<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:03204-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-09-12T13:40:30Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-09-12T13:40:30Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-09-12T13:40:30Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-49967: bpf: Fix a data-race around bpf_jit_limit (bsc#1244964).
- CVE-2022-49975: bpf: Don't redirect packets with invalid pkt_len (bsc#1245196).
- CVE-2022-49980: usb: gadget: Fix use-after-free bug by not setting udc-&gt;dev.driver (bsc#1245110).
- CVE-2022-49981: HID: hidraw: fix memory leak in hidraw_release() (bsc#1245072).
- CVE-2022-50007: xfrm: fix refcount leak in __xfrm_policy_check() (bsc#1245016).
- CVE-2022-50066: net: atlantic: fix aq_vec index out of range error (bsc#1244985).
- CVE-2022-50080: tee: add overflow check in register_shm_helper() (bsc#1244972).
- CVE-2022-50116: kernel: tty: n_gsm: fix deadlock and link starvation in outgoing data path (bsc#1244824).
- CVE-2022-50127: RDMA/rxe: Fix error unwind in rxe_create_qp() (bsc#1244815).
- CVE-2022-50138: RDMA/qedr: Fix potential memory leak in __qedr_alloc_mr() (bsc#1244797).
- CVE-2022-50141: mmc: sdhci-of-esdhc: Fix refcount leak in esdhc_signal_voltage_switch (bsc#1244794).
- CVE-2022-50162: wifi: libertas: Fix possible refcount leak in if_usb_probe() (bsc#1244773).
- CVE-2022-50185: drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers() (bsc#1244887).
- CVE-2022-50191: regulator: of: Fix refcount leak bug in of_get_regulation_constraints() (bsc#1244899).
- CVE-2022-50228: KVM: SVM: Do not BUG if userspace injects an interrupt with GIF=0 (bsc#1244854).
- CVE-2022-50229: ALSA: bcd2000: Fix a UAF bug on the error path of probing (bsc#1244856).
- CVE-2023-52813: crypto: pcrypt - Fix hungtask for PADATA_RESET (bsc#1225527).
- CVE-2023-53020: l2tp: close all race conditions in l2tp_tunnel_register() (bsc#1240224).
- CVE-2024-28956: x86/its: Enable Indirect Target Selection mitigation (bsc#1242006).
- CVE-2025-22022: usb: xhci: Apply the link chain quirk on NEC isoc endpoints (bsc#1241292).
- CVE-2025-23141: KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses (bsc#1242782).
- CVE-2025-38075: scsi: target: iscsi: Fix timeout on deleted connection (bsc#1244734).
- CVE-2025-38102: VMCI: fix race between vmci_host_setup_notify and vmci_ctx_unset_notify (bsc#1245669).
- CVE-2025-38103: HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse() (bsc#1245663).
- CVE-2025-38117: Bluetooth: MGMT: protect mgmt_pending list with its own lock (bsc#1245695).
- CVE-2025-38122: gve: add missing NULL check for gve_alloc_pending_packet() in TX DQO (bsc#1245746).
- CVE-2025-38153: net: usb: aqc111: fix error handling of usbnet read calls (bsc#1245744).
- CVE-2025-38173: crypto: marvell/cesa - Handle zero-length skcipher requests (bsc#1245769).
- CVE-2025-38174: thunderbolt: Do not double dequeue a configuration request (bsc#1245781).
- CVE-2025-38184: tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer (bsc#1245956).
- CVE-2025-38185: atm: atmtcp: Free invalid length skb in atmtcp_c_send() (bsc#1246012).
- CVE-2025-38190: atm: Revert atm_account_tx() if copy_from_iter_full() fails (bsc#1245973).
- CVE-2025-38214: fbdev: Fix fb_set_var to prevent null-ptr-deref in fb_videomode_to_var (bsc#1246042).
- CVE-2025-38245: atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister() (bsc#1246193).
- CVE-2025-38263: bcache: fix NULL pointer in cache_set_flush() (bsc#1246248).
- CVE-2025-38313: bus: fsl-mc: fix double-free on mc_dev (bsc#1246342).
- CVE-2025-38352: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (bsc#1246911).
- CVE-2025-38386: ACPICA: Refuse to evaluate a method if arguments are missing (bsc#1247138).
- CVE-2025-38424: perf: Fix sample vs do_exit() (bsc#1246547 bsc#1247293).
- CVE-2025-38430: nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request (bsc#1247160).
- CVE-2025-38449: drm/gem: Acquire references on GEM handles for framebuffers (bsc#1247255).
- CVE-2025-38457: net/sched: Abort __tc_modify_qdisc if parent class does not exist (bsc#1247098).
- CVE-2025-38460: atm: clip: Fix potential null-ptr-deref in to_atmarpd() (bsc#1247143).
- CVE-2025-38464: tipc: Fix use-after-free in tipc_conn_close() (bsc#1247112).
- CVE-2025-38465: netlink: Fix wraparounds of sk-&gt;sk_rmem_alloc (bsc#1247118).
- CVE-2025-38470: net: vlan: fix VLAN 0 refcount imbalance of toggling filtering during runtime (bsc#1247288).
- CVE-2025-38473: Bluetooth: Fix null-ptr-deref in l2cap_sock_resume_cb() (bsc#1247289).
- CVE-2025-38474: usb: net: sierra: check for no status endpoint (bsc#1247311).
- CVE-2025-38498: do_change_type(): refuse to operate on unmounted/not ours mounts (bsc#1247374).
- CVE-2025-38499: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (bsc#1247976).
- CVE-2025-38512: wifi: prevent A-MSDU attacks in mesh networks (bsc#1248178).
- CVE-2025-38513: wifi: zd1211rw: Fix potential NULL pointer dereference in zd_mac_tx_to_dev() (bsc#1248179).
- CVE-2025-38515: drm/sched: Increment job count before swapping tail spsc queue (bsc#1248212).
- CVE-2025-38546: atm: clip: Fix memory leak of struct clip_vcc (bsc#1248223).
- CVE-2025-38556: HID: core: Harden s32ton() against conversion to 0 bits (bsc#1248296).
- CVE-2025-38563: perf/core: Prevent VMA split of buffer mappings (bsc#1248306).
- CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1248621).
- CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1248511).
- CVE-2025-38644: wifi: mac80211: reject TDLS operations when station is not associated (bsc#1248748).

The following non-security bugs were fixed:

