<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:02852-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-08-18T15:58:13Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-08-18T15:58:13Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-08-18T15:58:13Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2022-49138: Bluetooth: hci_event: Fix checking conn for le_conn_complete_evt (bsc#1238160).
- CVE-2023-52923: netfilter: nf_tables: split async and sync catchall in two functions (bsc#1236104).
- CVE-2023-52927: netfilter: allow exp not to be removed in nf_ct_find_expectation (bsc#1239644).
- CVE-2024-26643: Fixed mark set as dead when unbinding anonymous  set with timeout (bsc#1221829).
- CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT (bsc#1233551).
- CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1234863).
- CVE-2025-21701: net: avoid race between device unregistration and ethnl ops (bsc#1237164).
- CVE-2025-21971: net_sched: Prevent creation of classes with TC_H_ROOT (bsc#1240799).
- CVE-2025-37797: net_sched: hfsc: Fix a UAF vulnerability in class handling (bsc#1242417).
- CVE-2025-38079: crypto: algif_hash - fix double free in hash_accept (bsc#1245217).
- CVE-2025-38181: calipso: Fix null-ptr-deref in calipso_req_{set,del}attr() (bsc#1246000).
- CVE-2025-38200: i40e: fix MMIO write access to an invalid page in i40e_clear_hw (bsc#1246045).
- CVE-2025-38206: exfat: fix double free in delayed_free (bsc#1246073).
- CVE-2025-38212: ipc: fix to protect IPCS lookups using RCU (bsc#1246029).
- CVE-2025-38213: vgacon: Add check for vc_origin address range in vgacon_scroll() (bsc#1246037).
- CVE-2025-38257: s390/pkey: Prevent overflow in size calculation for memdup_user() (bsc#1246186).
- CVE-2025-38289: scsi: lpfc: Avoid potential ndlp use-after-free in dev_loss_tmo_callbk (bsc#1246287).
- CVE-2025-38350: net/sched: Always pass notifications when child class becomes empty (bsc#1246781).
- CVE-2025-38468: net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree (bsc#1247437).
- CVE-2025-38477: net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in qfq_delete_class (bsc#1247314).
- CVE-2025-38494: HID: core: do not bypass hid_hw_raw_request (bsc#1247349).
- CVE-2025-38495: HID: core: ensure the allocated report buffer can contain the reserved report ID (bsc#1247348).
- CVE-2025-38497: usb: gadget: configfs: Fix OOB read on empty string write (bsc#1247347).

The following non-security bugs were fixed:

