: hibernate: Restrict GFP mask in power_down()",
                            "    - power: supply: max77976_charger: fix constant current reporting",
                            "    - powerpc/powernv/pci: Fix underflow and leak issue",
                            "    - powerpc/pseries/msi: Fix potential underflow and leak issue",
                            "    - pwm: berlin: Fix wrong register in suspend/resume",
                            "    - pwm: Fix incorrect variable used in error message",
                            "    - Revert \"ipmi: fix msg stack when IPMI is disconnected\"",
                            "    - sched/deadline: Fix race in push_dl_task()",
                            "    - scsi: hpsa: Fix potential memory leak in hpsa_big_passthru_ioctl()",
                            "    - scsi: sd: Fix build warning in sd_revalidate_disk()",
                            "    - sctp: Fix MAC comparison to be constant-time",
                            "    - smb client: fix bug with newly created file in cached dir",
                            "    - sparc64: fix hugetlb for sun4u",
                            "    - sparc: fix error handling in scan_one_device()",
                            "    - xtensa: simdisk: add input size check in proc_write_simdisk",
                            "    - xsk: Harden userspace-supplied xdp_desc validation",
                            "    - mtd: rawnand: fsmc: Default to autodetect buswidth",
                            "    - mtd: nand: raw: gpmi: fix clocks when CONFIG_PM=N",
                            "    - mmc: core: SPI mode remove cmd7",
                            "    - mmc: mmc_spi: multiple block read remove read crc ack",
                            "    - memory: samsung: exynos-srom: Fix of_iomap leak in exynos_srom_probe",
                            "    - memory: stm32_omm: Fix req2ack update test",
                            "    - rtc: interface: Ensure alarm irq is enabled when UIE is enabled",
                            "    - rtc: interface: Fix long-standing race when setting alarm",
                            "    - rseq/selftests: Use weak symbol reference, not definition, to link with",
                            "      glibc",
                            "    - PCI: xilinx-nwl: Fix ECAM programming",
                            "    - PCI: tegra: Convert struct tegra_msi mask_lock into raw spinlock",
                            "    - PCI/sysfs: Ensure devices are powered for config reads",
                            "    - PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV",
                            "    - PCI/ERR: Fix uevent on failure to recover",
                            "    - PCI/AER: Fix missing uevent on recovery when a reset is requested",
                            "    - PCI/AER: Support errors introduced by PCIe r6.0",
                            "    - PCI: Ensure relaxed tail alignment does not increase min_align",
                            "    - PCI: Fix failure detection during resource resize",
                            "    - PCI: j721e: Fix module autoloading",
                            "    - PCI: j721e: Fix programming sequence of \"strap\" settings",
                            "    - PCI: keystone: Use devm_request_irq() to free \"ks-pcie-error-irq\" on",
                            "      exit",
                            "    - PCI: rcar-gen4: Fix PHY initialization",
                            "    - PCI: rcar-host: Drop PMSR spinlock",
                            "    - PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock",
                            "    - PCI: tegra194: Fix broken tegra_pcie_ep_raise_msi_irq()",
                            "    - PCI: tegra194: Handle errors in BPMP response",
                            "    - PCI: tegra194: Reset BARs when running in PCIe endpoint mode",
                            "    - PCI/pwrctrl: Fix device leak at registration",
                            "    - PCI/pwrctrl: Fix device and OF node leak at bus scan",
                            "    - PCI/pwrctrl: Fix device leak at device stop",
                            "    - spi: cadence-quadspi: Flush posted register writes before INDAC access",
                            "    - spi: cadence-quadspi: Flush posted register writes before DAC access",
                            "    - spi: cadence-quadspi: Fix cqspi_setup_flash()",
                            "    - xfs: use deferred intent items for reaping crosslinked blocks",
                            "    - x86/fred: Remove ENDBR64 from FRED entry points",
                            "    - x86/umip: Check that the instruction opcode is at least two bytes",
                            "    - x86/umip: Fix decoding of register forms of 0F 01 (SGDT and SIDT",
                            "      aliases)",
                            "    - mptcp: pm: in-kernel: usable client side with C-flag",
                            "    - mptcp: reset blackhole on success with non-loopback ifaces",
                            "    - selftests: mptcp: join: validate C-flag + def limit",
                            "    - s390/cio/ioasm: Fix __xsch() condition code handling",
                            "    - s390/dasd: enforce dma_alignment to ensure proper buffer validation",
                            "    - s390/dasd: Return BLK_STS_INVAL for EINVAL from do_dasd_request",
                            "    - s390: Add -Wno-pointer-sign to KBUILD_CFLAGS_DECOMPRESSOR",
                            "    - slab: prevent warnings when slab obj_exts vector allocation fails",
                            "    - slab: mark slab->obj_exts allocation failures unconditionally",
                            "    - wifi: ath11k: HAL SRNG: don't deinitialize and re-initialize again",
                            "    - wifi: iwlwifi: Fix dentry reference leak in iwl_mld_add_link_debugfs",
                            "    - wifi: rtw89: avoid possible TX wait initialization race",
                            "    - wifi: mt76: mt7925u: Add VID/PID for Netgear A9000",
                            "    - wifi: mt76: mt7921u: Add VID/PID for Netgear A7500",
                            "    - mm/thp: fix MTE tag mismatch when replacing zero-filled subpages",
                            "    - mm/rmap: fix soft-dirty and uffd-wp bit loss when remapping zero-filled",
                            "      mTHP subpage to shared zeropage",
                            "    - mm/page_alloc: only set ALLOC_HIGHATOMIC for __GPF_HIGH allocations",
                            "    - mm/hugetlb: early exit from hugetlb_pages_alloc_boot() when",
                            "      max_huge_pages=0",
                            "    - mm/damon/vaddr: do not repeat pte_offset_map_lock() until success",
                            "    - mm/damon/lru_sort: use param_ctx for damon_attrs staging",
                            "    - nfsd: decouple the xprtsec policy check from check_nfsd_access()",
                            "    - NFSD: Fix destination buffer size in nfsd4_ssc_setup_dul()",
                            "    - nfsd: nfserr_jukebox in nlm_fopen should lead to a retry",
                            "    - media: iris: Call correct power off callback in cleanup path",
                            "    - media: iris: Fix firmware reference leak and unmap memory after load",
                            "    - media: iris: fix module removal if firmware download failed",
                            "    - media: iris: vpu3x: Add MNoC low power handshake during hardware power-",
                            "      off",
                            "    - media: iris: Fix port streaming handling",
                            "    - media: iris: Fix buffer count reporting in internal buffer check",
                            "    - media: iris: Allow substate transition to load resources during output",
                            "      streaming",
                            "    - media: iris: Always destroy internal buffers on firmware release",
                            "      response",
                            "    - media: iris: Simplify session stop logic by relying on vb2 checks",
                            "    - media: iris: Update vbuf flags before v4l2_m2m_buf_done",
                            "    - media: iris: Send dummy buffer address for all codecs during drain",
                            "    - media: iris: Fix missing LAST flag handling during drain",
                            "    - media: iris: Fix format check for CAPTURE plane in try_fmt",
                            "    - media: iris: Allow stop on firmware only if start was issued.",
                            "    - ext4: add ext4_sb_bread_nofail() helper function for",
                            "      ext4_free_branches()",
                            "    - ext4: fail unaligned direct IO write with EINVAL",
                            "    - ext4: verify orphan file size is not too big",
                            "    - ext4: increase i_disksize to offset + len in",
                            "      ext4_update_disksize_before_punch()",
                            "    - ext4: correctly handle queries for metadata mappings",
                            "    - ext4: avoid potential buffer over-read in parse_apply_sb_mount_options()",
                            "    - ext4: fix an off-by-one issue during moving extents",
                            "    - ext4: guard against EA inode refcount underflow in xattr update",
                            "    - ext4: validate ea_ino and size in check_xattrs",
                            "    - ACPICA: Allow to skip Global Lock initialization",
                            "    - ext4: free orphan info with kvfree",
                            "    - ipmi: Fix handling of messages with provided receive message pointer",
                            "    - Squashfs: add additional inode sanity checking",
                            "    - Squashfs: reject negative file sizes in squashfs_read_inode()",
                            "    - mm/ksm: fix incorrect KSM counter handling in mm_struct during fork",