- Disable N_GSM (jsc#PED-8240).
- Fix crash caused by backport of 'ext4: fix race when reusing xattr blocks' (bsc#1247929).
- HID: hidraw: fix a problem of memory leak in hidraw_release() (bsc#1245072).
- crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY (bsc#1225527).
- drm/framebuffer: Acquire internal references on GEM handles (bsc#1247255).
- drm/framebuffer: Fix the locking in drm_gem_fb_destroy() (bsc#1248130).
- linkage: Introduce new macros for assembler symbols (git-fixes).
- net: usb: aqc111: debug info before sanitation (bsc#1245744).
- x86/alternative: Merge include files (git-fixes).
- x86/alternatives: Add an ALTERNATIVE_3() macro (git-fixes).
- x86/alternatives: Add macro comments (git-fixes).
- x86/alternatives: Print containing function (git-fixes).
- x86/asm: Provide ALTERNATIVE_3 (git-fixes).
- x86: Simplify retpoline declaration (git-fixes).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2025-3204,SUSE-SLE-Live-Patching-12-SP5-2025-3204,SUSE-SLE-SERVER-12-SP5-LTSS-2025-3204,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-3204</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      <Description>Link for SUSE-SU-2025:03204-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:03204-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225527</URL>
      <Description>SUSE Bug 1225527</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1240224</URL>
      <Description>SUSE Bug 1240224</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1241292</URL>
      <Description>SUSE Bug 1241292</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1242006</URL>
      <Description>SUSE Bug 1242006</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1242782</URL>
      <Description>SUSE Bug 1242782</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1244337</URL>
      <Description>SUSE Bug 1244337</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1244734</URL>
      <Description>SUSE Bug 1244734</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1244773</URL>
      <Description>SUSE Bug 1244773</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1244794</URL>
      <Description>SUSE Bug 1244794</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1244797</URL>
      <Description>SUSE Bug 1244797</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1244815</URL>
      <Description>SUSE Bug 1244815</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1244824</URL>
      <Description>SUSE Bug 1244824</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1244854</URL>
      <Description>SUSE Bug 1244854</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1244856</URL>
      <Description>SUSE Bug 1244856</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1244887</URL>
      <Description>SUSE Bug 1244887</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1244899</URL>
      <Description>SUSE Bug 1244899</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1244964</URL>
      <Description>SUSE Bug 1244964</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1244972</URL>
      <Description>SUSE Bug 1244972</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1244985</URL>
      <Description>SUSE Bug 1244985</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245016</URL>
      <Description>SUSE Bug 1245016</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245072</URL>
      <Description>SUSE Bug 1245072</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245110</URL>
      <Description>SUSE Bug 1245110</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245196</URL>
      <Description>SUSE Bug 1245196</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245663</URL>
      <Description>SUSE Bug 1245663</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245669</URL>
      <Description>SUSE Bug 1245669</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245695</URL>
      <Description>SUSE Bug 1245695</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245744</URL>
      <Description>SUSE Bug 1245744</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245746</URL>
      <Description>SUSE Bug 1245746</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245769</URL>
      <Description>SUSE Bug 1245769</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245781</URL>
      <Description>SUSE Bug 1245781</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245956</URL>
      <Description>SUSE Bug 1245956</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245973</URL>
      <Description>SUSE Bug 1245973</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246012</URL>
      <Description>SUSE Bug 1246012</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246042</URL>
      <Description>SUSE Bug 1246042</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246193</URL>
      <Description>SUSE Bug 1246193</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246248</URL>
      <Description>SUSE Bug 1246248</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246342</URL>
      <Description>SUSE Bug 1246342</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246547</URL>
      <Description>SUSE Bug 1246547</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246879</URL>
      <Description>SUSE Bug 1246879</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246911</URL>
      <Description>SUSE Bug 1246911</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247098</URL>
      <Description>SUSE Bug 1247098</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247112</URL>
      <Description>SUSE Bug 1247112</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247118</URL>
      <Description>SUSE Bug 1247118</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247138</URL>
      <Description>SUSE Bug 1247138</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247143</URL>
      <Description>SUSE Bug 1247143</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247160</URL>
      <Description>SUSE Bug 1247160</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247172</URL>
      <Description>SUSE Bug 1247172</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247255</URL>
      <Description>SUSE Bug 1247255</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247288</URL>
      <Description>SUSE Bug 1247288</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247289</URL>
      <Description>SUSE Bug 1247289</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247293</URL>
      <Description>SUSE Bug 1247293</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247311</URL>
      <Description>SUSE Bug 1247311</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247374</URL>
      <Description>SUSE Bug 1247374</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247929</URL>
      <Description>SUSE Bug 1247929</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247976</URL>
      <Description>SUSE Bug 1247976</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1248108</URL>
      <Description>SUSE Bug 1248108</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1248130</URL>
      <Description>SUSE Bug 1248130</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1248178</URL>
      <Description>SUSE Bug 1248178</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1248179</URL>
      <Description>SUSE Bug 1248179</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1248212</URL>
      <Description>SUSE Bug 1248212</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1248223</URL>
      <Description>SUSE Bug 1248223</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1248296</URL>
      <Description>SUSE Bug 1248296</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1248306</URL>
      <Description>SUSE Bug 1248306</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1248377</URL>
      <Description>SUSE Bug 1248377</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1248511</URL>
      <Description>SUSE Bug 1248511</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1248621</URL>
      <Description>SUSE Bug 1248621</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1248748</URL>
      <Description>SUSE Bug 1248748</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-49967/</URL>
      <Description>SUSE CVE CVE-2022-49967 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-49975/</URL>
      <Description>SUSE CVE CVE-2022-49975 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-49980/</URL>
      <Description>SUSE CVE CVE-2022-49980 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-49981/</URL>
      <Description>SUSE CVE CVE-2022-49981 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-50007/</URL>
      <Description>SUSE CVE CVE-2022-50007 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-50066/</URL>
      <Description>SUSE CVE CVE-2022-50066 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-50080/</URL>
      <Description>SUSE CVE CVE-2022-50080 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-50116/</URL>
      <Description>SUSE CVE CVE-2022-50116 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-50127/</URL>
      <Description>SUSE CVE CVE-2022-50127 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-50138/</URL>
      <Description>SUSE CVE CVE-2022-50138 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-50141/</URL>
      <Description>SUSE CVE CVE-2022-50141 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-50162/</URL>
      <Description>SUSE CVE CVE-2022-50162 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-50185/</URL>
      <Description>SUSE CVE CVE-2022-50185 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-50191/</URL>
      <Description>SUSE CVE CVE-2022-50191 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-50228/</URL>
      <Description>SUSE CVE CVE-2022-50228 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-50229/</URL>
      <Description>SUSE CVE CVE-2022-50229 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52813/</URL>
      <Description>SUSE CVE CVE-2023-52813 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-53020/</URL>
      <Description>SUSE CVE CVE-2023-53020 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-28956/</URL>
      <Description>SUSE CVE CVE-2024-28956 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-22022/</URL>
      <Description>SUSE CVE CVE-2025-22022 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-23141/</URL>
      <Description>SUSE CVE CVE-2025-23141 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38075/</URL>
      <Description>SUSE CVE CVE-2025-38075 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38102/</URL>
      <Description>SUSE CVE CVE-2025-38102 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38103/</URL>
      <Description>SUSE CVE CVE-2025-38103 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38117/</URL>
      <Description>SUSE CVE CVE-2025-38117 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38122/</URL>
      <Description>SUSE CVE CVE-2025-38122 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38153/</URL>
      <Description>SUSE CVE CVE-2025-38153 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38173/</URL>
      <Description>SUSE CVE CVE-2025-38173 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38174/</URL>
      <Description>SUSE CVE CVE-2025-38174 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38184/</URL>
      <Description>SUSE CVE CVE-2025-38184 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38185/</URL>
      <Description>SUSE CVE CVE-2025-38185 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38190/</URL>
      <Description>SUSE CVE CVE-2025-38190 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38214/</URL>
      <Description>SUSE CVE CVE-2025-38214 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38245/</URL>
      <Description>SUSE CVE CVE-2025-38245 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38263/</URL>
      <Description>SUSE CVE CVE-2025-38263 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38313/</URL>
      <Description>SUSE CVE CVE-2025-38313 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38352/</URL>
      <Description>SUSE CVE CVE-2025-38352 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38386/</URL>
      <Description>SUSE CVE CVE-2025-38386 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38424/</URL>
      <Description>SUSE CVE CVE-2025-38424 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38430/</URL>
      <Description>SUSE CVE CVE-2025-38430 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38449/</URL>
      <Description>SUSE CVE CVE-2025-38449 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38457/</URL>
      <Description>SUSE CVE CVE-2025-38457 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38460/</URL>
      <Description>SUSE CVE CVE-2025-38460 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38464/</URL>
      <Description>SUSE CVE CVE-2025-38464 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38465/</URL>
      <Description>SUSE CVE CVE-2025-38465 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38470/</URL>
      <Description>SUSE CVE CVE-2025-38470 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38473/</URL>
      <Description>SUSE CVE CVE-2025-38473 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38474/</URL>
      <Description>SUSE CVE CVE-2025-38474 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38498/</URL>
      <Description>SUSE CVE CVE-2025-38498 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38499/</URL>
      <Description>SUSE CVE CVE-2025-38499 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38512/</URL>
      <Description>SUSE CVE CVE-2025-38512 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38513/</URL>
      <Description>SUSE CVE CVE-2025-38513 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38515/</URL>
      <Description>SUSE CVE CVE-2025-38515 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38546/</URL>
      <Description>SUSE CVE CVE-2025-38546 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38556/</URL>
      <Description>SUSE CVE CVE-2025-38556 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38563/</URL>
      <Description>SUSE CVE CVE-2025-38563 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38565/</URL>
      <Description>SUSE CVE CVE-2025-38565 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38617/</URL>
      <Description>SUSE CVE CVE-2025-38617 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38618/</URL>
      <Description>SUSE CVE CVE-2025-38618 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38644/</URL>
      <Description>SUSE CVE CVE-2025-38644 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Live Patching 12 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Live Patching 12 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12 SP5" CPE="cpe:/o:suse:sle-live-patching:12:sp5">SUSE Linux Enterprise Live Patching 12 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP5-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS" CPE="cpe:/o:suse:sles-ltss:12:sp5">SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" CPE="cpe:/o:suse:sles-ltss-extended-security:12:sp5">SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="cluster-md-kmp-default-4.12.14-122.272.1">
      <FullProductName ProductID="cluster-md-kmp-default-4.12.14-122.272.1">cluster-md-kmp-default-4.12.14-122.272.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dlm-kmp-default-4.12.14-122.272.1">
      <FullProductName ProductID="dlm-kmp-default-4.12.14-122.272.1">dlm-kmp-default-4.12.14-122.272.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gfs2-kmp-default-4.12.14-122.272.1">
      <FullProductName ProductID="gfs2-kmp-default-4.12.14-122.272.1">gfs2-kmp-default-4.12.14-122.272.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-4.12.14-122.272.1">
      <FullProductName ProductID="kernel-default-4.12.14-122.272.1">kernel-default-4.12.14-122.272.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-base-4.12.14-122.272.1">
      <FullProductName ProductID="kernel-default-base-4.12.14-122.272.1">kernel-default-base-4.12.14-122.272.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-devel-4.12.14-122.272.1">
      <FullProductName ProductID="kernel-default-devel-4.12.14-122.272.1">kernel-default-devel-4.12.14-122.272.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-extra-4.12.14-122.272.1">
      <FullProductName ProductID="kernel-default-extra-4.12.14-122.272.1">kernel-default-extra-4.12.14-122.272.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-kgraft-4.12.14-122.272.1">
      <FullProductName ProductID="kernel-default-kgraft-4.12.14-122.272.1">kernel-default-kgraft-4.12.14-122.272.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-kgraft-devel-4.12.14-122.272.1">
      <FullProductName ProductID="kernel-default-kgraft-devel-4.12.14-122.272.1">kernel-default-kgraft-devel-4.12.14-122.272.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-man-4.12.14-122.272.1">
      <FullProductName ProductID="kernel-default-man-4.12.14-122.272.1">kernel-default-man-4.12.14-122.272.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-4.12.14-122.272.1">
      <FullProductName ProductID="kernel-devel-4.12.14-122.272.1">kernel-devel-4.12.14-122.272.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-4.12.14-122.272.1">
      <FullProductName ProductID="kernel-docs-4.12.14-122.272.1">kernel-docs-4.12.14-122.272.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-html-4.12.14-122.272.1">
      <FullProductName ProductID="kernel-docs-html-4.12.14-122.272.1">kernel-docs-html-4.12.14-122.272.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-kvmsmall-4.12.14-122.272.1">
      <FullProductName ProductID="kernel-kvmsmall-4.12.14-122.272.1">kernel-kvmsmall-4.12.14-122.272.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-kvmsmall-base-4.12.14-122.272.1">
      <FullProductName ProductID="kernel-kvmsmall-base-4.12.14-122.272.1">kernel-kvmsmall-base-4.12.14-122.272.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-kvmsmall-devel-4.12.14-122.272.1">
      <FullProductName ProductID="kernel-kvmsmall-devel-4.12.14-122.272.1">kernel-kvmsmall-devel-4.12.14-122.272.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-macros-4.12.14-122.272.1">
      <FullProductName ProductID="kernel-macros-4.12.14-122.272.1">kernel-macros-4.12.14-122.272.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-obs-build-4.12.14-122.272.1">
      <FullProductName ProductID="kernel-obs-build-4.12.14-122.272.1">kernel-obs-build-4.12.14-122.272.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-obs-qa-4.12.14-122.272.1">
      <FullProductName ProductID="kernel-obs-qa-4.12.14-122.272.1">kernel-obs-qa-4.12.14-122.272.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-4.12.14-122.272.1">
      <FullProductName ProductID="kernel-source-4.12.14-122.272.1">kernel-source-4.12.14-122.272.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-vanilla-4.12.14-122.272.1">
      <FullProductName ProductID="kernel-source-vanilla-4.12.14-122.272.1">kernel-source-vanilla-4.12.14-122.272.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-4.12.14-122.272.1">
      <FullProductName ProductID="kernel-syms-4.12.14-122.272.1">kernel-syms-4.12.14-122.272.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-4.12.14-122.272.1">
      <FullProductName ProductID="kernel-vanilla-4.12.14-122.272.1">kernel-vanilla-4.12.14-122.272.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-base-4.12.14-122.272.1">
      <FullProductName ProductID="kernel-vanilla-base-4.12.14-122.272.1">kernel-vanilla-base-4.12.14-122.272.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-devel-4.12.14-122.272.1">
      <FullProductName ProductID="kernel-vanilla-devel-4.12.14-122.272.1">kernel-vanilla-devel-4.12.14-122.272.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-zfcpdump-4.12.14-122.272.1">
      <FullProductName ProductID="kernel-zfcpdump-4.12.14-122.272.1">kernel-zfcpdump-4.12.14-122.272.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-zfcpdump-man-4.12.14-122.272.1">
      <FullProductName ProductID="kernel-zfcpdump-man-4.12.14-122.272.1">kernel-zfcpdump-man-4.12.14-122.272.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kgraft-patch-4_12_14-122_272-default-1-8.3.1">
      <FullProductName ProductID="kgraft-patch-4_12_14-122_272-default-1-8.3.1">kgraft-patch-4_12_14-122_272-default-1-8.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kselftests-kmp-default-4.12.14-122.272.1">
      <FullProductName ProductID="kselftests-kmp-default-4.12.14-122.272.1">kselftests-kmp-default-4.12.14-122.272.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ocfs2-kmp-default-4.12.14-122.272.1">
      <FullProductName ProductID="ocfs2-kmp-default-4.12.14-122.272.1">ocfs2-kmp-default-4.12.14-122.272.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-default-kgraft-4.12.14-122.272.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1">kernel-default-kgraft-4.12.14-122.272.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-kgraft-devel-4.12.14-122.272.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1">kernel-default-kgraft-devel-4.12.14-122.272.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kgraft-patch-4_12_14-122_272-default-1-8.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1">kgraft-patch-4_12_14-122_272-default-1-8.3.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="cluster-md-kmp-default-4.12.14-122.272.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1">cluster-md-kmp-default-4.12.14-122.272.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-default-4.12.14-122.272.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1">dlm-kmp-default-4.12.14-122.272.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-default-4.12.14-122.272.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1">gfs2-kmp-default-4.12.14-122.272.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.272.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1">kernel-default-4.12.14-122.272.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-4.12.14-122.272.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1">kernel-default-base-4.12.14-122.272.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-4.12.14-122.272.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1">kernel-default-devel-4.12.14-122.272.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-man-4.12.14-122.272.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1">kernel-default-man-4.12.14-122.272.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-4.12.14-122.272.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1">kernel-devel-4.12.14-122.272.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-macros-4.12.14-122.272.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1">kernel-macros-4.12.14-122.272.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-4.12.14-122.272.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1">kernel-source-4.12.14-122.272.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-4.12.14-122.272.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1">kernel-syms-4.12.14-122.272.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-default-4.12.14-122.272.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1">ocfs2-kmp-default-4.12.14-122.272.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="cluster-md-kmp-default-4.12.14-122.272.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1">cluster-md-kmp-default-4.12.14-122.272.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-default-4.12.14-122.272.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1">dlm-kmp-default-4.12.14-122.272.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-default-4.12.14-122.272.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1">gfs2-kmp-default-4.12.14-122.272.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.272.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1">kernel-default-4.12.14-122.272.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-4.12.14-122.272.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1">kernel-default-base-4.12.14-122.272.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-4.12.14-122.272.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1">kernel-default-devel-4.12.14-122.272.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-4.12.14-122.272.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1">kernel-devel-4.12.14-122.272.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-macros-4.12.14-122.272.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1">kernel-macros-4.12.14-122.272.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-4.12.14-122.272.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1">kernel-source-4.12.14-122.272.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-4.12.14-122.272.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1">kernel-syms-4.12.14-122.272.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-default-4.12.14-122.272.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1">ocfs2-kmp-default-4.12.14-122.272.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix a data-race around bpf_jit_limit.