- Revert 'hugetlb: unshare some PMDs when splitting VMAs' (bsc#1245431).
- Revert 'mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race' 
- Revert 'mm/hugetlb: unshare page tables during VMA split, not before' 
- bnxt_en: Fix GSO type for HW GRO packets on 5750X chips (bsc#1244523).
- net: usb: usbnet: restore usb%d name exception for local mac addresses (bsc#1234480 bsc#1246555).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Container suse/sle-micro/rt-5.5:latest-2025-2852,SUSE-2025-2852,SUSE-SLE-Micro-5.5-2025-2852</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/</URL>
      <Description>Link for SUSE-SU-2025:02852-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:02852-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1206051</URL>
      <Description>SUSE Bug 1206051</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221829</URL>
      <Description>SUSE Bug 1221829</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233551</URL>
      <Description>SUSE Bug 1233551</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234480</URL>
      <Description>SUSE Bug 1234480</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234863</URL>
      <Description>SUSE Bug 1234863</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1236104</URL>
      <Description>SUSE Bug 1236104</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1236333</URL>
      <Description>SUSE Bug 1236333</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1237164</URL>
      <Description>SUSE Bug 1237164</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1238160</URL>
      <Description>SUSE Bug 1238160</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1239644</URL>
      <Description>SUSE Bug 1239644</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1240799</URL>
      <Description>SUSE Bug 1240799</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1242414</URL>
      <Description>SUSE Bug 1242414</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1242417</URL>
      <Description>SUSE Bug 1242417</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1244309</URL>
      <Description>SUSE Bug 1244309</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1244523</URL>
      <Description>SUSE Bug 1244523</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245217</URL>
      <Description>SUSE Bug 1245217</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245431</URL>
      <Description>SUSE Bug 1245431</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245506</URL>
      <Description>SUSE Bug 1245506</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245711</URL>
      <Description>SUSE Bug 1245711</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245986</URL>
      <Description>SUSE Bug 1245986</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246000</URL>
      <Description>SUSE Bug 1246000</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246029</URL>
      <Description>SUSE Bug 1246029</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246037</URL>
      <Description>SUSE Bug 1246037</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246045</URL>
      <Description>SUSE Bug 1246045</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246073</URL>
      <Description>SUSE Bug 1246073</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246186</URL>
      <Description>SUSE Bug 1246186</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246287</URL>
      <Description>SUSE Bug 1246287</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246555</URL>
      <Description>SUSE Bug 1246555</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246781</URL>
      <Description>SUSE Bug 1246781</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247314</URL>
      <Description>SUSE Bug 1247314</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247347</URL>
      <Description>SUSE Bug 1247347</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247348</URL>
      <Description>SUSE Bug 1247348</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247349</URL>
      <Description>SUSE Bug 1247349</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247437</URL>
      <Description>SUSE Bug 1247437</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-49138/</URL>
      <Description>SUSE CVE CVE-2022-49138 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-49770/</URL>
      <Description>SUSE CVE CVE-2022-49770 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52923/</URL>
      <Description>SUSE CVE CVE-2023-52923 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52927/</URL>
      <Description>SUSE CVE CVE-2023-52927 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26643/</URL>
      <Description>SUSE CVE CVE-2024-26643 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53057/</URL>
      <Description>SUSE CVE CVE-2024-53057 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53164/</URL>
      <Description>SUSE CVE CVE-2024-53164 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-57947/</URL>
      <Description>SUSE CVE CVE-2024-57947 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-21701/</URL>
      <Description>SUSE CVE CVE-2025-21701 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-21971/</URL>
      <Description>SUSE CVE CVE-2025-21971 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-37797/</URL>
      <Description>SUSE CVE CVE-2025-37797 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-37798/</URL>
      <Description>SUSE CVE CVE-2025-37798 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38079/</URL>
      <Description>SUSE CVE CVE-2025-38079 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38088/</URL>
      <Description>SUSE CVE CVE-2025-38088 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38120/</URL>
      <Description>SUSE CVE CVE-2025-38120 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38177/</URL>
      <Description>SUSE CVE CVE-2025-38177 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38181/</URL>
      <Description>SUSE CVE CVE-2025-38181 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38200/</URL>
      <Description>SUSE CVE CVE-2025-38200 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38206/</URL>
      <Description>SUSE CVE CVE-2025-38206 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38212/</URL>
      <Description>SUSE CVE CVE-2025-38212 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38213/</URL>
      <Description>SUSE CVE CVE-2025-38213 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38257/</URL>
      <Description>SUSE CVE CVE-2025-38257 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38289/</URL>
      <Description>SUSE CVE CVE-2025-38289 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38350/</URL>
      <Description>SUSE CVE CVE-2025-38350 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38468/</URL>
      <Description>SUSE CVE CVE-2025-38468 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38477/</URL>
      <Description>SUSE CVE CVE-2025-38477 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38494/</URL>
      <Description>SUSE CVE CVE-2025-38494 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38495/</URL>
      <Description>SUSE CVE CVE-2025-38495 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38497/</URL>
      <Description>SUSE CVE CVE-2025-38497 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Container suse/sle-micro/rt-5.5:latest">
      <Branch Type="Product Name" Name="Container suse/sle-micro/rt-5.5:latest">
        <FullProductName ProductID="Container suse/sle-micro/rt-5.5:latest">Container suse/sle-micro/rt-5.5:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Micro 5.5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Micro 5.5">
        <FullProductName ProductID="SUSE Linux Enterprise Micro 5.5" CPE="cpe:/o:suse:sle-micro:5.5">SUSE Linux Enterprise Micro 5.5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-5.14.21-150500.13.103.2">
      <FullProductName ProductID="kernel-rt-5.14.21-150500.13.103.2">kernel-rt-5.14.21-150500.13.103.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cluster-md-kmp-rt-5.14.21-150500.13.103.2">
      <FullProductName ProductID="cluster-md-kmp-rt-5.14.21-150500.13.103.2">cluster-md-kmp-rt-5.14.21-150500.13.103.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dlm-kmp-rt-5.14.21-150500.13.103.2">
      <FullProductName ProductID="dlm-kmp-rt-5.14.21-150500.13.103.2">dlm-kmp-rt-5.14.21-150500.13.103.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gfs2-kmp-rt-5.14.21-150500.13.103.2">
      <FullProductName ProductID="gfs2-kmp-rt-5.14.21-150500.13.103.2">gfs2-kmp-rt-5.14.21-150500.13.103.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-rt-5.14.21-150500.13.103.2">
      <FullProductName ProductID="kernel-devel-rt-5.14.21-150500.13.103.2">kernel-devel-rt-5.14.21-150500.13.103.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-devel-5.14.21-150500.13.103.2">
      <FullProductName ProductID="kernel-rt-devel-5.14.21-150500.13.103.2">kernel-rt-devel-5.14.21-150500.13.103.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-extra-5.14.21-150500.13.103.2">
      <FullProductName ProductID="kernel-rt-extra-5.14.21-150500.13.103.2">kernel-rt-extra-5.14.21-150500.13.103.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-livepatch-5.14.21-150500.13.103.2">
      <FullProductName ProductID="kernel-rt-livepatch-5.14.21-150500.13.103.2">kernel-rt-livepatch-5.14.21-150500.13.103.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-livepatch-devel-5.14.21-150500.13.103.2">
      <FullProductName ProductID="kernel-rt-livepatch-devel-5.14.21-150500.13.103.2">kernel-rt-livepatch-devel-5.14.21-150500.13.103.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-optional-5.14.21-150500.13.103.2">
      <FullProductName ProductID="kernel-rt-optional-5.14.21-150500.13.103.2">kernel-rt-optional-5.14.21-150500.13.103.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-vdso-5.14.21-150500.13.103.2">
      <FullProductName ProductID="kernel-rt-vdso-5.14.21-150500.13.103.2">kernel-rt-vdso-5.14.21-150500.13.103.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt_debug-5.14.21-150500.13.103.2">
      <FullProductName ProductID="kernel-rt_debug-5.14.21-150500.13.103.2">kernel-rt_debug-5.14.21-150500.13.103.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt_debug-devel-5.14.21-150500.13.103.2">
      <FullProductName ProductID="kernel-rt_debug-devel-5.14.21-150500.13.103.2">kernel-rt_debug-devel-5.14.21-150500.13.103.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt_debug-vdso-5.14.21-150500.13.103.2">
      <FullProductName ProductID="kernel-rt_debug-vdso-5.14.21-150500.13.103.2">kernel-rt_debug-vdso-5.14.21-150500.13.103.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-rt-5.14.21-150500.13.103.2">
      <FullProductName ProductID="kernel-source-rt-5.14.21-150500.13.103.2">kernel-source-rt-5.14.21-150500.13.103.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kselftests-kmp-rt-5.14.21-150500.13.103.2">
      <FullProductName ProductID="kselftests-kmp-rt-5.14.21-150500.13.103.2">kselftests-kmp-rt-5.14.21-150500.13.103.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ocfs2-kmp-rt-5.14.21-150500.13.103.2">
      <FullProductName ProductID="ocfs2-kmp-rt-5.14.21-150500.13.103.2">ocfs2-kmp-rt-5.14.21-150500.13.103.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="reiserfs-kmp-rt-5.14.21-150500.13.103.2">
      <FullProductName ProductID="reiserfs-kmp-rt-5.14.21-150500.13.103.2">reiserfs-kmp-rt-5.14.21-150500.13.103.2</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-rt-5.14.21-150500.13.103.2" RelationType="Default Component Of" RelatesToProductReference="Container suse/sle-micro/rt-5.5:latest">
      <FullProductName ProductID="Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.103.2">kernel-rt-5.14.21-150500.13.103.2 as a component of Container suse/sle-micro/rt-5.5:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-rt-5.14.21-150500.13.103.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.5">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.103.2">kernel-devel-rt-5.14.21-150500.13.103.2 as a component of SUSE Linux Enterprise Micro 5.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt-5.14.21-150500.13.103.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.5">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.103.2">kernel-rt-5.14.21-150500.13.103.2 as a component of SUSE Linux Enterprise Micro 5.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-rt-5.14.21-150500.13.103.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.5">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.103.2">kernel-source-rt-5.14.21-150500.13.103.2 as a component of SUSE Linux Enterprise Micro 5.5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_event: Ignore multiple conn complete events