                            "    - media: mc: Clear minor number before put device",
                            "    - arm64: dts: qcom: qcs615: add missing dt property in QUP SEs",
                            "    - ACPI: property: Disregard references in data-only subnode lists",
                            "    - ACPI: property: Add code comments explaining what is going on",
                            "    - ACPI: property: Do not pass NULL handles to acpi_attach_data()",
                            "    - irqchip/sifive-plic: Avoid interrupt ID 0 handling during suspend/resume",
                            "    - copy_file_range: limit size if in compat mode",
                            "    - minixfs: Verify inode mode when loading from disk",
                            "    - pid: Add a judgment for ns null in pid_nr_ns",
                            "    - fs: Add 'initramfs_options' to set initramfs mount options",
                            "    - cramfs: Verify inode mode when loading from disk",
                            "    - nsfs: validate extensible ioctls",
                            "    - mnt_ns_tree_remove(): DTRT if mnt_ns had never been added to mnt_ns_list",
                            "    - writeback: Avoid softlockup when switching many inodes",
                            "    - writeback: Avoid excessively long inode switching times",
                            "    - iomap: error out on file IO when there is no inline_data buffer",
                            "    - pidfs: validate extensible ioctls",
                            "    - mount: handle NULL values in mnt_ns_release()",
                            "    - Linux 6.17.4",
                            "  * Questing update: v6.17.4 upstream stable release (LP: #2131259) // Race",
                            "    condition in perf build causes build failure due to missing unistd_64.h",
                            "    header on arm64 (LP: #2131702)",
                            "    - perf tools: Fix arm64 libjvmti build by generating unistd_64.h",
                            "  * Questing update: v6.17.3 upstream stable release (LP: #2129610)",
                            "    - arch: copy_thread: pass clone_flags as u64",
                            "    - filelock: add FL_RECLAIM to show_fl_flags() macro",
                            "    - init: INITRAMFS_PRESERVE_MTIME should depend on BLK_DEV_INITRD",
                            "    - pid: use ns_capable_noaudit() when determining net sysctl permissions",
                            "    - Fix CC_HAS_ASM_GOTO_OUTPUT on non-x86 architectures",
                            "    - [Config]: Update CC configs for v6.17.3",
                            "    - seccomp: Fix a race with WAIT_KILLABLE_RECV if the tracer replies too",
                            "      fast",
                            "    - kbuild: Add missing $(objtree) prefix to powerpc crtsavres.o artifact",
                            "    - selftests: arm64: Check fread return value in exec_target",
                            "    - selftests: arm64: Fix -Waddress warning in tpidr2 test",
                            "    - kselftest/arm64/gcs: Correctly check return value when disabling GCS",
                            "    - hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()",
                            "    - gfs2: Fix GLF_INVALIDATE_IN_PROGRESS flag clearing in do_xmote",
                            "    - gfs2: Remove space before newline",
                            "    - gfs2: Further sanitize lock_dlm.c",
                            "    - gfs2: Fix LM_FLAG_TRY* logic in add_to_queue",
                            "    - gfs2: Remove duplicate check in do_xmote",
                            "    - gfs2: Get rid of GLF_INVALIDATE_IN_PROGRESS",
                            "    - gfs2: do_xmote cleanup",
                            "    - gfs2: Add proper lockspace locking",
                            "    - powerpc/8xx: Remove left-over instruction and comments in",
                            "      DataStoreTLBMiss handler",
                            "    - powerpc/603: Really copy kernel PGD entries into all PGDIRs",
                            "    - powerpc/ftrace: ensure ftrace record ops are always set for NOPs",
                            "    - powerpc64/modules: correctly iterate over stubs in",
                            "      setup_ftrace_ool_stubs",
                            "    - uprobes: uprobe_warn should use passed task",
                            "    - raid6: riscv: Clean up unused header file inclusion",
                            "    - coresight: trbe: Prevent overflow in PERF_IDX2OFF()",
                            "    - perf: arm_spe: Prevent overflow in PERF_IDX2OFF()",
                            "    - erofs: avoid reading more for fragment maps",
                            "    - smb: client: fix sending the iwrap custom IRD/ORD negotiation messages",
                            "    - smb: server: fix IRD/ORD negotiation with the client",
                            "    - perf/x86/intel: Use early_initcall() to hook bts_init()",
                            "    - perf/x86/intel: Fix IA32_PMC_x_CFG_B MSRs access error",
                            "    - x86/vdso: Fix output operand size of RDPID",
                            "    - selftests: cgroup: Make test_pids backwards compatible",
                            "    - sched/fair: Get rid of sched_domains_curr_level hack for tl->cpumask()",
                            "    - [Config]: Update CONFIG_SCHED_MC for v6.17.3",
                            "    - lsm: CONFIG_LSM can depend on CONFIG_SECURITY",
                            "    - cpuset: fix failure to enable isolated partition when containing",
                            "      isolcpus",
                            "    - btrfs: return any hit error from extent_writepage_io()",
                            "    - btrfs: fix symbolic link reading when bs > ps",
                            "    - pinctrl: renesas: rzg2l: Fix invalid unsigned return in rzg3s_oen_read()",
                            "    - arm64: dts: renesas: rzg2lc-smarc: Disable CAN-FD channel0",
                            "    - bpf: Tidy verifier bug message",
                            "    - regmap: Remove superfluous check for !config in __regmap_init()",
                            "    - selftests/bpf: Copy test_kmods when installing selftest",
                            "    - rust: cpumask: Mark CpumaskVar as transparent",
                            "    - bpf/selftests: Fix test_tcpnotify_user",
                            "    - bpf: Remove migrate_disable in kprobe_multi_link_prog_run",
                            "    - libbpf: Fix reuse of DEVMAP",
                            "    - tools/nolibc: fix error return value of clock_nanosleep()",
                            "    - ARM: dts: renesas: porter: Fix CAN pin group",
                            "    - leds: max77705: Function return instead of variable assignment",
                            "    - leds: flash: leds-qcom-flash: Update torch current clamp setting",
                            "    - s390/bpf: Do not write tail call counter into helper and kfunc frames",
                            "    - s390/bpf: Write back tail call counter for BPF_PSEUDO_CALL",
                            "    - s390/bpf: Write back tail call counter for BPF_TRAMP_F_CALL_ORIG",
                            "    - cpufreq: scmi: Account for malformed DT in scmi_dev_used_by_cpus()",
                            "    - arm64: dts: renesas: sparrow-hawk: Invert microSD voltage selector on",
                            "      EVTB1",
                            "    - arm64: dts: renesas: sparrow-hawk: Set VDDQ18_25_AVB voltage on EVTB1",
                            "    - libbpf: Export bpf_object__prepare symbol",
                            "    - firmware: arm_scmi: Mark VirtIO ready before registering",
                            "      scmi_virtio_driver",
                            "    - arm64: dts: imx93-kontron: Fix GPIO for panel regulator",
                            "    - arm64: dts: imx93-kontron: Fix USB port assignment",
                            "    - arm64: dts: imx95: Correct the lpuart7 and lpuart8 srcid",
                            "    - bpf: Remove preempt_disable in bpf_try_get_buffers",
                            "    - ACPI: processor: idle: Fix memory leak when register cpuidle device",
                            "      failed",
                            "    - genirq: Add irq_chip_(startup/shutdown)_parent()",
                            "    - PCI/MSI: Add startup/shutdown for per device domains",
                            "    - irqchip/sg2042-msi: Fix broken affinity setting",
                            "    - scripts/misc-check: update export checks for EXPORT_SYMBOL_FOR_MODULES()",
                            "    - soc: qcom: rpmh-rsc: Unconditionally clear _TRIGGER bit for TCS",
                            "    - pinctrl: meson-gxl: add missing i2c_d pinmux",
                            "    - blk-mq: check kobject state_in_sysfs before deleting in",
                            "      blk_mq_unregister_hctx",
                            "    - selftests/futex: Remove the -g parameter from futex_priv_hash",
                            "    - ARM: at91: pm: fix MCKx restore routine",
                            "    - arm64: dts: apple: t8103-j457: Fix PCIe ethernet iommu-map",
                            "    - regulator: scmi: Use int type to store negative error codes",
                            "    - selftests/futex: Fix some futex_numa_mpol subtests",
                            "    - tools/nolibc: avoid error in dup2() if old fd equals new fd",
                            "    - selftests/nolibc: fix EXPECT_NZ macro",
                            "    - leds: leds-lp55xx: Use correct address for memory programming",
                            "    - PCI/MSI: Check MSI_FLAG_PCI_MSI_MASK_PARENT in",
                            "      cond_[startup|shutdown]_parent()",
                            "    - block: use int to store blk_stack_limits() return value",