While reading bpf_jit_limit, it can be changed concurrently via sysctl,
WRITE_ONCE() in __do_proc_doulongvec_minmax(). The size of bpf_jit_limit
is long, so we need to add a paired READ_ONCE() to avoid load-tearing.</Note>
    </Notes>
    <CVE>CVE-2022-49967</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-49967.html</URL>
        <Description>CVE-2022-49967</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244964</URL>
        <Description>SUSE Bug 1244964</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bpf: Don't redirect packets with invalid pkt_len

Syzbot found an issue [1]: fq_codel_drop() try to drop a flow whitout any
skbs, that is, the flow-&gt;head is null.
The root cause, as the [2] says, is because that bpf_prog_test_run_skb()
run a bpf prog which redirects empty skbs.
So we should determine whether the length of the packet modified by bpf
prog or others like bpf_prog_test is valid before forwarding it directly.</Note>
    </Notes>
    <CVE>CVE-2022-49975</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-49975.html</URL>
        <Description>CVE-2022-49975</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245196</URL>
        <Description>SUSE Bug 1245196</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

USB: gadget: Fix use-after-free Read in usb_udc_uevent()

The syzbot fuzzer found a race between uevent callbacks and gadget
driver unregistration that can cause a use-after-free bug:

---------------------------------------------------------------
BUG: KASAN: use-after-free in usb_udc_uevent+0x11f/0x130
drivers/usb/gadget/udc/core.c:1732
Read of size 8 at addr ffff888078ce2050 by task udevd/2968

CPU: 1 PID: 2968 Comm: udevd Not tainted 5.19.0-rc4-next-20220628-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google
06/29/2022
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
 print_address_description mm/kasan/report.c:317 [inline]
 print_report.cold+0x2ba/0x719 mm/kasan/report.c:433
 kasan_report+0xbe/0x1f0 mm/kasan/report.c:495
 usb_udc_uevent+0x11f/0x130 drivers/usb/gadget/udc/core.c:1732
 dev_uevent+0x290/0x770 drivers/base/core.c:2424
---------------------------------------------------------------

The bug occurs because usb_udc_uevent() dereferences udc-&gt;driver but
does so without acquiring the udc_lock mutex, which protects this
field.  If the gadget driver is unbound from the udc concurrently with
uevent processing, the driver structure may be accessed after it has
been deallocated.

To prevent the race, we make sure that the routine holds the mutex
around the racing accesses.</Note>
    </Notes>
    <CVE>CVE-2022-49980</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-49980.html</URL>
        <Description>CVE-2022-49980</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245110</URL>
        <Description>SUSE Bug 1245110</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245111</URL>
        <Description>SUSE Bug 1245111</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

HID: hidraw: fix memory leak in hidraw_release()

Free the buffered reports before deleting the list entry.

BUG: memory leak
unreferenced object 0xffff88810e72f180 (size 32):
  comm "softirq", pid 0, jiffies 4294945143 (age 16.080s)
  hex dump (first 32 bytes):
    64 f3 c6 6a d1 88 07 04 00 00 00 00 00 00 00 00  d..j............
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;ffffffff814ac6c3&gt;] kmemdup+0x23/0x50 mm/util.c:128
    [&lt;ffffffff8357c1d2&gt;] kmemdup include/linux/fortify-string.h:440 [inline]
    [&lt;ffffffff8357c1d2&gt;] hidraw_report_event+0xa2/0x150 drivers/hid/hidraw.c:521
    [&lt;ffffffff8356ddad&gt;] hid_report_raw_event+0x27d/0x740 drivers/hid/hid-core.c:1992
    [&lt;ffffffff8356e41e&gt;] hid_input_report+0x1ae/0x270 drivers/hid/hid-core.c:2065
    [&lt;ffffffff835f0d3f&gt;] hid_irq_in+0x1ff/0x250 drivers/hid/usbhid/hid-core.c:284
    [&lt;ffffffff82d3c7f9&gt;] __usb_hcd_giveback_urb+0xf9/0x230 drivers/usb/core/hcd.c:1670
    [&lt;ffffffff82d3cc26&gt;] usb_hcd_giveback_urb+0x1b6/0x1d0 drivers/usb/core/hcd.c:1747
    [&lt;ffffffff82ef1e14&gt;] dummy_timer+0x8e4/0x14c0 drivers/usb/gadget/udc/dummy_hcd.c:1988
    [&lt;ffffffff812f50a8&gt;] call_timer_fn+0x38/0x200 kernel/time/timer.c:1474
    [&lt;ffffffff812f5586&gt;] expire_timers kernel/time/timer.c:1519 [inline]
    [&lt;ffffffff812f5586&gt;] __run_timers.part.0+0x316/0x430 kernel/time/timer.c:1790
    [&lt;ffffffff812f56e4&gt;] __run_timers kernel/time/timer.c:1768 [inline]
    [&lt;ffffffff812f56e4&gt;] run_timer_softirq+0x44/0x90 kernel/time/timer.c:1803
    [&lt;ffffffff848000e6&gt;] __do_softirq+0xe6/0x2ea kernel/softirq.c:571
    [&lt;ffffffff81246db0&gt;] invoke_softirq kernel/softirq.c:445 [inline]
    [&lt;ffffffff81246db0&gt;] __irq_exit_rcu kernel/softirq.c:650 [inline]
    [&lt;ffffffff81246db0&gt;] irq_exit_rcu+0xc0/0x110 kernel/softirq.c:662
    [&lt;ffffffff84574f02&gt;] sysvec_apic_timer_interrupt+0xa2/0xd0 arch/x86/kernel/apic/apic.c:1106
    [&lt;ffffffff84600c8b&gt;] asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:649
    [&lt;ffffffff8458a070&gt;] native_safe_halt arch/x86/include/asm/irqflags.h:51 [inline]
    [&lt;ffffffff8458a070&gt;] arch_safe_halt arch/x86/include/asm/irqflags.h:89 [inline]
    [&lt;ffffffff8458a070&gt;] acpi_safe_halt drivers/acpi/processor_idle.c:111 [inline]
    [&lt;ffffffff8458a070&gt;] acpi_idle_do_entry+0xc0/0xd0 drivers/acpi/processor_idle.c:554</Note>
    </Notes>
    <CVE>CVE-2022-49981</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-49981.html</URL>
        <Description>CVE-2022-49981</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245072</URL>
        <Description>SUSE Bug 1245072</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

xfrm: fix refcount leak in __xfrm_policy_check()

The issue happens on an error path in __xfrm_policy_check(). When the
fetching process of the object `pols[1]` fails, the function simply
returns 0, forgetting to decrement the reference count of `pols[0]`,
which is incremented earlier by either xfrm_sk_policy_lookup() or
xfrm_policy_lookup(). This may result in memory leaks.

Fix it by decreasing the reference count of `pols[0]` in that path.</Note>
    </Notes>
    <CVE>CVE-2022-50007</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-50007.html</URL>
        <Description>CVE-2022-50007</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245016</URL>
        <Description>SUSE Bug 1245016</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: atlantic: fix aq_vec index out of range error

The final update statement of the for loop exceeds the array range, the
dereference of self-&gt;aq_vec[i] is not checked and then leads to the
index out of range error.
Also fixed this kind of coding style in other for loop.

[   97.937604] UBSAN: array-index-out-of-bounds in drivers/net/ethernet/aquantia/atlantic/aq_nic.c:1404:48
[   97.937607] index 8 is out of range for type 'aq_vec_s *[8]'
[   97.937608] CPU: 38 PID: 3767 Comm: kworker/u256:18 Not tainted 5.19.0+ #2
[   97.937610] Hardware name: Dell Inc. Precision 7865 Tower/, BIOS 1.0.0 06/12/2022
[   97.937611] Workqueue: events_unbound async_run_entry_fn
[   97.937616] Call Trace:
[   97.937617]  &lt;TASK&gt;
[   97.937619]  dump_stack_lvl+0x49/0x63
[   97.937624]  dump_stack+0x10/0x16
[   97.937626]  ubsan_epilogue+0x9/0x3f
[   97.937627]  __ubsan_handle_out_of_bounds.cold+0x44/0x49
[   97.937629]  ? __scm_send+0x348/0x440
[   97.937632]  ? aq_vec_stop+0x72/0x80 [atlantic]
[   97.937639]  aq_nic_stop+0x1b6/0x1c0 [atlantic]
[   97.937644]  aq_suspend_common+0x88/0x90 [atlantic]
[   97.937648]  aq_pm_suspend_poweroff+0xe/0x20 [atlantic]
[   97.937653]  pci_pm_suspend+0x7e/0x1a0
[   97.937655]  ? pci_pm_suspend_noirq+0x2b0/0x2b0
[   97.937657]  dpm_run_callback+0x54/0x190
[   97.937660]  __device_suspend+0x14c/0x4d0
[   97.937661]  async_suspend+0x23/0x70
[   97.937663]  async_run_entry_fn+0x33/0x120
[   97.937664]  process_one_work+0x21f/0x3f0
[   97.937666]  worker_thread+0x4a/0x3c0
[   97.937668]  ? process_one_work+0x3f0/0x3f0
[   97.937669]  kthread+0xf0/0x120
[   97.937671]  ? kthread_complete_and_exit+0x20/0x20
[   97.937672]  ret_from_fork+0x22/0x30
[   97.937676]  &lt;/TASK&gt;

v2. fixed "warning: variable 'aq_vec' set but not used"

v3. simplified a for loop</Note>
    </Notes>
    <CVE>CVE-2022-50066</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-50066.html</URL>
        <Description>CVE-2022-50066</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244985</URL>
        <Description>SUSE Bug 1244985</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tee: add overflow check in register_shm_helper()

With special lengths supplied by user space, register_shm_helper() has
an integer overflow when calculating the number of pages covered by a
supplied user space memory region.