When one of the three connection complete events is received multiple
times for the same handle, the device is registered multiple times which
leads to memory corruptions. Therefore, consequent events for a single
connection are ignored.

The conn-&gt;state can hold different values, therefore HCI_CONN_HANDLE_UNSET
is introduced to identify new connections. To make sure the events do not
contain this or another invalid handle HCI_CONN_HANDLE_MAX and checks
are introduced.

Buglink: https://bugzilla.kernel.org/show_bug.cgi?id=215497</Note>
    </Notes>
    <CVE>CVE-2022-49138</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.103.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-49138.html</URL>
        <Description>CVE-2022-49138</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1238160</URL>
        <Description>SUSE Bug 1238160</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ceph: avoid putting the realm twice when decoding snaps fails

When decoding the snaps fails it maybe leaving the 'first_realm'
and 'realm' pointing to the same snaprealm memory. And then it'll
put it twice and could cause random use-after-free, BUG_ON, etc
issues.</Note>
    </Notes>
    <CVE>CVE-2022-49770</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.103.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-49770.html</URL>
        <Description>CVE-2022-49770</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1242597</URL>
        <Description>SUSE Bug 1242597</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: adapt set backend to use GC transaction API

Use the GC transaction API to replace the old and buggy gc API and the
busy mark approach.

No set elements are removed from async garbage collection anymore,
instead the _DEAD bit is set on so the set element is not visible from
lookup path anymore. Async GC enqueues transaction work that might be
aborted and retried later.

rbtree and pipapo set backends does not set on the _DEAD bit from the
sync GC path since this runs in control plane path where mutex is held.
In this case, set elements are deactivated, removed and then released
via RCU callback, sync GC never fails.</Note>
    </Notes>
    <CVE>CVE-2023-52923</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.103.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52923.html</URL>
        <Description>CVE-2023-52923</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1236104</URL>
        <Description>SUSE Bug 1236104</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: allow exp not to be removed in nf_ct_find_expectation

Currently nf_conntrack_in() calling nf_ct_find_expectation() will
remove the exp from the hash table. However, in some scenario, we
expect the exp not to be removed when the created ct will not be
confirmed, like in OVS and TC conntrack in the following patches.

This patch allows exp not to be removed by setting IPS_CONFIRMED
in the status of the tmpl.</Note>
    </Notes>
    <CVE>CVE-2023-52927</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.103.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52927.html</URL>
        <Description>CVE-2023-52927</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1239644</URL>
        <Description>SUSE Bug 1239644</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246016</URL>
        <Description>SUSE Bug 1246016</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout

While the rhashtable set gc runs asynchronously, a race allows it to
collect elements from anonymous sets with timeouts while it is being
released from the commit path.

Mingi Cho originally reported this issue in a different path in 6.1.x
with a pipapo set with low timeouts which is not possible upstream since
7395dfacfff6 ("netfilter: nf_tables: use timestamp to check for set
element timeout").