                            "    - ARM: dts: stm32: stm32mp151c-plyaqm: Use correct dai-format property",
                            "    - dt-bindings: vendor-prefixes: Add undocumented vendor prefixes",
                            "    - genirq/test: Fix depth tests on architectures with NOREQUEST by default.",
                            "    - genirq/test: Select IRQ_DOMAIN",
                            "    - genirq/test: Depend on SPARSE_IRQ",
                            "    - genirq/test: Drop CONFIG_GENERIC_IRQ_MIGRATION assumptions",
                            "    - genirq/test: Ensure CPU 1 is online for hotplug test",
                            "    - selftests/bpf: Fix count write in testapp_xdp_metadata_copy()",
                            "    - vdso/datastore: Gate time data behind CONFIG_GENERIC_GETTIMEOFDAY",
                            "    - PM: sleep: core: Clear power.must_resume in noirq suspend error path",
                            "    - blk-mq: fix elevator depth_updated method",
                            "    - vdso: Add struct __kernel_old_timeval forward declaration to gettime.h",
                            "    - ARM: dts: ti: omap: am335x-baltos: Fix ti,en-ck32k-xtal property in DTS",
                            "      to use correct boolean syntax",
                            "    - ARM: dts: ti: omap: omap3-devkit8000-lcd: Fix ti,keep-vref-on property",
                            "      to use correct boolean syntax in DTS",
                            "    - ARM: dts: omap: am335x-cm-t335: Remove unused mcasp num-serializer",
                            "      property",
                            "    - PM / devfreq: mtk-cci: Fix potential error pointer dereference in",
                            "      probe()",
                            "    - power: supply: cw2015: Fix a alignment coding style issue",
                            "    - hwmon: (asus-ec-sensors) Narrow lock for X870E-CREATOR WIFI",
                            "    - pinctrl: renesas: Use int type to store negative error codes",
                            "    - pinctrl: eswin: Fix regulator error check and Kconfig dependency",
                            "    - null_blk: Fix the description of the cache_size module argument",
                            "    - blk-throttle: fix access race during throttle policy activation",
                            "    - selftests: vDSO: Fix -Wunitialized in powerpc VDSO_CALL() wrapper",
                            "    - selftests: vDSO: vdso_test_abi: Correctly skip whole test with missing",
                            "      vDSO",
                            "    - irqchip/gic-v5: Fix loop in gicv5_its_create_itt_two_level() cleanup",
                            "      path",
                            "    - irqchip/gic-v5: Fix error handling in gicv5_its_irq_domain_alloc()",
                            "    - tick: Do not set device to detached state in tick_shutdown()",
                            "    - arm64: dts: mediatek: mt8195: Remove suspend-breaking reset from pcie0",
                            "    - arm64: dts: mediatek: mt8183: Fix out of range pull values",
                            "    - nbd: restrict sockets to TCP and UDP",
                            "    - PM / devfreq: rockchip-dfi: double count on RK3588",
                            "    - firmware: firmware: meson-sm: fix compile-test default",
                            "    - dts: arm: amlogic: fix pwm node for c3",
                            "    - soc: mediatek: mtk-svs: fix device leaks on mt8183 probe failure",
                            "    - soc: mediatek: mtk-svs: fix device leaks on mt8192 probe failure",
                            "    - cpuidle: qcom-spm: fix device and OF node leaks at probe",
                            "    - block: cleanup bio_issue",
                            "    - block: initialize bio issue time in blk_mq_submit_bio()",
                            "    - block: factor out a helper bio_submit_split_bioset()",
                            "    - block: skip unnecessary checks for split bio",
                            "    - block: fix ordering of recursive split IO",
                            "    - blk-mq: remove useless checkings in blk_mq_update_nr_requests()",
                            "    - blk-mq: check invalid nr_requests in queue_requests_store()",
                            "    - blk-mq: convert to serialize updating nr_requests with",
                            "      update_nr_hwq_lock",
                            "    - blk-mq: cleanup shared tags case in blk_mq_update_nr_requests()",
                            "    - blk-mq: split bitmap grow and resize case in blk_mq_update_nr_requests()",
                            "    - blk-mq-sched: add new parameter nr_requests in blk_mq_alloc_sched_tags()",
                            "    - blk-mq: fix potential deadlock while nr_requests grown",
                            "    - arm64: dts: allwinner: a527: cubie-a5e: Add ethernet PHY reset setting",
                            "    - arm64: dts: allwinner: t527: avaota-a1: Add ethernet PHY reset setting",
                            "    - arm64: dts: rockchip: Add RTC on rk3576-evb1-v10",
                            "    - arm64: dts: rockchip: Add WiFi on rk3576-evb1-v10",
                            "    - arm64: dts: rockchip: Fix network on rk3576 evb1 board",
                            "    - arm64: dts: ti: k3-j742s2-mcu-wakeup: Override firmware-name for MCU R5F",
                            "      cores",
                            "    - arm64: dts: ti: k3: Rename rproc reserved-mem nodes to 'memory@addr'",
                            "    - Revert \"arm64: dts: ti: k3-j721e-sk: Fix reversed C6x carveout",
                            "      locations\"",
                            "    - Revert \"arm64: dts: ti: k3-j721e-beagleboneai64: Fix reversed C6x",
                            "      carveout locations\"",
                            "    - arm64: dts: mediatek: mt8188: Change efuse fallback compatible to mt8186",
                            "    - arm64: dts: mediatek: mt8186-tentacruel: Fix touchscreen model",
                            "    - arm64: dts: ti: k3-pinctrl: Fix the bug in existing macros",
                            "    - arm64: dts: renesas: r9a09g047e57-smarc: Fix gpio key's pin control node",
                            "    - arm64: dts: mediatek: mt6331: Fix pmic, regulators, rtc, keys node names",
                            "    - mmc: core: Fix variable shadowing in mmc_route_rpmb_frames()",
                            "    - arm64: dts: mediatek: mt6795-xperia-m5: Fix mmc0 latch-ck value",
                            "    - arm64: dts: mediatek: mt7986a: Fix PCI-Express T-PHY node address",
                            "    - arm64: dts: mediatek: mt8395-kontron-i1200: Fix MT6360 regulator nodes",
                            "    - arm64: dts: mediatek: mt8516-pumpkin: Fix machine compatible",
                            "    - arm64: dts: allwinner: a527: cubie-a5e: Add LEDs",
                            "    - arm64: dts: allwinner: a527: cubie-a5e: Drop external 32.768 KHz crystal",
                            "    - arm64: dts: allwinner: t527: avaota-a1: hook up external 32k crystal",
                            "    - arm64: dts: allwinner: t527: orangepi-4a: hook up external 32k crystal",
                            "    - pwm: tiehrpwm: Don't drop runtime PM reference in .free()",
                            "    - pwm: tiehrpwm: Make code comment in .free() more useful",
                            "    - pwm: tiehrpwm: Fix various off-by-one errors in duty-cycle calculation",
                            "    - pwm: tiehrpwm: Fix corner case in clock divisor calculation",
                            "    - ACPICA: Apply ACPI_NONSTRING",
                            "    - ACPICA: Fix largest possible resource descriptor index",
                            "    - riscv, bpf: Sign extend struct ops return values properly",
                            "    - nvme-auth: update bi_directional flag",
                            "    - nvmet-fc: move lsop put work to nvmet_fc_ls_req_op",
                            "    - nvmet-fcloop: call done callback even when remote port is gone",
                            "    - nvme-tcp: send only permitted commands for secure concat",
                            "    - i3c: master: svc: Use manual response for IBI events",
                            "    - i3c: master: svc: Recycle unused IBI slot",
                            "    - block: update validation of atomic writes boundary for stacked devices",
                            "    - block: fix stacking of atomic writes when atomics are not supported",
                            "    - selftests: watchdog: skip ping loop if WDIOF_KEEPALIVEPING not supported",
                            "    - selftests/kselftest_harness: Add harness-selftest.expected to TEST_FILES",
                            "    - blk-throttle: fix throtl_data leak during disk release",
                            "    - bpf: Explicitly check accesses to bpf_sock_addr",
                            "    - mmc: select REGMAP_MMIO with MMC_LOONGSON2",
                            "    - selftests/futex: Fix futex_wait() for 32bit ARM",
                            "    - selftest/futex: Make the error check more precise for futex_numa_mpol",
                            "    - selftest/futex: Compile also with libnuma < 2.0.16",
                            "    - bpf: dont report verifier bug for missing bpf_scc_visit on speculative",
                            "      path",
                            "    - bpf, arm64: Call bpf_jit_binary_pack_finalize() in bpf_jit_free()",
                            "    - arm64: dts: apple: t600x: Add missing WiFi properties",
                            "    - arm64: dts: apple: t600x: Add bluetooth device nodes",
                            "    - arm64: dts: apple: Add ethernet0 alias for J375 template",
                            "    - selftests: always install UAPI headers to the correct directory",