This causes internal_get_user_pages_fast() a helper function of
pin_user_pages_fast() to do a NULL pointer dereference:

  Unable to handle kernel NULL pointer dereference at virtual address 0000000000000010
  Modules linked in:
  CPU: 1 PID: 173 Comm: optee_example_a Not tainted 5.19.0 #11
  Hardware name: QEMU QEMU Virtual Machine, BIOS 0.0.0 02/06/2015
  pc : internal_get_user_pages_fast+0x474/0xa80
  Call trace:
   internal_get_user_pages_fast+0x474/0xa80
   pin_user_pages_fast+0x24/0x4c
   register_shm_helper+0x194/0x330
   tee_shm_register_user_buf+0x78/0x120
   tee_ioctl+0xd0/0x11a0
   __arm64_sys_ioctl+0xa8/0xec
   invoke_syscall+0x48/0x114

Fix this by adding an an explicit call to access_ok() in
tee_shm_register_user_buf() to catch an invalid user space address
early.</Note>
    </Notes>
    <CVE>CVE-2022-50080</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-50080.html</URL>
        <Description>CVE-2022-50080</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244972</URL>
        <Description>SUSE Bug 1244972</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tty: n_gsm: fix deadlock and link starvation in outgoing data path

The current implementation queues up new control and user packets as needed
and processes this queue down to the ldisc in the same code path.
That means that the upper and the lower layer are hard coupled in the code.
Due to this deadlocks can happen as seen below while transmitting data,
especially during ldisc congestion. Furthermore, the data channels starve
the control channel on high transmission load on the ldisc.

Introduce an additional control channel data queue to prevent timeouts and
link hangups during ldisc congestion. This is being processed before the
user channel data queue in gsm_data_kick(), i.e. with the highest priority.
Put the queue to ldisc data path into a workqueue and trigger it whenever
new data has been put into the transmission queue. Change
gsm_dlci_data_sweep() accordingly to fill up the transmission queue until
TX_THRESH_HI. This solves the locking issue, keeps latency low and provides
good performance on high data load.
Note that now all packets from a DLCI are removed from the internal queue
if the associated DLCI was closed. This ensures that no data is sent by the
introduced write task to an already closed DLCI.

BUG: spinlock recursion on CPU#0, test_v24_loop/124
 lock: serial8250_ports+0x3a8/0x7500, .magic: dead4ead, .owner: test_v24_loop/124, .owner_cpu: 0
CPU: 0 PID: 124 Comm: test_v24_loop Tainted: G           O      5.18.0-rc2 #3
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
Call Trace:
 &lt;IRQ&gt;
 dump_stack_lvl+0x34/0x44
 do_raw_spin_lock+0x76/0xa0
 _raw_spin_lock_irqsave+0x72/0x80
 uart_write_room+0x3b/0xc0
 gsm_data_kick+0x14b/0x240 [n_gsm]
 gsmld_write_wakeup+0x35/0x70 [n_gsm]
 tty_wakeup+0x53/0x60
 tty_port_default_wakeup+0x1b/0x30
 serial8250_tx_chars+0x12f/0x220
 serial8250_handle_irq.part.0+0xfe/0x150
 serial8250_default_handle_irq+0x48/0x80
 serial8250_interrupt+0x56/0xa0
 __handle_irq_event_percpu+0x78/0x1f0
 handle_irq_event+0x34/0x70
 handle_fasteoi_irq+0x90/0x1e0
 __common_interrupt+0x69/0x100
 common_interrupt+0x48/0xc0
 asm_common_interrupt+0x1e/0x40
RIP: 0010:__do_softirq+0x83/0x34e
Code: 2a 0a ff 0f b7 ed c7 44 24 10 0a 00 00 00 48 c7 c7 51 2a 64 82 e8 2d
e2 d5 ff 65 66 c7 05 83 af 1e 7e 00 00 fb b8 ff ff ff ff &lt;49&gt; c7 c2 40 61
80 82 0f bc c5 41 89 c4 41 83 c4 01 0f 84 e6 00 00
RSP: 0018:ffffc90000003f98 EFLAGS: 00000286
RAX: 00000000ffffffff RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffffffff82642a51 RDI: ffffffff825bb5e7
RBP: 0000000000000200 R08: 00000008de3271a8 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000030 R14: 0000000000000000 R15: 0000000000000000
 ? __do_softirq+0x73/0x34e
 irq_exit_rcu+0xb5/0x100
 common_interrupt+0xa4/0xc0
 &lt;/IRQ&gt;
 &lt;TASK&gt;
 asm_common_interrupt+0x1e/0x40
RIP: 0010:_raw_spin_unlock_irqrestore+0x2e/0x50
Code: 00 55 48 89 fd 48 83 c7 18 53 48 89 f3 48 8b 74 24 10 e8 85 28 36 ff
48 89 ef e8 cd 58 36 ff 80 e7 02 74 01 fb bf 01 00 00 00 &lt;e8&gt; 3d 97 33 ff
65 8b 05 96 23 2b 7e 85 c0 74 03 5b 5d c3 0f 1f 44
RSP: 0018:ffffc9000020fd08 EFLAGS: 00000202
RAX: 0000000000000000 RBX: 0000000000000246 RCX: 0000000000000000
RDX: 0000000000000004 RSI: ffffffff8257fd74 RDI: 0000000000000001
RBP: ffff8880057de3a0 R08: 00000008de233000 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000100 R14: 0000000000000202 R15: ffff8880057df0b8
 ? _raw_spin_unlock_irqrestore+0x23/0x50
 gsmtty_write+0x65/0x80 [n_gsm]
 n_tty_write+0x33f/0x530
 ? swake_up_all+0xe0/0xe0
 file_tty_write.constprop.0+0x1b1/0x320
 ? n_tty_flush_buffer+0xb0/0xb0
 new_sync_write+0x10c/0x190
 vfs_write+0x282/0x310
 ksys_write+0x68/0xe0
 do_syscall_64+0x3b/0x90
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f3e5e35c15c
Code: 8b 7c 24 08 89 c5 e8 c5 ff ff ff 89 ef 89 44 24
---truncated---</Note>
    </Notes>
    <CVE>CVE-2022-50116</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-50116.html</URL>
        <Description>CVE-2022-50116</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244824</URL>
        <Description>SUSE Bug 1244824</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Fix error unwind in rxe_create_qp()

In the function rxe_create_qp(), rxe_qp_from_init() is called to
initialize qp, internally things like the spin locks are not setup until
rxe_qp_init_req().

If an error occures before this point then the unwind will call
rxe_cleanup() and eventually to rxe_qp_do_cleanup()/rxe_cleanup_task()
which will oops when trying to access the uninitialized spinlock.

Move the spinlock initializations earlier before any failures.</Note>
    </Notes>
    <CVE>CVE-2022-50127</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-50127.html</URL>
        <Description>CVE-2022-50127</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244815</URL>
        <Description>SUSE Bug 1244815</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

RDMA/qedr: Fix potential memory leak in __qedr_alloc_mr()

__qedr_alloc_mr() allocates a memory chunk for "mr-&gt;info.pbl_table" with
init_mr_info(). When rdma_alloc_tid() and rdma_register_tid() fail, "mr"
is released while "mr-&gt;info.pbl_table" is not released, which will lead
to a memory leak.

We should release the "mr-&gt;info.pbl_table" with qedr_free_pbl() when error
occurs to fix the memory leak.</Note>
    </Notes>
    <CVE>CVE-2022-50138</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-50138.html</URL>
        <Description>CVE-2022-50138</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244797</URL>
        <Description>SUSE Bug 1244797</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mmc: sdhci-of-esdhc: Fix refcount leak in esdhc_signal_voltage_switch

of_find_matching_node() returns a node pointer with refcount
incremented, we should use of_node_put() on it when not need anymore.
Add missing of_node_put() to avoid refcount leak.
of_node_put() checks null pointer.</Note>
    </Notes>
    <CVE>CVE-2022-50141</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-50141.html</URL>
        <Description>CVE-2022-50141</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244794</URL>
        <Description>SUSE Bug 1244794</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: libertas: Fix possible refcount leak in if_usb_probe()

usb_get_dev will be called before lbs_get_firmware_async which means that
usb_put_dev need to be called when lbs_get_firmware_async fails.</Note>
    </Notes>
    <CVE>CVE-2022-50162</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-50162.html</URL>
        <Description>CVE-2022-50162</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244773</URL>
        <Description>SUSE Bug 1244773</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers()

The last case label can write two buffers 'mc_reg_address[j]' and
'mc_data[j]' with 'j' offset equal to SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE
since there are no checks for this value in both case labels after the
last 'j++'.

Instead of changing '&gt;' to '&gt;=' there, add the bounds check at the start
of the second 'case' (the first one already has it).

Also, remove redundant last checks for 'j' index bigger than array size.
The expression is always false. Moreover, before or after the patch
'table-&gt;last' can be equal to SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE and it
seems it can be a valid value.

Detected using the static analysis tool - Svace.</Note>
    </Notes>
    <CVE>CVE-2022-50185</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-50185.html</URL>
        <Description>CVE-2022-50185</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244887</URL>
        <Description>SUSE Bug 1244887</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

regulator: of: Fix refcount leak bug in of_get_regulation_constraints()

We should call the of_node_put() for the reference returned by
of_get_child_by_name() which has increased the refcount.</Note>
    </Notes>
    <CVE>CVE-2022-50191</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-50191.html</URL>
        <Description>CVE-2022-50191</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244899</URL>
        <Description>SUSE Bug 1244899</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

KVM: SVM: Don't BUG if userspace injects an interrupt with GIF=0

Don't BUG/WARN on interrupt injection due to GIF being cleared,
since it's trivial for userspace to force the situation via
KVM_SET_VCPU_EVENTS (even if having at least a WARN there would be correct
for KVM internally generated injections).

  kernel BUG at arch/x86/kvm/svm/svm.c:3386!
  invalid opcode: 0000 [#1] SMP
  CPU: 15 PID: 926 Comm: smm_test Not tainted 5.17.0-rc3+ #264
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
  RIP: 0010:svm_inject_irq+0xab/0xb0 [kvm_amd]
  Code: &lt;0f&gt; 0b 0f 1f 00 0f 1f 44 00 00 80 3d ac b3 01 00 00 55 48 89 f5 53
  RSP: 0018:ffffc90000b37d88 EFLAGS: 00010246
  RAX: 0000000000000000 RBX: ffff88810a234ac0 RCX: 0000000000000006
  RDX: 0000000000000000 RSI: ffffc90000b37df7 RDI: ffff88810a234ac0
  RBP: ffffc90000b37df7 R08: ffff88810a1fa410 R09: 0000000000000000
  R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
  R13: ffff888109571000 R14: ffff88810a234ac0 R15: 0000000000000000
  FS:  0000000001821380(0000) GS:ffff88846fdc0000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007f74fc550008 CR3: 000000010a6fe000 CR4: 0000000000350ea0
  Call Trace:
   &lt;TASK&gt;
   inject_pending_event+0x2f7/0x4c0 [kvm]
   kvm_arch_vcpu_ioctl_run+0x791/0x17a0 [kvm]
   kvm_vcpu_ioctl+0x26d/0x650 [kvm]
   __x64_sys_ioctl+0x82/0xb0
   do_syscall_64+0x3b/0xc0
   entry_SYSCALL_64_after_hwframe+0x44/0xae
   &lt;/TASK&gt;</Note>
    </Notes>
    <CVE>CVE-2022-50228</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-50228.html</URL>
        <Description>CVE-2022-50228</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244854</URL>
        <Description>SUSE Bug 1244854</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ALSA: bcd2000: Fix a UAF bug on the error path of probing

When the driver fails in snd_card_register() at probe time, it will free
the 'bcd2k-&gt;midi_out_urb' before killing it, which may cause a UAF bug.