Fix this by setting on the dead flag for anonymous sets to skip async gc
in this case.

According to 08e4c8c5919f ("netfilter: nf_tables: mark newset as dead on
transaction abort"), Florian plans to accelerate abort path by releasing
objects via workqueue, therefore, this sets on the dead flag for abort
path too.</Note>
    </Notes>
    <CVE>CVE-2024-26643</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.103.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26643.html</URL>
        <Description>CVE-2024-26643</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221829</URL>
        <Description>SUSE Bug 1221829</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT

In qdisc_tree_reduce_backlog, Qdiscs with major handle ffff: are assumed
to be either root or ingress. This assumption is bogus since it's valid
to create egress qdiscs with major handle ffff:
Budimir Markovic found that for qdiscs like DRR that maintain an active
class list, it will cause a UAF with a dangling class pointer.

In 066a3b5b2346, the concern was to avoid iterating over the ingress
qdisc since its parent is itself. The proper fix is to stop when parent
TC_H_ROOT is reached because the only way to retrieve ingress is when a
hierarchy which does not contain a ffff: major handle call into
qdisc_lookup with TC_H_MAJ(TC_H_ROOT).

In the scenario where major ffff: is an egress qdisc in any of the tree
levels, the updates will also propagate to TC_H_ROOT, which then the
iteration must stop.


 net/sched/sch_api.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)</Note>
    </Notes>
    <CVE>CVE-2024-53057</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.103.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53057.html</URL>
        <Description>CVE-2024-53057</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233551</URL>
        <Description>SUSE Bug 1233551</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245816</URL>
        <Description>SUSE Bug 1245816</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: sched: fix ordering of qlen adjustment

Changes to sch-&gt;q.qlen around qdisc_tree_reduce_backlog() need to happen
_before_ a call to said function because otherwise it may fail to notify
parent qdiscs when the child is about to become empty.</Note>
    </Notes>
    <CVE>CVE-2024-53164</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.103.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53164.html</URL>
        <Description>CVE-2024-53164</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234863</URL>
        <Description>SUSE Bug 1234863</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246019</URL>
        <Description>SUSE Bug 1246019</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_set_pipapo: fix initial map fill

The initial buffer has to be inited to all-ones, but it must restrict
it to the size of the first field, not the total field size.

After each round in the map search step, the result and the fill map
are swapped, so if we have a set where f-&gt;bsize of the first element
is smaller than m-&gt;bsize_max, those one-bits are leaked into future
rounds result map.

This makes pipapo find an incorrect matching results for sets where
first field size is not the largest.

Followup patch adds a test case to nft_concat_range.sh selftest script.

Thanks to Stefano Brivio for pointing out that we need to zero out
the remainder explicitly, only correcting memset() argument isn't enough.</Note>
    </Notes>
    <CVE>CVE-2024-57947</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.103.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-57947.html</URL>
        <Description>CVE-2024-57947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1236333</URL>
        <Description>SUSE Bug 1236333</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245799</URL>
        <Description>SUSE Bug 1245799</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: avoid race between device unregistration and ethnl ops

The following trace can be seen if a device is being unregistered while
its number of channels are being modified.

  DEBUG_LOCKS_WARN_ON(lock-&gt;magic != lock)
  WARNING: CPU: 3 PID: 3754 at kernel/locking/mutex.c:564 __mutex_lock+0xc8a/0x1120
  CPU: 3 UID: 0 PID: 3754 Comm: ethtool Not tainted 6.13.0-rc6+ #771
  RIP: 0010:__mutex_lock+0xc8a/0x1120
  Call Trace:
   &lt;TASK&gt;
   ethtool_check_max_channel+0x1ea/0x880
   ethnl_set_channels+0x3c3/0xb10
   ethnl_default_set_doit+0x306/0x650
   genl_family_rcv_msg_doit+0x1e3/0x2c0
   genl_rcv_msg+0x432/0x6f0
   netlink_rcv_skb+0x13d/0x3b0
   genl_rcv+0x28/0x40
   netlink_unicast+0x42e/0x720
   netlink_sendmsg+0x765/0xc20
   __sys_sendto+0x3ac/0x420
   __x64_sys_sendto+0xe0/0x1c0
   do_syscall_64+0x95/0x180
   entry_SYSCALL_64_after_hwframe+0x76/0x7e

This is because unregister_netdevice_many_notify might run before the
rtnl lock section of ethnl operations, eg. set_channels in the above
example. In this example the rss lock would be destroyed by the device
unregistration path before being used again, but in general running
ethnl operations while dismantle has started is not a good idea.

Fix this by denying any operation on devices being unregistered. A check
was already there in ethnl_ops_begin, but not wide enough.

Note that the same issue cannot be seen on the ioctl version
(__dev_ethtool) because the device reference is retrieved from within
the rtnl lock section there. Once dismantle started, the net device is
unlisted and no reference will be found.</Note>
    </Notes>
    <CVE>CVE-2025-21701</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.103.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-21701.html</URL>
        <Description>CVE-2025-21701</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1237164</URL>
        <Description>SUSE Bug 1237164</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245805</URL>
        <Description>SUSE Bug 1245805</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net_sched: Prevent creation of classes with TC_H_ROOT

The function qdisc_tree_reduce_backlog() uses TC_H_ROOT as a termination
condition when traversing up the qdisc tree to update parent backlog
counters. However, if a class is created with classid TC_H_ROOT, the
traversal terminates prematurely at this class instead of reaching the
actual root qdisc, causing parent statistics to be incorrectly maintained.
In case of DRR, this could lead to a crash as reported by Mingi Cho.