                            "    - smp: Fix up and expand the smp_call_function_many() kerneldoc",
                            "    - mfd: max77705: max77705_charger: move active discharge setting to mfd",
                            "      parent",
                            "    - power: supply: max77705_charger: refactoring: rename charger to chg",
                            "    - power: supply: max77705_charger: use regfields for config registers",
                            "    - power: supply: max77705_charger: rework interrupts",
                            "    - tools/nolibc: make time_t robust if __kernel_old_time_t is missing in",
                            "      host headers",
                            "    - spi: fix return code when spi device has too many chipselects",
                            "    - clocksource/drivers/timer-tegra186: Avoid 64-bit divide operation",
                            "    - clocksource/drivers/tegra186: Avoid 64-bit division",
                            "    - bpf: Mark kfuncs as __noclone",
                            "    - once: fix race by moving DO_ONCE to separate section",
                            "    - hwmon: (mlxreg-fan) Separate methods of fan setting coming from",
                            "      different subsystems",
                            "    - tools/nolibc: add stdbool.h to nolibc includes",
                            "    - thermal/drivers/qcom: Make LMH select QCOM_SCM",
                            "    - thermal/drivers/qcom/lmh: Add missing IRQ includes",
                            "    - i2c: mediatek: fix potential incorrect use of I2C_MASTER_WRRD",
                            "    - i2c: spacemit: ensure bus release check runs when wait_bus_idle() fails",
                            "    - i2c: spacemit: remove stop function to avoid bus error",
                            "    - i2c: spacemit: disable SDA glitch fix to avoid restart delay",
                            "    - i2c: spacemit: check SDA instead of SCL after bus reset",
                            "    - i2c: spacemit: ensure SDA is released after bus reset",
                            "    - i2c: designware: Fix clock issue when PM is disabled",
                            "    - i2c: designware: Add disabling clocks when probe fails",
                            "    - libbpf: Fix error when st-prefix_ops and ops from differ btf",
                            "    - bpf: Enforce expected_attach_type for tailcall compatibility",
                            "    - i3c: fix big-endian FIFO transfers",
                            "    - mfd: max77705: Setup the core driver as an interrupt controller",
                            "    - drm/sched: Fix a race in DRM_GPU_SCHED_STAT_NO_HANG test",
                            "    - drm/panel-edp: Add disable to 100ms for MNB601LS1-4",
                            "    - drm/display: bridge-connector: correct CEC bridge pointers in",
                            "      drm_bridge_connector_init",
                            "    - drm/panel-edp: Add 50ms disable delay for four panels",
                            "    - drm/vmwgfx: fix missing assignment to ts",
                            "    - drm/amd/display: Reduce Stack Usage by moving 'audio_output' into",
                            "      'stream_res' v4",
                            "    - drm/panel: novatek-nt35560: Fix invalid return value",
                            "    - drm/amdgpu: fix link error for !PM_SLEEP",
                            "    - drm/amdgpu: Fix jpeg v4.0.3 poison irq call trace on sriov guest",
                            "    - drm/amdgpu: Fix vcn v4.0.3 poison irq call trace on sriov guest",
                            "    - PCI: endpoint: pci-ep-msi: Fix NULL vs IS_ERR() check in",
                            "      pci_epf_write_msi_msg()",
                            "    - PCI: xgene-msi: Return negative -EINVAL in xgene_msi_handler_setup()",
                            "    - drm/radeon/r600_cs: clean up of dead code in r600_cs",
                            "    - f2fs: fix condition in __allow_reserved_blocks()",
                            "    - f2fs: fix to avoid overflow while left shift operation",
                            "    - f2fs: fix to zero data after EOF for compressed file correctly",
                            "    - drm/bridge: it6505: select REGMAP_I2C",
                            "    - wifi: rtw88: Lock rtwdev->mutex before setting the LED",
                            "    - HID: steelseries: refactor probe() and remove()",
                            "    - media: zoran: Remove zoran_fh structure",
                            "    - phy: rockchip: naneng-combphy: Enable U3 OTG port for RK3568",
                            "    - drm/bridge: cdns-dsi: Fix the _atomic_check()",
                            "    - usb: host: max3421-hcd: Fix error pointer dereference in probe cleanup",
                            "    - usb: misc: qcom_eud: Access EUD_MODE_MANAGER2 through secure calls",
                            "    - PCI/pwrctrl: Fix double cleanup on devm_add_action_or_reset() failure",
                            "    - misc: pci_endpoint_test: Fix array underflow in",
                            "      pci_endpoint_test_ioctl()",
                            "    - serial: max310x: Add error checking in probe()",
                            "    - drm/amd/display: Remove redundant semicolons",
                            "    - drm/amd/display: Add NULL pointer checks in dc_stream cursor attribute",
                            "      functions",
                            "    - crypto: keembay - Add missing check after sg_nents_for_len()",
                            "    - hwrng: nomadik - add ARM_AMBA dependency",
                            "    - docs: iio: ad3552r: Fix malformed code-block directive",
                            "    - fwctl/mlx5: Fix memory alloc/free in mlx5ctl_fw_rpc()",
                            "    - scsi: pm80xx: Restore support for expanders",
                            "    - scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod",
                            "    - scsi: libsas: Add dev_parent_is_expander() helper",
                            "    - scsi: pm80xx: Use dev_parent_is_expander() helper",
                            "    - scsi: pm80xx: Add helper function to get the local phy id",
                            "    - scsi: pm80xx: Fix pm8001_abort_task() for chip_8006 when using an",
                            "      expander",
                            "    - mptcp: Fix up subflow's memcg when CONFIG_SOCK_CGROUP_DATA=n.",
                            "    - scsi: myrs: Fix dma_alloc_coherent() error check",
                            "    - f2fs: fix to clear unusable_cap for checkpoint=enable",
                            "    - f2fs: fix to avoid NULL pointer dereference in",
                            "      f2fs_check_quota_consistency()",
                            "    - f2fs: fix to allow removing qf_name",
                            "    - Revert \"UBUNTU: SAUCE: drm/dp: drm_edp_backlight_set_level: do not",
                            "      always send 3-byte commands\"",
                            "    - drm/dp: drm_edp_backlight_set_level: do not always send 3-byte commands",
                            "    - crypto: octeontx2 - Call strscpy() with correct size argument",
                            "    - drm: re-allow no-op changes on non-primary planes in async flips",
                            "    - media: rj54n1cb0c: Fix memleak in rj54n1_probe()",
                            "    - media: staging/ipu7: convert to use pci_alloc_irq_vectors() API",
                            "    - media: staging/ipu7: Don't set name for IPU7 PCI device",
                            "    - media: staging/ipu7: cleanup the MMU correctly in IPU7 driver release",
                            "    - media: i2c: vd55g1: Fix duster register address",
                            "    - drm/panel: Allow powering on panel follower after panel is enabled",
                            "    - HID: i2c-hid: Make elan touch controllers power on after panel is",
                            "      enabled",
                            "    - RDMA/mlx5: Better estimate max_qp_wr to reflect WQE count",
                            "    - RDMA/mlx5: Fix vport loopback forcing for MPV device",
                            "    - wifi: rtw88: Use led->brightness_set_blocking for PCI too",
                            "    - net: phy: introduce phy_id_compare_vendor() PHY ID helper",
                            "    - net: phy: as21xxx: better handle PHY HW reset on soft-reboot",
                            "    - PCI: rcar-host: Pass proper IRQ domain to generic_handle_domain_irq()",
                            "    - fuse: remove unneeded offset assignment when filling write pages",
                            "    - PCI: qcom: Restrict port parsing only to PCIe bridge child nodes",
                            "    - cdx: don't select CONFIG_GENERIC_MSI_IRQ",
                            "    - PCI/ACPI: Fix pci_acpi_preserve_config() memory leak",
                            "    - HID: i2c-hid: Fix test in i2c_hid_core_register_panel_follower()",
                            "    - ALSA: lx_core: use int type to store negative error codes",
                            "    - media: st-delta: avoid excessive stack usage",
                            "    - drm/amdgpu/vcn: Add regdump helper functions",
                            "    - drm/amdgpu/vcn: Hold pg_lock before vcn power off",
                            "    - drm/amdgpu: Check vcn state before profile switch",
                            "    - accel/amdxdna: Use int instead of u32 to store error codes",
                            "    - efi: Explain OVMF acronym in OVMF_DEBUG_LOG help text",
                            "    - net: dst: introduce dst->dev_rcu",
                            "    - ipv6: mcast: Add ip6_mc_find_idev() helper",
                            "    - ipv6: start using dst_dev_rcu()",
                            "    - ipv6: use RCU in ip6_xmit()",