The following log can reveal it:

[   50.727020] BUG: KASAN: use-after-free in bcd2000_input_complete+0x1f1/0x2e0 [snd_bcd2000]
[   50.727623] Read of size 8 at addr ffff88810fab0e88 by task swapper/4/0
[   50.729530] Call Trace:
[   50.732899]  bcd2000_input_complete+0x1f1/0x2e0 [snd_bcd2000]

Fix this by adding usb_kill_urb() before usb_free_urb().</Note>
    </Notes>
    <CVE>CVE-2022-50229</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-50229.html</URL>
        <Description>CVE-2022-50229</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244856</URL>
        <Description>SUSE Bug 1244856</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

crypto: pcrypt - Fix hungtask for PADATA_RESET

We found a hungtask bug in test_aead_vec_cfg as follows:

INFO: task cryptomgr_test:391009 blocked for more than 120 seconds.
"echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Call trace:
 __switch_to+0x98/0xe0
 __schedule+0x6c4/0xf40
 schedule+0xd8/0x1b4
 schedule_timeout+0x474/0x560
 wait_for_common+0x368/0x4e0
 wait_for_completion+0x20/0x30
 wait_for_completion+0x20/0x30
 test_aead_vec_cfg+0xab4/0xd50
 test_aead+0x144/0x1f0
 alg_test_aead+0xd8/0x1e0
 alg_test+0x634/0x890
 cryptomgr_test+0x40/0x70
 kthread+0x1e0/0x220
 ret_from_fork+0x10/0x18
 Kernel panic - not syncing: hung_task: blocked tasks

For padata_do_parallel, when the return err is 0 or -EBUSY, it will call
wait_for_completion(&amp;wait-&gt;completion) in test_aead_vec_cfg. In normal
case, aead_request_complete() will be called in pcrypt_aead_serial and the
return err is 0 for padata_do_parallel. But, when pinst-&gt;flags is
PADATA_RESET, the return err is -EBUSY for padata_do_parallel, and it
won't call aead_request_complete(). Therefore, test_aead_vec_cfg will
hung at wait_for_completion(&amp;wait-&gt;completion), which will cause
hungtask.

The problem comes as following:
(padata_do_parallel)                 |
    rcu_read_lock_bh();              |
    err = -EINVAL;                   |   (padata_replace)
                                     |     pinst-&gt;flags |= PADATA_RESET;
    err = -EBUSY                     |
    if (pinst-&gt;flags &amp; PADATA_RESET) |
        rcu_read_unlock_bh()         |
        return err

In order to resolve the problem, we replace the return err -EBUSY with
-EAGAIN, which means parallel_data is changing, and the caller should call
it again.

v3:
remove retry and just change the return err.
v2:
introduce padata_try_do_parallel() in pcrypt_aead_encrypt and
pcrypt_aead_decrypt to solve the hungtask.</Note>
    </Notes>
    <CVE>CVE-2023-52813</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52813.html</URL>
        <Description>CVE-2023-52813</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225527</URL>
        <Description>SUSE Bug 1225527</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

l2tp: close all race conditions in l2tp_tunnel_register()

The code in l2tp_tunnel_register() is racy in several ways:

1. It modifies the tunnel socket _after_ publishing it.

2. It calls setup_udp_tunnel_sock() on an existing socket without
   locking.

3. It changes sock lock class on fly, which triggers many syzbot
   reports.

This patch amends all of them by moving socket initialization code
before publishing and under sock lock. As suggested by Jakub, the
l2tp lockdep class is not necessary as we can just switch to
bh_lock_sock_nested().</Note>
    </Notes>
    <CVE>CVE-2023-53020</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-53020.html</URL>
        <Description>CVE-2023-53020</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1240224</URL>
        <Description>SUSE Bug 1240224</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.</Note>
    </Notes>
    <CVE>CVE-2024-28956</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-28956.html</URL>
        <Description>CVE-2024-28956</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1242006</URL>
        <Description>SUSE Bug 1242006</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

usb: xhci: Apply the link chain quirk on NEC isoc endpoints

Two clearly different specimens of NEC uPD720200 (one with start/stop
bug, one without) were seen to cause IOMMU faults after some Missed
Service Errors. Faulting address is immediately after a transfer ring
segment and patched dynamic debug messages revealed that the MSE was
received when waiting for a TD near the end of that segment:

[ 1.041954] xhci_hcd: Miss service interval error for slot 1 ep 2 expected TD DMA ffa08fe0
[ 1.042120] xhci_hcd: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x0005 address=0xffa09000 flags=0x0000]
[ 1.042146] xhci_hcd: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x0005 address=0xffa09040 flags=0x0000]

It gets even funnier if the next page is a ring segment accessible to
the HC. Below, it reports MSE in segment at ff1e8000, plows through a
zero-filled page at ff1e9000 and starts reporting events for TRBs in
page at ff1ea000 every microframe, instead of jumping to seg ff1e6000.

[ 7.041671] xhci_hcd: Miss service interval error for slot 1 ep 2 expected TD DMA ff1e8fe0
[ 7.041999] xhci_hcd: Miss service interval error for slot 1 ep 2 expected TD DMA ff1e8fe0
[ 7.042011] xhci_hcd: WARN: buffer overrun event for slot 1 ep 2 on endpoint
[ 7.042028] xhci_hcd: All TDs skipped for slot 1 ep 2. Clear skip flag.
[ 7.042134] xhci_hcd: WARN: buffer overrun event for slot 1 ep 2 on endpoint
[ 7.042138] xhci_hcd: ERROR Transfer event TRB DMA ptr not part of current TD ep_index 2 comp_code 31
[ 7.042144] xhci_hcd: Looking for event-dma 00000000ff1ea040 trb-start 00000000ff1e6820 trb-end 00000000ff1e6820
[ 7.042259] xhci_hcd: WARN: buffer overrun event for slot 1 ep 2 on endpoint
[ 7.042262] xhci_hcd: ERROR Transfer event TRB DMA ptr not part of current TD ep_index 2 comp_code 31
[ 7.042266] xhci_hcd: Looking for event-dma 00000000ff1ea050 trb-start 00000000ff1e6820 trb-end 00000000ff1e6820

At some point completion events change from Isoch Buffer Overrun to
Short Packet and the HC finally finds cycle bit mismatch in ff1ec000.

[ 7.098130] xhci_hcd: ERROR Transfer event TRB DMA ptr not part of current TD ep_index 2 comp_code 13
[ 7.098132] xhci_hcd: Looking for event-dma 00000000ff1ecc50 trb-start 00000000ff1e6820 trb-end 00000000ff1e6820
[ 7.098254] xhci_hcd: ERROR Transfer event TRB DMA ptr not part of current TD ep_index 2 comp_code 13
[ 7.098256] xhci_hcd: Looking for event-dma 00000000ff1ecc60 trb-start 00000000ff1e6820 trb-end 00000000ff1e6820
[ 7.098379] xhci_hcd: Overrun event on slot 1 ep 2

It's possible that data from the isochronous device were written to
random buffers of pending TDs on other endpoints (either IN or OUT),
other devices or even other HCs in the same IOMMU domain.

Lastly, an error from a different USB device on another HC. Was it
caused by the above? I don't know, but it may have been. The disk
was working without any other issues and generated PCIe traffic to
starve the NEC of upstream BW and trigger those MSEs. The two HCs
shared one x1 slot by means of a commercial "PCIe splitter" board.

[ 7.162604] usb 10-2: reset SuperSpeed USB device number 3 using xhci_hcd
[ 7.178990] sd 9:0:0:0: [sdb] tag#0 UNKNOWN(0x2003) Result: hostbyte=0x07 driverbyte=DRIVER_OK cmd_age=0s
[ 7.179001] sd 9:0:0:0: [sdb] tag#0 CDB: opcode=0x28 28 00 04 02 ae 00 00 02 00 00
[ 7.179004] I/O error, dev sdb, sector 67284480 op 0x0:(READ) flags 0x80700 phys_seg 5 prio class 0

Fortunately, it appears that this ridiculous bug is avoided by setting
the chain bit of Link TRBs on isochronous rings. Other ancient HCs are
known which also expect the bit to be set and they ignore Link TRBs if
it's not. Reportedly, 0.95 spec guaranteed that the bit is set.

The bandwidth-starved NEC HC running a 32KB/uframe UVC endpoint reports
tens of MSEs per second and runs into the bug within seconds. Chaining
Link TRBs allows the same workload to run for many minutes, many times.

No ne
---truncated---</Note>
    </Notes>
    <CVE>CVE-2025-22022</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-22022.html</URL>
        <Description>CVE-2025-22022</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1241292</URL>
        <Description>SUSE Bug 1241292</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses

Acquire a lock on kvm-&gt;srcu when userspace is getting MP state to handle a
rather extreme edge case where "accepting" APIC events, i.e. processing
pending INIT or SIPI, can trigger accesses to guest memory.  If the vCPU
is in L2 with INIT *and* a TRIPLE_FAULT request pending, then getting MP
state will trigger a nested VM-Exit by way of -&gt;check_nested_events(), and
emuating the nested VM-Exit can access guest memory.

The splat was originally hit by syzkaller on a Google-internal kernel, and
reproduced on an upstream kernel by hacking the triple_fault_event_test
selftest to stuff a pending INIT, store an MSR on VM-Exit (to generate a
memory access on VMX), and do vcpu_mp_state_get() to trigger the scenario.