Prevent the creation of any Qdisc class with classid TC_H_ROOT
(0xFFFFFFFF) across all qdisc types, as suggested by Jamal.</Note>
    </Notes>
    <CVE>CVE-2025-21971</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.103.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-21971.html</URL>
        <Description>CVE-2025-21971</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1240799</URL>
        <Description>SUSE Bug 1240799</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245794</URL>
        <Description>SUSE Bug 1245794</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net_sched: hfsc: Fix a UAF vulnerability in class handling

This patch fixes a Use-After-Free vulnerability in the HFSC qdisc class
handling. The issue occurs due to a time-of-check/time-of-use condition
in hfsc_change_class() when working with certain child qdiscs like netem
or codel.

The vulnerability works as follows:
1. hfsc_change_class() checks if a class has packets (q.qlen != 0)
2. It then calls qdisc_peek_len(), which for certain qdiscs (e.g.,
   codel, netem) might drop packets and empty the queue
3. The code continues assuming the queue is still non-empty, adding
   the class to vttree
4. This breaks HFSC scheduler assumptions that only non-empty classes
   are in vttree
5. Later, when the class is destroyed, this can lead to a Use-After-Free

The fix adds a second queue length check after qdisc_peek_len() to verify
the queue wasn't emptied.</Note>
    </Notes>
    <CVE>CVE-2025-37797</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.103.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-37797.html</URL>
        <Description>CVE-2025-37797</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1242417</URL>
        <Description>SUSE Bug 1242417</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245793</URL>
        <Description>SUSE Bug 1245793</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

codel: remove sch-&gt;q.qlen check before qdisc_tree_reduce_backlog()

After making all -&gt;qlen_notify() callbacks idempotent, now it is safe to
remove the check of qlen!=0 from both fq_codel_dequeue() and
codel_qdisc_dequeue().</Note>
    </Notes>
    <CVE>CVE-2025-37798</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.103.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-37798.html</URL>
        <Description>CVE-2025-37798</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1242414</URL>
        <Description>SUSE Bug 1242414</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1242417</URL>
        <Description>SUSE Bug 1242417</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

crypto: algif_hash - fix double free in hash_accept

If accept(2) is called on socket type algif_hash with
MSG_MORE flag set and crypto_ahash_import fails,
sk2 is freed. However, it is also freed in af_alg_release,
leading to slab-use-after-free error.</Note>
    </Notes>
    <CVE>CVE-2025-38079</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.103.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38079.html</URL>
        <Description>CVE-2025-38079</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245217</URL>
        <Description>SUSE Bug 1245217</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245218</URL>
        <Description>SUSE Bug 1245218</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap

memtrace mmap issue has an out of bounds issue. This patch fixes the by
checking that the requested mapping region size should stay within the
allocated region size.</Note>
    </Notes>
    <CVE>CVE-2025-38088</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.103.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38088.html</URL>
        <Description>CVE-2025-38088</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245506</URL>
        <Description>SUSE Bug 1245506</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_set_pipapo_avx2: fix initial map fill

If the first field doesn't cover the entire start map, then we must zero
out the remainder, else we leak those bits into the next match round map.

The early fix was incomplete and did only fix up the generic C
implementation.

A followup patch adds a test case to nft_concat_range.sh.</Note>
    </Notes>
    <CVE>CVE-2025-38120</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.103.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38120.html</URL>
        <Description>CVE-2025-38120</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245711</URL>
        <Description>SUSE Bug 1245711</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

sch_hfsc: make hfsc_qlen_notify() idempotent

hfsc_qlen_notify() is not idempotent either and not friendly
to its callers, like fq_codel_dequeue(). Let's make it idempotent
to ease qdisc_tree_reduce_backlog() callers' life:

1. update_vf() decreases cl-&gt;cl_nactive, so we can check whether it is
non-zero before calling it.

2. eltree_remove() always removes RB node cl-&gt;el_node, but we can use
   RB_EMPTY_NODE() + RB_CLEAR_NODE() to make it safe.</Note>
    </Notes>
    <CVE>CVE-2025-38177</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.103.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38177.html</URL>
        <Description>CVE-2025-38177</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245986</URL>
        <Description>SUSE Bug 1245986</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246356</URL>
        <Description>SUSE Bug 1246356</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

calipso: Fix null-ptr-deref in calipso_req_{set,del}attr().

syzkaller reported a null-ptr-deref in sock_omalloc() while allocating
a CALIPSO option.  [0]

The NULL is of struct sock, which was fetched by sk_to_full_sk() in
calipso_req_setattr().

Since commit a1a5344ddbe8 ("tcp: avoid two atomic ops for syncookies"),
reqsk-&gt;rsk_listener could be NULL when SYN Cookie is returned to its
client, as hinted by the leading SYN Cookie log.