                            "    - ipv6: use RCU in ip6_output()",
                            "    - net: use dst_dev_rcu() in sk_setup_caps()",
                            "    - tcp_metrics: use dst_dev_net_rcu()",
                            "    - ipv4: start using dst_dev_rcu()",
                            "    - crypto: hisilicon/zip - remove unnecessary validation for high-",
                            "      performance mode configurations",
                            "    - crypto: hisilicon - re-enable address prefetch after device resuming",
                            "    - crypto: hisilicon - check the sva module status while enabling or",
                            "      disabling address prefetch",
                            "    - crypto: hisilicon/qm - check whether the input function and PF are on",
                            "      the same device",
                            "    - crypto: hisilicon/qm - request reserved interrupt for virtual function",
                            "    - inet: ping: check sock_net() in ping_get_port() and ping_lookup()",
                            "    - dmaengine: Fix dma_async_tx_descriptor->tx_submit documentation",
                            "    - coresight: trbe: Add ISB after TRBLIMITR write",
                            "    - coresight: Fix missing include for FIELD_GET",
                            "    - coresight: Only register perf symlink for sinks with alloc_buffer",
                            "    - drm/amdgpu: Power up UVD 3 for FW validation (v2)",
                            "    - drm/amd/pm: Disable ULV even if unsupported (v3)",
                            "    - drm/amd/pm: Fix si_upload_smc_data (v3)",
                            "    - drm/amd/pm: Adjust si_upload_smc_data register programming (v3)",
                            "    - drm/amd/pm: Treat zero vblank time as too short in si_dpm (v3)",
                            "    - drm/amd/pm: Disable MCLK switching with non-DC at 120 Hz+ (v2)",
                            "    - drm/amd/pm: Disable SCLK switching on Oland with high pixel clocks (v3)",
                            "    - wifi: mac80211: Make CONNECTION_MONITOR optional for MLO sta",
                            "    - wifi: mwifiex: send world regulatory domain to driver",
                            "    - wifi: brcmfmac: fix 43752 SDIO FWVID incorrectly labelled as Cypress",
                            "      (CYW)",
                            "    - drm/msm: Do not validate SSPP when it is not ready",
                            "    - PCI: tegra: Fix devm_kcalloc() argument order for port->phys allocation",
                            "    - wifi: mac80211: consider links for validating SCAN_FLAG_AP in scan",
                            "      request during MLO",
                            "    - PCI: qcom: Add equalization settings for 8.0 GT/s and 32.0 GT/s",
                            "    - tcp: fix __tcp_close() to only send RST when required",
                            "    - fanotify: Validate the return value of mnt_ns_from_dentry() before",
                            "      dereferencing",
                            "    - drm/amdkfd: Fix error code sign for EINVAL in svm_ioctl()",
                            "    - usb: phy: twl6030: Fix incorrect type for ret",
                            "    - usb: gadget: configfs: Correctly set use_os_string at bind",
                            "    - tty: n_gsm: Don't block input queue by waiting MSC",
                            "    - misc: genwqe: Fix incorrect cmd field being reported in error",
                            "    - pps: fix warning in pps_register_cdev when register device fail",
                            "    - drm/msm: Fix obj leak in VM_BIND error path",
                            "    - drm/msm: Fix missing VM_BIND offset/range validation",
                            "    - wifi: iwlwifi: Remove redundant header files",
                            "    - drm/msm/mdp4: stop supporting no-IOMMU configuration",
                            "    - drm/msm: stop supporting no-IOMMU configuration",
                            "    - idpf: fix Rx descriptor ready check barrier in splitq",
                            "    - ASoC: Intel: bytcht_es8316: Fix invalid quirk input mapping",
                            "    - ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping",
                            "    - ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping",
                            "    - ipv6: snmp: do not use SNMP_MIB_SENTINEL anymore",
                            "    - ipv6: snmp: do not track per idev ICMP6_MIB_RATELIMITHOST",
                            "    - drm/msm: Fix bootup splat with separate_gpu_drm modparam",
                            "    - drm/msm/dpu: fix incorrect type for ret",
                            "    - wifi: mac80211: fix reporting of all valid links in sta_set_sinfo()",
                            "    - fs: ntfs3: Fix integer overflow in run_unpack()",
                            "    - fs/ntfs3: reject index allocation if $BITMAP is empty but blocks exist",
                            "    - iio: consumers: Fix handling of negative channel scale in",
                            "      iio_convert_raw_to_processed()",
                            "    - iio: consumers: Fix offset handling in iio_convert_raw_to_processed()",
                            "    - mm/slub: Fix cmp_loc_by_count() to return 0 when counts are equal",
                            "    - tools: ynl: fix undefined variable name",
                            "    - RDMA/mlx5: Fix page size bitmap calculation for KSM mode",
                            "    - netfilter: ipset: Remove unused htable_bits in macro ahash_region",
                            "    - ipvs: Use READ_ONCE/WRITE_ONCE for ipvs->enable",
                            "    - HID: steelseries: Fix STEELSERIES_SRWS1 handling in steelseries_remove()",
                            "    - watchdog: intel_oc_wdt: Do not try to write into const memory",
                            "    - watchdog: mpc8xxx_wdt: Reload the watchdog timer when enabling the",
                            "      watchdog",
                            "    - PCI: endpoint: pci-epf-test: Fix doorbell test support",
                            "    - drivers/base/node: handle error properly in register_one_node()",
                            "    - RDMA/cm: Rate limit destroy CM ID timeout error message",
                            "    - wifi: mt76: mt7996: Fix mt7996_mcu_sta_ba wcid configuration",
                            "    - wifi: mt76: mt7996: Fix mt7996_mcu_bss_mld_tlv routine",
                            "    - wifi: mt76: fix potential memory leak in mt76_wmac_probe()",
                            "    - wifi: mt76: mt7996: Use proper link_id in link_sta_rc_update callback",
                            "    - wifi: mt76: mt7996: Check phy before init msta_link in",
                            "      mt7996_mac_sta_add_links()",
                            "    - wifi: mt76: mt7996: Fix tx-queues initialization for second phy on",
                            "      mt7996",
                            "    - wifi: mt76: mt7996: Fix RX packets configuration for primary WED device",
                            "    - wifi: mt76: mt7996: Convert mt7996_wed_rro_addr to LE",
                            "    - wifi: mt76: mt7915: fix mt7981 pre-calibration",
                            "    - wifi: mt76: mt7996: remove redundant per-phy mac80211 calls during",
                            "      restart",
                            "    - ASoC: Intel: hda-sdw-bpt: set persistent_buffer false",
                            "    - srcu/tiny: Remove preempt_disable/enable() in srcu_gp_start_if_needed()",
                            "    - drm/amdgpu: Fix allocating extra dwords for rings (v2)",
                            "    - f2fs: fix to update map->m_next_extent correctly in f2fs_map_blocks()",
                            "    - f2fs: fix to truncate first page in error path of f2fs_truncate()",
                            "    - f2fs: fix to avoid migrating empty section",
                            "    - f2fs: fix to mitigate overhead of f2fs_zero_post_eof_page()",
                            "    - RISC-V: KVM: Write hgatp register with valid mode bits",
                            "    - ALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on",
                            "      PREEMPT_RT",
                            "    - ACPI: NFIT: Fix incorrect ndr_desc being reportedin dev_err message",
                            "    - scsi: qla2xxx: edif: Fix incorrect sign of error code",
                            "    - scsi: qla2xxx: Fix incorrect sign of error code in START_SP_W_RETRIES()",
                            "    - scsi: qla2xxx: Fix incorrect sign of error code in qla_nvme_xmt_ls_rsp()",
                            "    - HID: hidraw: tighten ioctl command parsing",
                            "    - f2fs: fix zero-sized extent for precache extents",
                            "    - smc: Fix use-after-free in __pnet_find_base_ndev().",
                            "    - smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().",
                            "    - smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().",
                            "    - smc: Use __sk_dst_get() and dst_dev_rcu() in smc_vlan_by_tcpsk().",
                            "    - tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().",
                            "    - mptcp: Call dst_release() in mptcp_active_enable().",
                            "    - mptcp: Use __sk_dst_get() and dst_dev_rcu() in mptcp_active_enable().",
                            "    - Revert \"usb: xhci: Avoid Stop Endpoint retry loop if the endpoint seems",
                            "      Running\"",
                            "    - RDMA/core: Resolve MAC of next-hop device without ARP support",
                            "    - IB/sa: Fix sa_local_svc_timeout_ms read race",
                            "    - Documentation: trace: historgram-design: Separate sched_waking histogram",