  =============================
  WARNING: suspicious RCU usage
  6.14.0-rc3-b112d356288b-vmx/pi_lockdep_false_pos-lock #3 Not tainted
  -----------------------------
  include/linux/kvm_host.h:1058 suspicious rcu_dereference_check() usage!

  other info that might help us debug this:

  rcu_scheduler_active = 2, debug_locks = 1
  1 lock held by triple_fault_ev/1256:
   #0: ffff88810df5a330 (&amp;vcpu-&gt;mutex){+.+.}-{4:4}, at: kvm_vcpu_ioctl+0x8b/0x9a0 [kvm]

  stack backtrace:
  CPU: 11 UID: 1000 PID: 1256 Comm: triple_fault_ev Not tainted 6.14.0-rc3-b112d356288b-vmx #3
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x7f/0x90
   lockdep_rcu_suspicious+0x144/0x190
   kvm_vcpu_gfn_to_memslot+0x156/0x180 [kvm]
   kvm_vcpu_read_guest+0x3e/0x90 [kvm]
   read_and_check_msr_entry+0x2e/0x180 [kvm_intel]
   __nested_vmx_vmexit+0x550/0xde0 [kvm_intel]
   kvm_check_nested_events+0x1b/0x30 [kvm]
   kvm_apic_accept_events+0x33/0x100 [kvm]
   kvm_arch_vcpu_ioctl_get_mpstate+0x30/0x1d0 [kvm]
   kvm_vcpu_ioctl+0x33e/0x9a0 [kvm]
   __x64_sys_ioctl+0x8b/0xb0
   do_syscall_64+0x6c/0x170
   entry_SYSCALL_64_after_hwframe+0x4b/0x53
   &lt;/TASK&gt;</Note>
    </Notes>
    <CVE>CVE-2025-23141</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-23141.html</URL>
        <Description>CVE-2025-23141</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1242782</URL>
        <Description>SUSE Bug 1242782</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: target: iscsi: Fix timeout on deleted connection

NOPIN response timer may expire on a deleted connection and crash with
such logs:

Did not receive response to NOPIN on CID: 0, failing connection for I_T Nexus (null),i,0x00023d000125,iqn.2017-01.com.iscsi.target,t,0x3d

BUG: Kernel NULL pointer dereference on read at 0x00000000
NIP  strlcpy+0x8/0xb0
LR iscsit_fill_cxn_timeout_err_stats+0x5c/0xc0 [iscsi_target_mod]
Call Trace:
 iscsit_handle_nopin_response_timeout+0xfc/0x120 [iscsi_target_mod]
 call_timer_fn+0x58/0x1f0
 run_timer_softirq+0x740/0x860
 __do_softirq+0x16c/0x420
 irq_exit+0x188/0x1c0
 timer_interrupt+0x184/0x410

That is because nopin response timer may be re-started on nopin timer
expiration.

Stop nopin timer before stopping the nopin response timer to be sure
that no one of them will be re-started.</Note>
    </Notes>
    <CVE>CVE-2025-38075</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38075.html</URL>
        <Description>CVE-2025-38075</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244734</URL>
        <Description>SUSE Bug 1244734</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

VMCI: fix race between vmci_host_setup_notify and vmci_ctx_unset_notify

During our test, it is found that a warning can be trigger in try_grab_folio
as follow:

  ------------[ cut here ]------------
  WARNING: CPU: 0 PID: 1678 at mm/gup.c:147 try_grab_folio+0x106/0x130
  Modules linked in:
  CPU: 0 UID: 0 PID: 1678 Comm: syz.3.31 Not tainted 6.15.0-rc5 #163 PREEMPT(undef)
  RIP: 0010:try_grab_folio+0x106/0x130
  Call Trace:
   &lt;TASK&gt;
   follow_huge_pmd+0x240/0x8e0
   follow_pmd_mask.constprop.0.isra.0+0x40b/0x5c0
   follow_pud_mask.constprop.0.isra.0+0x14a/0x170
   follow_page_mask+0x1c2/0x1f0
   __get_user_pages+0x176/0x950
   __gup_longterm_locked+0x15b/0x1060
   ? gup_fast+0x120/0x1f0
   gup_fast_fallback+0x17e/0x230
   get_user_pages_fast+0x5f/0x80
   vmci_host_unlocked_ioctl+0x21c/0xf80
  RIP: 0033:0x54d2cd
  ---[ end trace 0000000000000000 ]---

Digging into the source, context-&gt;notify_page may init by get_user_pages_fast
and can be seen in vmci_ctx_unset_notify which will try to put_page. However
get_user_pages_fast is not finished here and lead to following
try_grab_folio warning. The race condition is shown as follow:

cpu0			cpu1
vmci_host_do_set_notify
vmci_host_setup_notify
get_user_pages_fast(uva, 1, FOLL_WRITE, &amp;context-&gt;notify_page);
lockless_pages_from_mm
gup_pgd_range
gup_huge_pmd  // update &amp;context-&gt;notify_page
			vmci_host_do_set_notify
			vmci_ctx_unset_notify
			notify_page = context-&gt;notify_page;
			if (notify_page)
			put_page(notify_page);	// page is freed
__gup_longterm_locked
__get_user_pages
follow_trans_huge_pmd
try_grab_folio // warn here

To slove this, use local variable page to make notify_page can be seen
after finish get_user_pages_fast.</Note>
    </Notes>
    <CVE>CVE-2025-38102</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38102.html</URL>
        <Description>CVE-2025-38102</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245669</URL>
        <Description>SUSE Bug 1245669</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse()

Update struct hid_descriptor to better reflect the mandatory and
optional parts of the HID Descriptor as per USB HID 1.11 specification.
Note: the kernel currently does not parse any optional HID class
descriptors, only the mandatory report descriptor.

Update all references to member element desc[0] to rpt_desc.

Add test to verify bLength and bNumDescriptors values are valid.

Replace the for loop with direct access to the mandatory HID class
descriptor member for the report descriptor. This eliminates the
possibility of getting an out-of-bounds fault.

Add a warning message if the HID descriptor contains any unsupported
optional HID class descriptors.</Note>
    </Notes>
    <CVE>CVE-2025-38103</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38103.html</URL>
        <Description>CVE-2025-38103</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245663</URL>
        <Description>SUSE Bug 1245663</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: MGMT: Protect mgmt_pending list with its own lock

This uses a mutex to protect from concurrent access of mgmt_pending
list which can cause crashes like:

==================================================================
BUG: KASAN: slab-use-after-free in hci_sock_get_channel+0x60/0x68 net/bluetooth/hci_sock.c:91
Read of size 2 at addr ffff0000c48885b2 by task syz.4.334/7318

CPU: 0 UID: 0 PID: 7318 Comm: syz.4.334 Not tainted 6.15.0-rc7-syzkaller-g187899f4124a #0 PREEMPT
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
Call trace:
 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C)
 __dump_stack+0x30/0x40 lib/dump_stack.c:94
 dump_stack_lvl+0xd8/0x12c lib/dump_stack.c:120
 print_address_description+0xa8/0x254 mm/kasan/report.c:408
 print_report+0x68/0x84 mm/kasan/report.c:521
 kasan_report+0xb0/0x110 mm/kasan/report.c:634
 __asan_report_load2_noabort+0x20/0x2c mm/kasan/report_generic.c:379
 hci_sock_get_channel+0x60/0x68 net/bluetooth/hci_sock.c:91
 mgmt_pending_find+0x7c/0x140 net/bluetooth/mgmt_util.c:223
 pending_find net/bluetooth/mgmt.c:947 [inline]
 remove_adv_monitor+0x44/0x1a4 net/bluetooth/mgmt.c:5445
 hci_mgmt_cmd+0x780/0xc00 net/bluetooth/hci_sock.c:1712
 hci_sock_sendmsg+0x544/0xbb0 net/bluetooth/hci_sock.c:1832
 sock_sendmsg_nosec net/socket.c:712 [inline]
 __sock_sendmsg net/socket.c:727 [inline]
 sock_write_iter+0x25c/0x378 net/socket.c:1131
 new_sync_write fs/read_write.c:591 [inline]
 vfs_write+0x62c/0x97c fs/read_write.c:684
 ksys_write+0x120/0x210 fs/read_write.c:736
 __do_sys_write fs/read_write.c:747 [inline]
 __se_sys_write fs/read_write.c:744 [inline]
 __arm64_sys_write+0x7c/0x90 fs/read_write.c:744
 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
 invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49
 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132
 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151
 el0_svc+0x58/0x17c arch/arm64/kernel/entry-common.c:767
 el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:786
 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600

Allocated by task 7037:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x40/0x78 mm/kasan/common.c:68
 kasan_save_alloc_info+0x44/0x54 mm/kasan/generic.c:562
 poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
 __kasan_kmalloc+0x9c/0xb4 mm/kasan/common.c:394
 kasan_kmalloc include/linux/kasan.h:260 [inline]
 __do_kmalloc_node mm/slub.c:4327 [inline]
 __kmalloc_noprof+0x2fc/0x4c8 mm/slub.c:4339
 kmalloc_noprof include/linux/slab.h:909 [inline]
 sk_prot_alloc+0xc4/0x1f0 net/core/sock.c:2198
 sk_alloc+0x44/0x3ac net/core/sock.c:2254
 bt_sock_alloc+0x4c/0x300 net/bluetooth/af_bluetooth.c:148
 hci_sock_create+0xa8/0x194 net/bluetooth/hci_sock.c:2202
 bt_sock_create+0x14c/0x24c net/bluetooth/af_bluetooth.c:132
 __sock_create+0x43c/0x91c net/socket.c:1541
 sock_create net/socket.c:1599 [inline]
 __sys_socket_create net/socket.c:1636 [inline]
 __sys_socket+0xd4/0x1c0 net/socket.c:1683
 __do_sys_socket net/socket.c:1697 [inline]
 __se_sys_socket net/socket.c:1695 [inline]
 __arm64_sys_socket+0x7c/0x94 net/socket.c:1695
 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
 invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49
 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132
 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151
 el0_svc+0x58/0x17c arch/arm64/kernel/entry-common.c:767
 el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:786
 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600

Freed by task 6607:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x40/0x78 mm/kasan/common.c:68
 kasan_save_free_info+0x58/0x70 mm/kasan/generic.c:576
 poison_slab_object mm/kasan/common.c:247 [inline]
 __kasan_slab_free+0x68/0x88 mm/kasan/common.c:264
 kasan_slab_free include/linux/kasan.h:233 [inline
---truncated---</Note>
    </Notes>
    <CVE>CVE-2025-38117</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38117.html</URL>
        <Description>CVE-2025-38117</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245695</URL>
        <Description>SUSE Bug 1245695</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

gve: add missing NULL check for gve_alloc_pending_packet() in TX DQO

gve_alloc_pending_packet() can return NULL, but gve_tx_add_skb_dqo()
did not check for this case before dereferencing the returned pointer.

Add a missing NULL check to prevent a potential NULL pointer
dereference when allocation fails.

This improves robustness in low-memory scenarios.</Note>
    </Notes>
    <CVE>CVE-2025-38122</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38122.html</URL>
        <Description>CVE-2025-38122</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245746</URL>
        <Description>SUSE Bug 1245746</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: usb: aqc111: fix error handling of usbnet read calls

Syzkaller, courtesy of syzbot, identified an error (see report [1]) in
aqc111 driver, caused by incomplete sanitation of usb read calls'
results. This problem is quite similar to the one fixed in commit
920a9fa27e78 ("net: asix: add proper error handling of usb read errors").

For instance, usbnet_read_cmd() may read fewer than 'size' bytes,
even if the caller expected the full amount, and aqc111_read_cmd()
will not check its result properly. As [1] shows, this may lead
to MAC address in aqc111_bind() being only partly initialized,
triggering KMSAN warnings.

Fix the issue by verifying that the number of bytes read is
as expected and not less.

[1] Partial syzbot report:
BUG: KMSAN: uninit-value in is_valid_ether_addr include/linux/etherdevice.h:208 [inline]
BUG: KMSAN: uninit-value in usbnet_probe+0x2e57/0x4390 drivers/net/usb/usbnet.c:1830
 is_valid_ether_addr include/linux/etherdevice.h:208 [inline]
 usbnet_probe+0x2e57/0x4390 drivers/net/usb/usbnet.c:1830
 usb_probe_interface+0xd01/0x1310 drivers/usb/core/driver.c:396
 call_driver_probe drivers/base/dd.c:-1 [inline]
 really_probe+0x4d1/0xd90 drivers/base/dd.c:658
 __driver_probe_device+0x268/0x380 drivers/base/dd.c:800
...