Here are 3 options to fix the bug:

  1) Return 0 in calipso_req_setattr()
  2) Return an error in calipso_req_setattr()
  3) Alaways set rsk_listener

1) is no go as it bypasses LSM, but 2) effectively disables SYN Cookie
for CALIPSO.  3) is also no go as there have been many efforts to reduce
atomic ops and make TCP robust against DDoS.  See also commit 3b24d854cb35
("tcp/dccp: do not touch listener sk_refcnt under synflood").

As of the blamed commit, SYN Cookie already did not need refcounting,
and no one has stumbled on the bug for 9 years, so no CALIPSO user will
care about SYN Cookie.

Let's return an error in calipso_req_setattr() and calipso_req_delattr()
in the SYN Cookie case.

This can be reproduced by [1] on Fedora and now connect() of nc times out.

[0]:
TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies.
Oops: general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN NOPTI
KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]
CPU: 3 UID: 0 PID: 12262 Comm: syz.1.2611 Not tainted 6.14.0 #2
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
RIP: 0010:read_pnet include/net/net_namespace.h:406 [inline]
RIP: 0010:sock_net include/net/sock.h:655 [inline]
RIP: 0010:sock_kmalloc+0x35/0x170 net/core/sock.c:2806
Code: 89 d5 41 54 55 89 f5 53 48 89 fb e8 25 e3 c6 fd e8 f0 91 e3 00 48 8d 7b 30 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 &lt;80&gt; 3c 02 00 0f 85 26 01 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b
RSP: 0018:ffff88811af89038 EFLAGS: 00010216
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffff888105266400
RDX: 0000000000000006 RSI: ffff88800c890000 RDI: 0000000000000030
RBP: 0000000000000050 R08: 0000000000000000 R09: ffff88810526640e
R10: ffffed1020a4cc81 R11: ffff88810526640f R12: 0000000000000000
R13: 0000000000000820 R14: ffff888105266400 R15: 0000000000000050
FS:  00007f0653a07640(0000) GS:ffff88811af80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f863ba096f4 CR3: 00000000163c0005 CR4: 0000000000770ef0
PKRU: 80000000
Call Trace:
 &lt;IRQ&gt;
 ipv6_renew_options+0x279/0x950 net/ipv6/exthdrs.c:1288
 calipso_req_setattr+0x181/0x340 net/ipv6/calipso.c:1204
 calipso_req_setattr+0x56/0x80 net/netlabel/netlabel_calipso.c:597
 netlbl_req_setattr+0x18a/0x440 net/netlabel/netlabel_kapi.c:1249
 selinux_netlbl_inet_conn_request+0x1fb/0x320 security/selinux/netlabel.c:342
 selinux_inet_conn_request+0x1eb/0x2c0 security/selinux/hooks.c:5551
 security_inet_conn_request+0x50/0xa0 security/security.c:4945
 tcp_v6_route_req+0x22c/0x550 net/ipv6/tcp_ipv6.c:825
 tcp_conn_request+0xec8/0x2b70 net/ipv4/tcp_input.c:7275
 tcp_v6_conn_request+0x1e3/0x440 net/ipv6/tcp_ipv6.c:1328
 tcp_rcv_state_process+0xafa/0x52b0 net/ipv4/tcp_input.c:6781
 tcp_v6_do_rcv+0x8a6/0x1a40 net/ipv6/tcp_ipv6.c:1667
 tcp_v6_rcv+0x505e/0x5b50 net/ipv6/tcp_ipv6.c:1904
 ip6_protocol_deliver_rcu+0x17c/0x1da0 net/ipv6/ip6_input.c:436
 ip6_input_finish+0x103/0x180 net/ipv6/ip6_input.c:480
 NF_HOOK include/linux/netfilter.h:314 [inline]
 NF_HOOK include/linux/netfilter.h:308 [inline]
 ip6_input+0x13c/0x6b0 net/ipv6/ip6_input.c:491
 dst_input include/net/dst.h:469 [inline]
 ip6_rcv_finish net/ipv6/ip6_input.c:79 [inline]
 ip6_rcv_finish+0xb6/0x490 net/ipv6/ip6_input.c:69
 NF_HOOK include/linux/netfilter.h:314 [inline]
 NF_HOOK include/linux/netf
---truncated---</Note>
    </Notes>
    <CVE>CVE-2025-38181</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.103.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38181.html</URL>
        <Description>CVE-2025-38181</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246000</URL>
        <Description>SUSE Bug 1246000</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246001</URL>
        <Description>SUSE Bug 1246001</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

i40e: fix MMIO write access to an invalid page in i40e_clear_hw

When the device sends a specific input, an integer underflow can occur, leading
to MMIO write access to an invalid page.

Prevent the integer underflow by changing the type of related variables.</Note>
    </Notes>
    <CVE>CVE-2025-38200</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.103.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38200.html</URL>
        <Description>CVE-2025-38200</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246045</URL>
        <Description>SUSE Bug 1246045</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246046</URL>
        <Description>SUSE Bug 1246046</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

exfat: fix double free in delayed_free

The double free could happen in the following path.

exfat_create_upcase_table()
        exfat_create_upcase_table() : return error
        exfat_free_upcase_table() : free -&gt;vol_utbl
        exfat_load_default_upcase_table : return error
     exfat_kill_sb()
           delayed_free()
                  exfat_free_upcase_table() &lt;--------- double free
This patch set -&gt;vol_util as NULL after freeing it.</Note>
    </Notes>
    <CVE>CVE-2025-38206</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.103.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38206.html</URL>
        <Description>CVE-2025-38206</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246073</URL>
        <Description>SUSE Bug 1246073</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246075</URL>
        <Description>SUSE Bug 1246075</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ipc: fix to protect IPCS lookups using RCU

syzbot reported that it discovered a use-after-free vulnerability, [0]

[0]: https://lore.kernel.org/all/67af13f8.050a0220.21dd3.0038.GAE@google.com/

idr_for_each() is protected by rwsem, but this is not enough.  If it is
not protected by RCU read-critical region, when idr_for_each() calls
radix_tree_node_free() through call_rcu() to free the radix_tree_node
structure, the node will be freed immediately, and when reading the next
node in radix_tree_for_each_slot(), the already freed memory may be read.