                            "      section heading and the following diagram",
                            "    - ASoC: SOF: ipc4-pcm: Fix incorrect comparison with number of tdm_slots",
                            "    - wifi: ath12k: initialize eirp_power before use",
                            "    - wifi: ath12k: fix overflow warning on num_pwr_levels",
                            "    - wifi: ath12k: fix signal in radiotap for WCN7850",
                            "    - wifi: ath12k: fix HAL_PHYRX_COMMON_USER_INFO handling in monitor mode",
                            "    - wifi: ath12k: fix the fetching of combined rssi",
                            "    - wifi: ath12k: Add fallback for invalid channel number in PHY metadata",
                            "    - wifi: ath12k: fix wrong logging ID used for CE",
                            "    - wifi: ath10k: avoid unnecessary wait for service ready message",
                            "    - iommu/vt-d: debugfs: Fix legacy mode page table dump logic",
                            "    - wifi: mac80211: fix Rx packet handling when pubsta information is not",
                            "      available",
                            "    - ASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback",
                            "    - sparc: fix accurate exception reporting in copy_{from_to}_user for",
                            "      UltraSPARC",
                            "    - sparc: fix accurate exception reporting in copy_{from_to}_user for",
                            "      UltraSPARC III",
                            "    - sparc: fix accurate exception reporting in copy_{from_to}_user for",
                            "      Niagara",
                            "    - sparc: fix accurate exception reporting in copy_to_user for Niagara 4",
                            "    - sparc: fix accurate exception reporting in copy_{from,to}_user for M7",
                            "    - vfio/pds: replace bitmap_free with vfree",
                            "    - crypto: comp - Use same definition of context alloc and free ops",
                            "    - crypto: hisilicon/qm - set NULL to qm->debug.qm_diff_regs",
                            "    - wifi: ath12k: Fix peer lookup in ath12k_dp_mon_rx_deliver_msdu()",
                            "    - rpmsg: qcom_smd: Fix fallback to qcom,ipc parse",
                            "    - remoteproc: qcom_q6v5_mss: support loading MBN file on msm8974",
                            "    - RDMA/rxe: Fix race in do_task() when draining",
                            "    - selftests/mm: fix va_high_addr_switch.sh failure on x86_64",
                            "    - wifi: rtw89: fix leak in rtw89_core_send_nullfunc()",
                            "    - wifi: rtw89: avoid circular locking dependency in ser_state_run()",
                            "    - PCI: tegra194: Fix duplicate PLL disable in",
                            "      pex_ep_event_pex_rst_assert()",
                            "    - remoteproc: qcom: q6v5: Avoid disabling handover IRQ twice",
                            "    - remoteproc: qcom: pas: Shutdown lite ADSP DTB on X1E",
                            "    - wifi: ath12k: Refactor RX TID deletion handling into helper function",
                            "    - wifi: ath12k: Fix flush cache failure during RX queue update",
                            "    - wifi: cfg80211: fix width unit in cfg80211_radio_chandef_valid()",
                            "    - dm vdo: return error on corrupted metadata in start_restoring_volume",
                            "      functions",
                            "    - coresight: fix indentation error in cscfg_remove_owned_csdev_configs()",
                            "    - coresight-etm4x: Conditionally access register TRCEXTINSELR",
                            "    - coresight: tmc: Support atclk",
                            "    - coresight: catu: Support atclk",
                            "    - coresight: etm4x: Support atclk",
                            "    - coresight: Appropriately disable programming clocks",
                            "    - coresight: Appropriately disable trace bus clocks",
                            "    - coresight: Avoid enable programming clock duplicately",
                            "    - coresight: trbe: Return NULL pointer for allocation failures",
                            "    - coresight: tpda: fix the logic to setup the element size",
                            "    - coresight: Fix incorrect handling for return value of devm_kzalloc",
                            "    - NFSv4.1: fix backchannel max_resp_sz verification check",
                            "    - net: ethtool: tsconfig: set command must provide a reply",
                            "    - netfilter: nfnetlink: reset nlh pointer during batch replay",
                            "    - netfilter: nf_conntrack: do not skip entries in /proc/net/nf_conntrack",
                            "    - scsi: ufs: core: Fix data race in CPU latency PM QoS request handling",
                            "    - scsi: mpt3sas: Fix crash in transport port remove by using ioc_info()",
                            "    - usb: vhci-hcd: Prevent suspending virtually attached devices",
                            "    - PCI: rcar-gen4: Add missing 1ms delay after PWR reset assertion",
                            "    - PCI: rcar-gen4: Assure reset occurs before DBI access",
                            "    - PCI: rcar-gen4: Fix inverted break condition in PHY initialization",
                            "    - ASoC: qcom: sc8280xp: use sa8775p/ subdir for QCS9100 / QCS9075",
                            "    - iommu/vt-d: Disallow dirty tracking if incoherent page walk",
                            "    - iommu/selftest: prevent use of uninitialized variable",
                            "    - RDMA/siw: Always report immediate post SQ errors",
                            "    - net: enetc: Fix probing error message typo for the ENETCv4 PF driver",
                            "    - net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast",
                            "    - ptp: Add a upper bound on max_vclocks",
                            "    - vhost: vringh: Fix copy_to_iter return value check",
                            "    - net: macb: remove illusion about TBQPH/RBQPH being per-queue",
                            "    - net: macb: move ring size computation to functions",
                            "    - net: macb: single dma_alloc_coherent() for DMA descriptors",
                            "    - Bluetooth: btintel_pcie: Refactor Device Coredump",
                            "    - Bluetooth: MGMT: Fix not exposing debug UUID on",
                            "      MGMT_OP_READ_EXP_FEATURES_INFO",
                            "    - Bluetooth: ISO: Fix possible UAF on iso_conn_free",
                            "    - Bluetooth: ISO: free rx_skb if not consumed",
                            "    - Bluetooth: ISO: don't leak skb in ISO_CONT RX",
                            "    - Bluetooth: hci_sync: Fix using random address for BIG/PA advertisements",
                            "    - KEYS: X.509: Fix Basic Constraints CA flag parsing",
                            "    - hwrng: ks-sa - fix division by zero in ks_sa_rng_init",
                            "    - cramfs: fix incorrect physical page address calculation",
                            "    - ocfs2: fix double free in user_cluster_connect()",
                            "    - drivers/base/node: fix double free in register_one_node()",
                            "    - f2fs: fix UAF issue in f2fs_merge_page_bio()",
                            "    - mtd: rawnand: atmel: Fix error handling path in",
                            "      atmel_nand_controller_add_nands",
                            "    - PCI: j721e: Fix incorrect error message in probe()",
                            "    - idpf: fix mismatched free function for dma_alloc_coherent",
                            "    - tcp: use skb->len instead of skb->truesize in tcp_can_ingest()",
                            "    - nfp: fix RSS hash key size when RSS is not supported",
                            "    - net: ena: return 0 in ena_get_rxfh_key_size() when RSS hash key is not",
                            "      configurable",
                            "    - net: dlink: handle copy_thresh allocation failure",
                            "    - net/mlx5: Stop polling for command response if interface goes down",
                            "    - net/mlx5: pagealloc: Fix reclaim race during command interface teardown",
                            "    - net/mlx5: fw reset, add reset timeout work",
                            "    - smb: client: fix crypto buffers in non-linear memory",
                            "    - bonding: fix xfrm offload feature setup on active-backup mode",
                            "    - net: enetc: initialize SW PIR and CIR based HW PIR and CIR values",
                            "    - iommufd: Register iommufd mock devices with fwspec",
                            "    - Revert \"net/mlx5e: Update and set Xon/Xoff upon MTU set\"",
                            "    - NFSD: filecache: add STATX_DIOALIGN and STATX_DIO_READ_ALIGN support",
                            "    - nfs/localio: avoid issuing misaligned IO using O_DIRECT",
                            "    - octeontx2-vf: fix bitmap leak",
                            "    - octeontx2-pf: fix bitmap leak",
                            "    - vhost: vringh: Modify the return value check",
                            "    - selftests/bpf: Fix typos and grammar in test sources",
                            "    - selftests/bpf: move get_ksyms and get_addrs to trace_helpers.c",
                            "    - selftests/bpf: Fix realloc size in bpf_get_addrs",
                            "    - bpf: Skip scalar adjustment for BPF_NEG if dst is a pointer",
                            "    - bpf: Reject negative offsets for ALU ops",
                            "    - tpm: Disable TPM2_TCG_HMAC by default",