Uninit was stored to memory at:
 dev_addr_mod+0xb0/0x550 net/core/dev_addr_lists.c:582
 __dev_addr_set include/linux/netdevice.h:4874 [inline]
 eth_hw_addr_set include/linux/etherdevice.h:325 [inline]
 aqc111_bind+0x35f/0x1150 drivers/net/usb/aqc111.c:717
 usbnet_probe+0xbe6/0x4390 drivers/net/usb/usbnet.c:1772
 usb_probe_interface+0xd01/0x1310 drivers/usb/core/driver.c:396
...

Uninit was stored to memory at:
 ether_addr_copy include/linux/etherdevice.h:305 [inline]
 aqc111_read_perm_mac drivers/net/usb/aqc111.c:663 [inline]
 aqc111_bind+0x794/0x1150 drivers/net/usb/aqc111.c:713
 usbnet_probe+0xbe6/0x4390 drivers/net/usb/usbnet.c:1772
 usb_probe_interface+0xd01/0x1310 drivers/usb/core/driver.c:396
 call_driver_probe drivers/base/dd.c:-1 [inline]
...

Local variable buf.i created at:
 aqc111_read_perm_mac drivers/net/usb/aqc111.c:656 [inline]
 aqc111_bind+0x221/0x1150 drivers/net/usb/aqc111.c:713
 usbnet_probe+0xbe6/0x4390 drivers/net/usb/usbnet.c:1772</Note>
    </Notes>
    <CVE>CVE-2025-38153</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38153.html</URL>
        <Description>CVE-2025-38153</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245744</URL>
        <Description>SUSE Bug 1245744</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

crypto: marvell/cesa - Handle zero-length skcipher requests

Do not access random memory for zero-length skcipher requests.
Just return 0.</Note>
    </Notes>
    <CVE>CVE-2025-38173</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38173.html</URL>
        <Description>CVE-2025-38173</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245769</URL>
        <Description>SUSE Bug 1245769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

thunderbolt: Do not double dequeue a configuration request

Some of our devices crash in tb_cfg_request_dequeue():

 general protection fault, probably for non-canonical address 0xdead000000000122

 CPU: 6 PID: 91007 Comm: kworker/6:2 Tainted: G U W 6.6.65
 RIP: 0010:tb_cfg_request_dequeue+0x2d/0xa0
 Call Trace:
 &lt;TASK&gt;
 ? tb_cfg_request_dequeue+0x2d/0xa0
 tb_cfg_request_work+0x33/0x80
 worker_thread+0x386/0x8f0
 kthread+0xed/0x110
 ret_from_fork+0x38/0x50
 ret_from_fork_asm+0x1b/0x30

The circumstances are unclear, however, the theory is that
tb_cfg_request_work() can be scheduled twice for a request:
first time via frame.callback from ring_work() and second
time from tb_cfg_request().  Both times kworkers will execute
tb_cfg_request_dequeue(), which results in double list_del()
from the ctl-&gt;request_queue (the list poison deference hints
at it: 0xdead000000000122).

Do not dequeue requests that don't have TB_CFG_REQUEST_ACTIVE
bit set.</Note>
    </Notes>
    <CVE>CVE-2025-38174</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38174.html</URL>
        <Description>CVE-2025-38174</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245781</URL>
        <Description>SUSE Bug 1245781</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer

The reproduction steps:
1. create a tun interface
2. enable l2 bearer
3. TIPC_NL_UDP_GET_REMOTEIP with media name set to tun

tipc: Started in network mode
tipc: Node identity 8af312d38a21, cluster identity 4711
tipc: Enabled bearer &lt;eth:syz_tun&gt;, priority 1
Oops: general protection fault
KASAN: null-ptr-deref in range
CPU: 1 UID: 1000 PID: 559 Comm: poc Not tainted 6.16.0-rc1+ #117 PREEMPT
Hardware name: QEMU Ubuntu 24.04 PC
RIP: 0010:tipc_udp_nl_dump_remoteip+0x4a4/0x8f0

the ub was in fact a struct dev.

when bid != 0 &amp;&amp; skip_cnt != 0, bearer_list[bid] may be NULL or
other media when other thread changes it.

fix this by checking media_id.</Note>
    </Notes>
    <CVE>CVE-2025-38184</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38184.html</URL>
        <Description>CVE-2025-38184</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245956</URL>
        <Description>SUSE Bug 1245956</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

atm: atmtcp: Free invalid length skb in atmtcp_c_send().

syzbot reported the splat below. [0]

vcc_sendmsg() copies data passed from userspace to skb and passes
it to vcc-&gt;dev-&gt;ops-&gt;send().

atmtcp_c_send() accesses skb-&gt;data as struct atmtcp_hdr after
checking if skb-&gt;len is 0, but it's not enough.

Also, when skb-&gt;len == 0, skb and sk (vcc) were leaked because
dev_kfree_skb() is not called and sk_wmem_alloc adjustment is missing
to revert atm_account_tx() in vcc_sendmsg(), which is expected
to be done in atm_pop_raw().

Let's properly free skb with an invalid length in atmtcp_c_send().

[0]:
BUG: KMSAN: uninit-value in atmtcp_c_send+0x255/0xed0 drivers/atm/atmtcp.c:294
 atmtcp_c_send+0x255/0xed0 drivers/atm/atmtcp.c:294
 vcc_sendmsg+0xd7c/0xff0 net/atm/common.c:644
 sock_sendmsg_nosec net/socket.c:712 [inline]
 __sock_sendmsg+0x330/0x3d0 net/socket.c:727
 ____sys_sendmsg+0x7e0/0xd80 net/socket.c:2566
 ___sys_sendmsg+0x271/0x3b0 net/socket.c:2620
 __sys_sendmsg net/socket.c:2652 [inline]
 __do_sys_sendmsg net/socket.c:2657 [inline]
 __se_sys_sendmsg net/socket.c:2655 [inline]
 __x64_sys_sendmsg+0x211/0x3e0 net/socket.c:2655
 x64_sys_call+0x32fb/0x3db0 arch/x86/include/generated/asm/syscalls_64.h:47
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xd9/0x210 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Uninit was created at:
 slab_post_alloc_hook mm/slub.c:4154 [inline]
 slab_alloc_node mm/slub.c:4197 [inline]
 kmem_cache_alloc_node_noprof+0x818/0xf00 mm/slub.c:4249
 kmalloc_reserve+0x13c/0x4b0 net/core/skbuff.c:579
 __alloc_skb+0x347/0x7d0 net/core/skbuff.c:670
 alloc_skb include/linux/skbuff.h:1336 [inline]
 vcc_sendmsg+0xb40/0xff0 net/atm/common.c:628
 sock_sendmsg_nosec net/socket.c:712 [inline]
 __sock_sendmsg+0x330/0x3d0 net/socket.c:727
 ____sys_sendmsg+0x7e0/0xd80 net/socket.c:2566
 ___sys_sendmsg+0x271/0x3b0 net/socket.c:2620
 __sys_sendmsg net/socket.c:2652 [inline]
 __do_sys_sendmsg net/socket.c:2657 [inline]
 __se_sys_sendmsg net/socket.c:2655 [inline]
 __x64_sys_sendmsg+0x211/0x3e0 net/socket.c:2655
 x64_sys_call+0x32fb/0x3db0 arch/x86/include/generated/asm/syscalls_64.h:47
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xd9/0x210 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

CPU: 1 UID: 0 PID: 5798 Comm: syz-executor192 Not tainted 6.16.0-rc1-syzkaller-00010-g2c4a1f3fe03e #0 PREEMPT(undef)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025</Note>
    </Notes>
    <CVE>CVE-2025-38185</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38185.html</URL>
        <Description>CVE-2025-38185</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246012</URL>
        <Description>SUSE Bug 1246012</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

atm: Revert atm_account_tx() if copy_from_iter_full() fails.

In vcc_sendmsg(), we account skb-&gt;truesize to sk-&gt;sk_wmem_alloc by
atm_account_tx().

It is expected to be reverted by atm_pop_raw() later called by
vcc-&gt;dev-&gt;ops-&gt;send(vcc, skb).

However, vcc_sendmsg() misses the same revert when copy_from_iter_full()
fails, and then we will leak a socket.

Let's factorise the revert part as atm_return_tx() and call it in
the failure path.

Note that the corresponding sk_wmem_alloc operation can be found in
alloc_tx() as of the blamed commit.

  $ git blame -L:alloc_tx net/atm/common.c c55fa3cccbc2c~</Note>
    </Notes>
    <CVE>CVE-2025-38190</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38190.html</URL>
        <Description>CVE-2025-38190</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245973</URL>
        <Description>SUSE Bug 1245973</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

fbdev: Fix fb_set_var to prevent null-ptr-deref in fb_videomode_to_var

If fb_add_videomode() in fb_set_var() fails to allocate memory for
fb_videomode, later it may lead to a null-ptr dereference in
fb_videomode_to_var(), as the fb_info is registered while not having the
mode in modelist that is expected to be there, i.e. the one that is
described in fb_info-&gt;var.

================================================================
general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN NOPTI
KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
CPU: 1 PID: 30371 Comm: syz-executor.1 Not tainted 5.10.226-syzkaller #0
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
RIP: 0010:fb_videomode_to_var+0x24/0x610 drivers/video/fbdev/core/modedb.c:901
Call Trace:
 display_to_var+0x3a/0x7c0 drivers/video/fbdev/core/fbcon.c:929
 fbcon_resize+0x3e2/0x8f0 drivers/video/fbdev/core/fbcon.c:2071
 resize_screen drivers/tty/vt/vt.c:1176 [inline]
 vc_do_resize+0x53a/0x1170 drivers/tty/vt/vt.c:1263
 fbcon_modechanged+0x3ac/0x6e0 drivers/video/fbdev/core/fbcon.c:2720
 fbcon_update_vcs+0x43/0x60 drivers/video/fbdev/core/fbcon.c:2776
 do_fb_ioctl+0x6d2/0x740 drivers/video/fbdev/core/fbmem.c:1128
 fb_ioctl+0xe7/0x150 drivers/video/fbdev/core/fbmem.c:1203
 vfs_ioctl fs/ioctl.c:48 [inline]
 __do_sys_ioctl fs/ioctl.c:753 [inline]
 __se_sys_ioctl fs/ioctl.c:739 [inline]
 __x64_sys_ioctl+0x19a/0x210 fs/ioctl.c:739
 do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46
 entry_SYSCALL_64_after_hwframe+0x67/0xd1
================================================================

The reason is that fb_info-&gt;var is being modified in fb_set_var(), and
then fb_videomode_to_var() is called. If it fails to add the mode to
fb_info-&gt;modelist, fb_set_var() returns error, but does not restore the
old value of fb_info-&gt;var. Restore fb_info-&gt;var on failure the same way
it is done earlier in the function.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.</Note>
    </Notes>
    <CVE>CVE-2025-38214</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38214.html</URL>
        <Description>CVE-2025-38214</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246042</URL>
        <Description>SUSE Bug 1246042</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister().

syzbot reported a warning below during atm_dev_register(). [0]

Before creating a new device and procfs/sysfs for it, atm_dev_register()
looks up a duplicated device by __atm_dev_lookup().  These operations are
done under atm_dev_mutex.

However, when removing a device in atm_dev_deregister(), it releases the
mutex just after removing the device from the list that __atm_dev_lookup()
iterates over.