Therefore, we need to add code to make sure that idr_for_each() is
protected within the RCU read-critical region when we call it in
shm_destroy_orphaned().</Note>
    </Notes>
    <CVE>CVE-2025-38212</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.103.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38212.html</URL>
        <Description>CVE-2025-38212</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246029</URL>
        <Description>SUSE Bug 1246029</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246030</URL>
        <Description>SUSE Bug 1246030</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.</Note>
    </Notes>
    <CVE>CVE-2025-38213</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.103.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38213.html</URL>
        <Description>CVE-2025-38213</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246037</URL>
        <Description>SUSE Bug 1246037</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246039</URL>
        <Description>SUSE Bug 1246039</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

s390/pkey: Prevent overflow in size calculation for memdup_user()

Number of apqn target list entries contained in 'nr_apqns' variable is
determined by userspace via an ioctl call so the result of the product in
calculation of size passed to memdup_user() may overflow.

In this case the actual size of the allocated area and the value
describing it won't be in sync leading to various types of unpredictable
behaviour later.

Use a proper memdup_array_user() helper which returns an error if an
overflow is detected. Note that it is different from when nr_apqns is
initially zero - that case is considered valid and should be handled in
subsequent pkey_handler implementations.

Found by Linux Verification Center (linuxtesting.org).</Note>
    </Notes>
    <CVE>CVE-2025-38257</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.103.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38257.html</URL>
        <Description>CVE-2025-38257</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246186</URL>
        <Description>SUSE Bug 1246186</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246189</URL>
        <Description>SUSE Bug 1246189</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Avoid potential ndlp use-after-free in dev_loss_tmo_callbk

Smatch detected a potential use-after-free of an ndlp oject in
dev_loss_tmo_callbk during driver unload or fatal error handling.

Fix by reordering code to avoid potential use-after-free if initial
nodelist reference has been previously removed.</Note>
    </Notes>
    <CVE>CVE-2025-38289</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.103.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38289.html</URL>
        <Description>CVE-2025-38289</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246287</URL>
        <Description>SUSE Bug 1246287</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246288</URL>
        <Description>SUSE Bug 1246288</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/sched: Always pass notifications when child class becomes empty

Certain classful qdiscs may invoke their classes' dequeue handler on an
enqueue operation. This may unexpectedly empty the child qdisc and thus
make an in-flight class passive via qlen_notify(). Most qdiscs do not
expect such behaviour at this point in time and may re-activate the
class eventually anyways which will lead to a use-after-free.

The referenced fix commit attempted to fix this behavior for the HFSC
case by moving the backlog accounting around, though this turned out to
be incomplete since the parent's parent may run into the issue too.
The following reproducer demonstrates this use-after-free:

    tc qdisc add dev lo root handle 1: drr
    tc filter add dev lo parent 1: basic classid 1:1
    tc class add dev lo parent 1: classid 1:1 drr
    tc qdisc add dev lo parent 1:1 handle 2: hfsc def 1
    tc class add dev lo parent 2: classid 2:1 hfsc rt m1 8 d 1 m2 0
    tc qdisc add dev lo parent 2:1 handle 3: netem
    tc qdisc add dev lo parent 3:1 handle 4: blackhole

    echo 1 | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888
    tc class delete dev lo classid 1:1
    echo 1 | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888

Since backlog accounting issues leading to a use-after-frees on stale
class pointers is a recurring pattern at this point, this patch takes
a different approach. Instead of trying to fix the accounting, the patch
ensures that qdisc_tree_reduce_backlog always calls qlen_notify when
the child qdisc is empty. This solves the problem because deletion of
qdiscs always involves a call to qdisc_reset() and / or
qdisc_purge_queue() which ultimately resets its qlen to 0 thus causing
the following qdisc_tree_reduce_backlog() to report to the parent. Note
that this may call qlen_notify on passive classes multiple times. This
is not a problem after the recent patch series that made all the
classful qdiscs qlen_notify() handlers idempotent.</Note>
    </Notes>
    <CVE>CVE-2025-38350</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.103.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38350.html</URL>
        <Description>CVE-2025-38350</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246781</URL>
        <Description>SUSE Bug 1246781</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247043</URL>
        <Description>SUSE Bug 1247043</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree

htb_lookup_leaf has a BUG_ON that can trigger with the following:

tc qdisc del dev lo root
tc qdisc add dev lo root handle 1: htb default 1
tc class add dev lo parent 1: classid 1:1 htb rate 64bit
tc qdisc add dev lo parent 1:1 handle 2: netem
tc qdisc add dev lo parent 2:1 handle 3: blackhole
ping -I lo -c1 -W0.001 127.0.0.1