                            "    - ALSA: hda/hdmi: Add pin fix for HP ProDesk model",
                            "    - ALSA: hda/realtek: Add quirk for HP Spectre 14t-ea100",
                            "    - Squashfs: fix uninit-value in squashfs_get_parent",
                            "    - uio_hv_generic: Let userspace take care of interrupt mask",
                            "    - hisi_acc_vfio_pci: Fix reference leak in hisi_acc_vfio_debug_init",
                            "    - io_uring/waitid: always prune wait queue entry in io_waitid_wait()",
                            "    - io_uring/zcrx: fix overshooting recv limit",
                            "    - ASoC: wcd934x: fix error handling in wcd934x_codec_parse_data()",
                            "    - ASoC: SOF: ipc3-topology: Fix multi-core and static pipelines tear down",
                            "    - ASoC: codecs: wcd937x: set the comp soundwire port correctly",
                            "    - ASoC: codecs: wcd937x: make stub functions inline",
                            "    - ASoC: SOF: ipc4-pcm: fix delay calculation when DSP resamples",
                            "    - ASoC: SOF: ipc4-pcm: fix start offset calculation for chain DMA",
                            "    - fs: udf: fix OOB read in lengthAllocDescs handling",
                            "    - net: nfc: nci: Add parameter validation for packet data",
                            "    - mfd: rz-mtu3: Fix MTU5 NFCR register offset",
                            "    - mfd: intel_soc_pmic_chtdc_ti: Set use_single_read regmap_config flag",
                            "    - mfd: vexpress-sysreg: Check the return value of devm_gpiochip_add_data()",
                            "    - tracing: Fix lock imbalance in s_start() memory allocation failure path",
                            "    - tracing: Fix race condition in kprobe initialization causing NULL",
                            "      pointer dereference",
                            "    - tracing: Fix wakeup tracers on failure of acquiring calltime",
                            "    - tracing: Fix irqoff tracers on failure of acquiring calltime",
                            "    - tracing: Have trace_marker use per-cpu data to read user space",
                            "    - tracing: Fix tracing_mark_raw_write() to use buf and not ubuf",
                            "    - tracing: Stop fortify-string from warning in tracing_mark_raw_write()",
                            "    - dm: fix queue start/stop imbalance under suspend/load/resume races",
                            "    - dm: fix NULL pointer dereference in __dm_suspend()",
                            "    - LoongArch: Automatically disable kaslr if boot from kexec_file",
                            "    - pwm: loongson: Fix LOONGSON_PWM_FREQ_DEFAULT",
                            "    - LoongArch: BPF: Sign-extend struct ops return values properly",
                            "    - LoongArch: BPF: No support of struct argument in trampoline programs",
                            "    - LoongArch: BPF: Don't align trampoline size",
                            "    - LoongArch: BPF: Make trampoline size stable",
                            "    - LoongArch: BPF: Make error handling robust in",
                            "      arch_prepare_bpf_trampoline()",
                            "    - LoongArch: BPF: Remove duplicated bpf_flush_icache()",
                            "    - LoongArch: BPF: No text_poke() for kernel text",
                            "    - LoongArch: BPF: Remove duplicated flags check",
                            "    - LoongArch: BPF: Fix uninitialized symbol 'retval_off'",
                            "    - mm/ksm: fix flag-dropping behavior in ksm_madvise",
                            "    - ksmbd: Fix race condition in RPC handle list access",
                            "    - ksmbd: fix error code overwriting in smb2_get_info_filesystem()",
                            "    - ksmbd: add max ip connections parameter",
                            "    - ext4: fix potential null deref in ext4_mb_init()",
                            "    - ext4: fix checks for orphan inodes",
                            "    - KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn't valid",
                            "    - fbdev: simplefb: Fix use after free in simplefb_detach_genpds()",
                            "    - mm: hugetlb: avoid soft lockup when mprotect to large memory area",
                            "    - selftests/mm: skip soft-dirty tests when CONFIG_MEM_SOFT_DIRTY is",
                            "      disabled",
                            "    - nvdimm: ndtest: Return -ENOMEM if devm_kcalloc() fails in ndtest_probe()",
                            "    - misc: fastrpc: Save actual DMA size in fastrpc_map structure",
                            "    - misc: fastrpc: Fix fastrpc_map_lookup operation",
                            "    - misc: fastrpc: fix possible map leak in fastrpc_put_args",
                            "    - misc: fastrpc: Skip reference for DMA handles",
                            "    - Input: atmel_mxt_ts - allow reset GPIO to sleep",
                            "    - Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info",
                            "      leak",
                            "    - sunrpc: fix null pointer dereference on zero-length checksum",
                            "    - PCI/AER: Avoid NULL pointer dereference in aer_ratelimit()",
                            "    - remoteproc: pru: Fix potential NULL pointer dereference in",
                            "      pru_rproc_set_ctable()",
                            "    - PCI: endpoint: pci-epf-test: Add NULL check for DMA channels before",
                            "      release",
                            "    - thunderbolt: Fix use-after-free in tb_dp_dprx_work",
                            "    - tee: fix register_shm_helper()",
                            "    - pinctrl: check the return value of pinmux_ops::get_function_name()",
                            "    - bus: fsl-mc: Check return value of platform_get_resource()",
                            "    - net/9p: Fix buffer overflow in USB transport layer",
                            "    - net: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock",
                            "    - usb: typec: tipd: Clear interrupts first",
                            "    - arm64: dts: qcom: qcm2290: Disable USB SS bus instances in park mode",
                            "    - usb: cdns3: cdnsp-pci: remove redundant pci_disable_device() call",
                            "    - scsi: ufs: core: Fix PM QoS mutex initialization",
                            "    - drm/amdgpu/vcn: Fix double-free of vcn dump buffer",
                            "    - Linux 6.17.3",
                            "  * CVE-2025-40019",
                            "    - crypto: essiv - Check ssize for decryption and in-place encryption",
                            "  * CVE-2025-40214",
                            "    - af_unix: Initialise scc_index in unix_add_edge().",
                            "  * Miscellaneous Ubuntu changes",
                            "    - [SAUCE] Fix selftest/net/rtnetlink.sh for Big Endian",
                            "",
                            "  [ Ubuntu-riscv: 6.17.0-12.12.1 ]",
                            "",
                            "  * questing/linux-riscv: 6.17.0-12.12.1 -proposed tracker (LP: #2138113)",
                            "  [ Ubuntu: 6.17.0-12.12 ]",
                            "  * questing/linux: 6.17.0-12.12 -proposed tracker (LP: #2138115)",
                            "  * CVE-2025-40019",
                            "    - crypto: essiv - Check ssize for decryption and in-place encryption",
                            "  * CVE-2025-40214",
                            "    - af_unix: Initialise scc_index in unix_add_edge().",
                            ""
                        ],
                        "package": "linux-riscv-6.17",
                        "version": "6.17.0-14.14.1~24.04.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2137844,
                            2013232,
                            2074082,
                            2137845,
                            1786013,
                            2137849,
                            1786013,
                            2136820,
                            2137698,
                            2129812,
                            2125022,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136850,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136833,
                            2136813,
                            2132317,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2134982,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2133557,
                            2132095,
                            2131046,
                            2115860,
                            2128792,
                            2121852,
                            2131259,
                            2131259,
                            2131702,
                            2129610,
                            2138113,
                            2138115
                        ],
                        "author": "Emil Renner Berthing <emil.renner.berthing@canonical.com>",
                        "date": "Tue, 27 Jan 2026 20:04:21 +0100"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * noble/linux-riscv-6.17: 6.17.0-9.9.1~24.04.1 -proposed tracker (LP: #2133507)",
                            "",
                            "  * Enable Nezha board (LP: #1975592)",
                            "    - SAUCE: mmc: pwrseq_simple: always fall back to GPIO based reset control",
                            "    - SAUCE: nvmem: core: update cell->bytes after shifting bits",
                            "    - SAUCE: dt-bindings: pwm: Add binding for Allwinner D1/T113-S3/R329 PWM",
                            "      controller",
                            "    - SAUCE: pwm: Add Allwinner's D1/T113-S3/R329 SoCs PWM support",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add pwm node",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add PWM pins",
                            "    - SAUCE: mmc: sunxi-mmc: Correct the maximum segment size",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add misc nodes",
                            "    - SAUCE: riscv: dts: allwinner: Keep aldo regulator on",
                            "    - SAUCE: riscv: dts: allwinner: Add button on the Nezha board",
                            "    - SAUCE: riscv: dts: allwinner: Add button on the Lichee RV Dock",
                            "    - SAUCE: regulator: dt-bindings: Add Allwinner D1 LDOs",
                            "    - SAUCE: regulator: sun20i: Add support for Allwinner D1 analog LDOs",
                            "    - SAUCE: regulator: sun20i: Use device_node_to_regmap()",
                            "    - SAUCE: dt-bindings: thermal: sun8i: Add compatible for D1",
                            "    - SAUCE: thermal: sun8i: Set the event type for new samples",
                            "    - SAUCE: thermal: sun8i: Ensure vref is powered",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add thermal sensor and zone",
                            "    - SAUCE: riscv: dts: allwinner: d1: Hook up PWM-controlled CPU voltage",
                            "      regulators",
                            "    - SAUCE: drm/sun4i: dsi: Allow panel attach before card registration",
                            "    - SAUCE: drm/sun4i: mixer: Remove unused CMA headers",
                            "    - SAUCE: drm/sun4i: tcon: Always protect the LCD dotclock rate",
                            "    - SAUCE: drm/sun4i: tcon_top: Register reset, clock gates in probe",
                            "    - SAUCE: riscv: dts: allwinner: lichee-rv-86-panel-480p: Add panel",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add HDMI pipeline",
                            "    - SAUCE: riscv: dts: allwinner: d1: Enable HDMI on supported boards",
                            "    - SAUCE: dt-bindings: display: sun4i-tcon: Add external LVDS PHY",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add LVDS0 PHY",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add LED controller node",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add RGB LEDs to boards",
                            "    - SAUCE: ASoC: sun20i-codec: New driver for D1 internal codec",
                            "    - SAUCE: [WIP] ASoC: sun20i-codec: What is this ramp thing?",
                            "    - SAUCE: riscv: dts: allwinner: d1: Add sound cards to boards",
                            "    - SAUCE: dt-bindings: display: sun8i-a83t-dw-hdmi: Remove #phy-cells",
                            "    - SAUCE: dt-bindings: display: Add D1 HDMI compatibles",
                            "    - SAUCE: drm/sun4i: Add support for D1 HDMI",
                            "    - SAUCE: drm/sun4i: sun8i-hdmi-phy: Add support for D1 PHY",
                            "    - SAUCE: [HACK] drm/sun4i: Copy in BSP code for D1 HDMI PHY",
                            "    - SAUCE: riscv: dts: allwinner: Add Nezha and Lichee RV SPI nodes",
                            "    - SAUCE: dt-bindings: display: Add Sitronix ST7701s panel binding",
                            "    - SAUCE: drm/panel: Add driver for ST7701s DPI LCD panel",
                            "    - [Config] riscv: updateconfigs for D1 support",
                            "",
                            "  * Enable StarFive VisionFive 2 board (LP: #2013232)",
                            "    - SAUCE: PCI: starfive: Offload the NVMe timeout workaround to host",
                            "      drivers.",
                            "    - SAUCE: pwm: opencores: Add PWM driver support",
                            "    - riscv: dts: starfive: jh7110-common: drop no-sdio property from mmc1",
                            "    - dt-bindings: memory-controllers: add StarFive JH7110 SoC DMC",
                            "    - riscv: dts: starfive: jh7110: add DMC memory controller",
                            "    - riscv: dts: starfive: jh7110: bootph-pre-ram hinting needed by boot",
                            "      loader",
                            "    - riscv: dts: starfive: jh7110-common: drop no-mmc property from mmc1",
                            "    - riscv: dts: starfive: jh7110-common: drop mmc post-power-on-delay-ms",
                            "    - riscv: dts: starfive: add common board dtsi for Milk-V Mars CM variants",
                            "    - dt-bindings: riscv: starfive: add milkv,marscm-emmc",
                            "    - riscv: dts: starfive: add Milk-V Mars CM system-on-module",
                            "    - dt-bindings: riscv: starfive: add milkv,marscm-lite",
                            "    - riscv: dts: starfive: add Milk-V Mars CM Lite system-on-module",
                            "    - SAUCE: dts: starfive: jh7110-common: split out mmc0 reset pins from",
                            "      common into boards",
                            "    - SAUCE: dt-bindings: riscv: Add StarFive JH7110S SoC and VisionFive 2",
                            "      Lite board",
                            "    - SAUCE: riscv: dts: starfive: jh7110-common: Move out some nodes to the",
                            "      board dts",
                            "    - SAUCE: riscv: dts: starfive: Add common board dtsi for VisionFive 2 Lite",
                            "      variants",
                            "    - SAUCE: riscv: dts: starfive: Add VisionFive 2 Lite board device tree",
                            "    - SAUCE: riscv: dts: starfive: Add VisionFive 2 Lite eMMC board device",
                            "      tree",
                            "    - SAUCE: dt-bindings: riscv: starfive: add xunlong,orangepi-rv",
                            "    - SAUCE: riscv: dts: starfive: add Orange Pi RV",
                            "    - [Config] riscv: updateconfigs for JH7110 support",
                            "",
                            "  * Miscellaneous Ubuntu changes",
                            "    - SAUCE: tools/lib/perf: Fix -Werror=alloc-size-larger-than in cpumap.c",
                            "    - [Config] Enable pre-RVA23 hardware",
                            ""
                        ],
                        "package": "linux-riscv-6.17",
                        "version": "6.17.0-9.9.1~24.04.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2133507,
                            1975592,
                            2013232
                        ],
                        "author": "Emil Renner Berthing <emil.renner.berthing@canonical.com>",
                        "date": "Thu, 18 Dec 2025 14:49:05 +0100"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Create Noble backport",
                            "",
                            "  [ Ubuntu: 6.17.0-9.9.1 ]",
                            ""
                        ],
                        "package": "linux-riscv-6.17",
                        "version": "6.17.0-9.9.1~24.04.0",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [],
                        "author": "Emil Renner Berthing <emil.renner.berthing@canonical.com>",
                        "date": "Thu, 18 Dec 2025 14:06:20 +0100"
                    }
                ],
                "notes": "For a newly added package only the three most recent changelog entries are shown.",
                "is_version_downgrade": false
            }
        ],
        "snap": []
    },
    "removed": {
        "deb": [
            {
                "name": "linux-headers-6.14.0-37-generic",
                "from_version": {
                    "source_package_name": "linux-riscv-6.14",
                    "source_package_version": "6.14.0-37.37.1~24.04.1",
                    "version": "6.14.0-37.37.1~24.04.1"
                },
                "to_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-image-6.14.0-37-generic",
                "from_version": {
                    "source_package_name": "linux-riscv-6.14",
                    "source_package_version": "6.14.0-37.37.1~24.04.1",
                    "version": "6.14.0-37.37.1~24.04.1"
                },
                "to_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-modules-6.14.0-37-generic",
                "from_version": {
                    "source_package_name": "linux-riscv-6.14",
                    "source_package_version": "6.14.0-37.37.1~24.04.1",
                    "version": "6.14.0-37.37.1~24.04.1"
                },
                "to_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-riscv-6.14-headers-6.14.0-37",
                "from_version": {
                    "source_package_name": "linux-riscv-6.14",
                    "source_package_version": "6.14.0-37.37.1~24.04.1",
                    "version": "6.14.0-37.37.1~24.04.1"
                },
                "to_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-riscv-6.14-tools-6.14.0-37",
                "from_version": {
                    "source_package_name": "linux-riscv-6.14",
                    "source_package_version": "6.14.0-37.37.1~24.04.1",
                    "version": "6.14.0-37.37.1~24.04.1"
                },
                "to_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-tools-6.14.0-37-generic",
                "from_version": {
                    "source_package_name": "linux-riscv-6.14",
                    "source_package_version": "6.14.0-37.37.1~24.04.1",
                    "version": "6.14.0-37.37.1~24.04.1"
                },
                "to_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [],
                "notes": null,
                "is_version_downgrade": false
            }
        ],
        "snap": []
    },
    "notes": "Changelog diff for Ubuntu 24.04 noble image from release image serial 20251213 to 20260209",
    "from_series": "noble",
    "to_series": "noble",
    "from_serial": "20251213",
    "to_serial": "20260209",
    "from_manifest_filename": "release_manifest.previous",
    "to_manifest_filename": "manifest.current"
}