The root cause is the following:

1. htb_dequeue calls htb_dequeue_tree which calls the dequeue handler on
   the selected leaf qdisc
2. netem_dequeue calls enqueue on the child qdisc
3. blackhole_enqueue drops the packet and returns a value that is not
   just NET_XMIT_SUCCESS
4. Because of this, netem_dequeue calls qdisc_tree_reduce_backlog, and
   since qlen is now 0, it calls htb_qlen_notify -&gt; htb_deactivate -&gt;
   htb_deactiviate_prios -&gt; htb_remove_class_from_row -&gt; htb_safe_rb_erase
5. As this is the only class in the selected hprio rbtree,
   __rb_change_child in __rb_erase_augmented sets the rb_root pointer to
   NULL
6. Because blackhole_dequeue returns NULL, netem_dequeue returns NULL,
   which causes htb_dequeue_tree to call htb_lookup_leaf with the same
   hprio rbtree, and fail the BUG_ON

The function graph for this scenario is shown here:
 0)               |  htb_enqueue() {
 0) + 13.635 us   |    netem_enqueue();
 0)   4.719 us    |    htb_activate_prios();
 0) # 2249.199 us |  }
 0)               |  htb_dequeue() {
 0)   2.355 us    |    htb_lookup_leaf();
 0)               |    netem_dequeue() {
 0) + 11.061 us   |      blackhole_enqueue();
 0)               |      qdisc_tree_reduce_backlog() {
 0)               |        qdisc_lookup_rcu() {
 0)   1.873 us    |          qdisc_match_from_root();
 0)   6.292 us    |        }
 0)   1.894 us    |        htb_search();
 0)               |        htb_qlen_notify() {
 0)   2.655 us    |          htb_deactivate_prios();
 0)   6.933 us    |        }
 0) + 25.227 us   |      }
 0)   1.983 us    |      blackhole_dequeue();
 0) + 86.553 us   |    }
 0) # 2932.761 us |    qdisc_warn_nonwc();
 0)               |    htb_lookup_leaf() {
 0)               |      BUG_ON();
 ------------------------------------------

The full original bug report can be seen here [1].

We can fix this just by returning NULL instead of the BUG_ON,
as htb_dequeue_tree returns NULL when htb_lookup_leaf returns
NULL.

[1] https://lore.kernel.org/netdev/pF5XOOIim0IuEfhI-SOxTgRvNoDwuux7UHKnE_Y5-zVd4wmGvNk2ceHjKb8ORnzw0cGwfmVu42g9dL7XyJLf1NEzaztboTWcm0Ogxuojoeo=@willsroot.io/</Note>
    </Notes>
    <CVE>CVE-2025-38468</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.103.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38468.html</URL>
        <Description>CVE-2025-38468</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247437</URL>
        <Description>SUSE Bug 1247437</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_qfq: Fix race condition on qfq_aggregate

A race condition can occur when 'agg' is modified in qfq_change_agg
(called during qfq_enqueue) while other threads access it
concurrently. For example, qfq_dump_class may trigger a NULL
dereference, and qfq_delete_class may cause a use-after-free.

This patch addresses the issue by:

1. Moved qfq_destroy_class into the critical section.

2. Added sch_tree_lock protection to qfq_dump_class and
qfq_dump_class_stats.</Note>
    </Notes>
    <CVE>CVE-2025-38477</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.103.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38477.html</URL>
        <Description>CVE-2025-38477</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247314</URL>
        <Description>SUSE Bug 1247314</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247315</URL>
        <Description>SUSE Bug 1247315</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

HID: core: do not bypass hid_hw_raw_request

hid_hw_raw_request() is actually useful to ensure the provided buffer
and length are valid. Directly calling in the low level transport driver
function bypassed those checks and allowed invalid paramto be used.</Note>
    </Notes>
    <CVE>CVE-2025-38494</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.103.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38494.html</URL>
        <Description>CVE-2025-38494</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247349</URL>
        <Description>SUSE Bug 1247349</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247350</URL>
        <Description>SUSE Bug 1247350</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

HID: core: ensure the allocated report buffer can contain the reserved report ID

When the report ID is not used, the low level transport drivers expect
the first byte to be 0. However, currently the allocated buffer not
account for that extra byte, meaning that instead of having 8 guaranteed
bytes for implement to be working, we only have 7.</Note>
    </Notes>
    <CVE>CVE-2025-38495</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.103.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38495.html</URL>
        <Description>CVE-2025-38495</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247348</URL>
        <Description>SUSE Bug 1247348</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247351</URL>
        <Description>SUSE Bug 1247351</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: configfs: Fix OOB read on empty string write

When writing an empty string to either 'qw_sign' or 'landingPage'
sysfs attributes, the store functions attempt to access page[l - 1]
before validating that the length 'l' is greater than zero.

This patch fixes the vulnerability by adding a check at the beginning
of os_desc_qw_sign_store() and webusb_landingPage_store() to handle
the zero-length input case gracefully by returning immediately.</Note>
    </Notes>
    <CVE>CVE-2025-38497</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.103.2</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.103.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38497.html</URL>
        <Description>CVE-2025-38497</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247347</URL>
        <Description>SUSE Bug 1247347</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