So, there will be a small race window where the device does not exist on
the device list but procfs/sysfs are still not removed, triggering the
splat.

Let's hold the mutex until procfs/sysfs are removed in
atm_dev_deregister().

[0]:
proc_dir_entry 'atm/atmtcp:0' already registered
WARNING: CPU: 0 PID: 5919 at fs/proc/generic.c:377 proc_register+0x455/0x5f0 fs/proc/generic.c:377
Modules linked in:
CPU: 0 UID: 0 PID: 5919 Comm: syz-executor284 Not tainted 6.16.0-rc2-syzkaller-00047-g52da431bf03b #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
RIP: 0010:proc_register+0x455/0x5f0 fs/proc/generic.c:377
Code: 48 89 f9 48 c1 e9 03 80 3c 01 00 0f 85 a2 01 00 00 48 8b 44 24 10 48 c7 c7 20 c0 c2 8b 48 8b b0 d8 00 00 00 e8 0c 02 1c ff 90 &lt;0f&gt; 0b 90 90 48 c7 c7 80 f2 82 8e e8 0b de 23 09 48 8b 4c 24 28 48
RSP: 0018:ffffc9000466fa30 EFLAGS: 00010282
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff817ae248
RDX: ffff888026280000 RSI: ffffffff817ae255 RDI: 0000000000000001
RBP: ffff8880232bed48 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000001 R12: ffff888076ed2140
R13: dffffc0000000000 R14: ffff888078a61340 R15: ffffed100edda444
FS:  00007f38b3b0c6c0(0000) GS:ffff888124753000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f38b3bdf953 CR3: 0000000076d58000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 proc_create_data+0xbe/0x110 fs/proc/generic.c:585
 atm_proc_dev_register+0x112/0x1e0 net/atm/proc.c:361
 atm_dev_register+0x46d/0x890 net/atm/resources.c:113
 atmtcp_create+0x77/0x210 drivers/atm/atmtcp.c:369
 atmtcp_attach drivers/atm/atmtcp.c:403 [inline]
 atmtcp_ioctl+0x2f9/0xd60 drivers/atm/atmtcp.c:464
 do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159
 sock_do_ioctl+0x115/0x280 net/socket.c:1190
 sock_ioctl+0x227/0x6b0 net/socket.c:1311
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:907 [inline]
 __se_sys_ioctl fs/ioctl.c:893 [inline]
 __x64_sys_ioctl+0x18b/0x210 fs/ioctl.c:893
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f38b3b74459
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f38b3b0c198 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007f38b3bfe318 RCX: 00007f38b3b74459
RDX: 0000000000000000 RSI: 0000000000006180 RDI: 0000000000000005
RBP: 00007f38b3bfe310 R08: 65732f636f72702f R09: 65732f636f72702f
R10: 65732f636f72702f R11: 0000000000000246 R12: 00007f38b3bcb0ac
R13: 00007f38b3b0c1a0 R14: 0000200000000200 R15: 00007f38b3bcb03b
 &lt;/TASK&gt;</Note>
    </Notes>
    <CVE>CVE-2025-38245</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38245.html</URL>
        <Description>CVE-2025-38245</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246193</URL>
        <Description>SUSE Bug 1246193</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bcache: fix NULL pointer in cache_set_flush()

1. LINE#1794 - LINE#1887 is some codes about function of
   bch_cache_set_alloc().
2. LINE#2078 - LINE#2142 is some codes about function of
   register_cache_set().
3. register_cache_set() will call bch_cache_set_alloc() in LINE#2098.

 1794 struct cache_set *bch_cache_set_alloc(struct cache_sb *sb)
 1795 {
 ...
 1860         if (!(c-&gt;devices = kcalloc(c-&gt;nr_uuids, sizeof(void *), GFP_KERNEL)) ||
 1861             mempool_init_slab_pool(&amp;c-&gt;search, 32, bch_search_cache) ||
 1862             mempool_init_kmalloc_pool(&amp;c-&gt;bio_meta, 2,
 1863                                 sizeof(struct bbio) + sizeof(struct bio_vec) *
 1864                                 bucket_pages(c)) ||
 1865             mempool_init_kmalloc_pool(&amp;c-&gt;fill_iter, 1, iter_size) ||
 1866             bioset_init(&amp;c-&gt;bio_split, 4, offsetof(struct bbio, bio),
 1867                         BIOSET_NEED_BVECS|BIOSET_NEED_RESCUER) ||
 1868             !(c-&gt;uuids = alloc_bucket_pages(GFP_KERNEL, c)) ||
 1869             !(c-&gt;moving_gc_wq = alloc_workqueue("bcache_gc",
 1870                                                 WQ_MEM_RECLAIM, 0)) ||
 1871             bch_journal_alloc(c) ||
 1872             bch_btree_cache_alloc(c) ||
 1873             bch_open_buckets_alloc(c) ||
 1874             bch_bset_sort_state_init(&amp;c-&gt;sort, ilog2(c-&gt;btree_pages)))
 1875                 goto err;
                      ^^^^^^^^
 1876
 ...
 1883         return c;
 1884 err:
 1885         bch_cache_set_unregister(c);
              ^^^^^^^^^^^^^^^^^^^^^^^^^^^
 1886         return NULL;
 1887 }
 ...
 2078 static const char *register_cache_set(struct cache *ca)
 2079 {
 ...
 2098         c = bch_cache_set_alloc(&amp;ca-&gt;sb);
 2099         if (!c)
 2100                 return err;
                      ^^^^^^^^^^
 ...
 2128         ca-&gt;set = c;
 2129         ca-&gt;set-&gt;cache[ca-&gt;sb.nr_this_dev] = ca;
              ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
 ...
 2138         return NULL;
 2139 err:
 2140         bch_cache_set_unregister(c);
 2141         return err;
 2142 }

(1) If LINE#1860 - LINE#1874 is true, then do 'goto err'(LINE#1875) and
    call bch_cache_set_unregister()(LINE#1885).
(2) As (1) return NULL(LINE#1886), LINE#2098 - LINE#2100 would return.
(3) As (2) has returned, LINE#2128 - LINE#2129 would do *not* give the
    value to c-&gt;cache[], it means that c-&gt;cache[] is NULL.

LINE#1624 - LINE#1665 is some codes about function of cache_set_flush().
As (1), in LINE#1885 call
bch_cache_set_unregister()
---&gt; bch_cache_set_stop()
     ---&gt; closure_queue()
          -.-&gt; cache_set_flush() (as below LINE#1624)

 1624 static void cache_set_flush(struct closure *cl)
 1625 {
 ...
 1654         for_each_cache(ca, c, i)
 1655                 if (ca-&gt;alloc_thread)
                          ^^
 1656                         kthread_stop(ca-&gt;alloc_thread);
 ...
 1665 }

(4) In LINE#1655 ca is NULL(see (3)) in cache_set_flush() then the
    kernel crash occurred as below:
[  846.712887] bcache: register_cache() error drbd6: cannot allocate memory
[  846.713242] bcache: register_bcache() error : failed to register device
[  846.713336] bcache: cache_set_free() Cache set 2f84bdc1-498a-4f2f-98a7-01946bf54287 unregistered
[  846.713768] BUG: unable to handle kernel NULL pointer dereference at 00000000000009f8
[  846.714790] PGD 0 P4D 0
[  846.715129] Oops: 0000 [#1] SMP PTI
[  846.715472] CPU: 19 PID: 5057 Comm: kworker/19:16 Kdump: loaded Tainted: G           OE    --------- -  - 4.18.0-147.5.1.el8_1.5es.3.x86_64 #1
[  846.716082] Hardware name: ESPAN GI-25212/X11DPL-i, BIOS 2.1 06/15/2018
[  846.716451] Workqueue: events cache_set_flush [bcache]
[  846.716808] RIP: 0010:cache_set_flush+0xc9/0x1b0 [bcache]
[  846.717155] Code: 00 4c 89 a5 b0 03 00 00 48 8b 85 68 f6 ff ff a8 08 0f 84 88 00 00 00 31 db 66 83 bd 3c f7 ff ff 00 48 8b 85 48 ff ff ff 74 28 &lt;48&gt; 8b b8 f8 09 00 0
---truncated---</Note>
    </Notes>
    <CVE>CVE-2025-38263</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38263.html</URL>
        <Description>CVE-2025-38263</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246248</URL>
        <Description>SUSE Bug 1246248</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bus: fsl-mc: fix double-free on mc_dev

The blamed commit tried to simplify how the deallocations are done but,
in the process, introduced a double-free on the mc_dev variable.

In case the MC device is a DPRC, a new mc_bus is allocated and the
mc_dev variable is just a reference to one of its fields. In this
circumstance, on the error path only the mc_bus should be freed.

This commit introduces back the following checkpatch warning which is a
false-positive.

WARNING: kfree(NULL) is safe and this check is probably not required
+       if (mc_bus)
+               kfree(mc_bus);</Note>
    </Notes>
    <CVE>CVE-2025-38313</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38313.html</URL>
        <Description>CVE-2025-38313</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246342</URL>
        <Description>SUSE Bug 1246342</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()

If an exiting non-autoreaping task has already passed exit_notify() and
calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent
or debugger right after unlock_task_sighand().

If a concurrent posix_cpu_timer_del() runs at that moment, it won't be
able to detect timer-&gt;it.cpu.firing != 0: cpu_timer_task_rcu() and/or
lock_task_sighand() will fail.

Add the tsk-&gt;exit_state check into run_posix_cpu_timers() to fix this.

This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because
exit_task_work() is called before exit_notify(). But the check still
makes sense, task_work_add(&amp;tsk-&gt;posix_cputimers_work.work) will fail
anyway in this case.</Note>
    </Notes>
    <CVE>CVE-2025-38352</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38352.html</URL>
        <Description>CVE-2025-38352</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246911</URL>
        <Description>SUSE Bug 1246911</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1249205</URL>
        <Description>SUSE Bug 1249205</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ACPICA: Refuse to evaluate a method if arguments are missing

As reported in [1], a platform firmware update that increased the number
of method parameters and forgot to update a least one of its callers,
caused ACPICA to crash due to use-after-free.

Since this a result of a clear AML issue that arguably cannot be fixed
up by the interpreter (it cannot produce missing data out of thin air),
address it by making ACPICA refuse to evaluate a method if the caller
attempts to pass fewer arguments than expected to it.</Note>
    </Notes>
    <CVE>CVE-2025-38386</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38386.html</URL>
        <Description>CVE-2025-38386</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247138</URL>
        <Description>SUSE Bug 1247138</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

perf: Fix sample vs do_exit()

Baisheng Gao reported an ARM64 crash, which Mark decoded as being a
synchronous external abort -- most likely due to trying to access
MMIO in bad ways.

The crash further shows perf trying to do a user stack sample while in
exit_mmap()'s tlb_finish_mmu() -- i.e. while tearing down the address
space it is trying to access.

It turns out that we stop perf after we tear down the userspace mm; a
receipie for disaster, since perf likes to access userspace for
various reasons.

Flip this order by moving up where we stop perf in do_exit().

Additionally, harden PERF_SAMPLE_CALLCHAIN and PERF_SAMPLE_STACK_USER
to abort when the current task does not have an mm (exit_mm() makes
sure to set current-&gt;mm = NULL; before commencing with the actual
teardown). Such that CPU wide events don't trip on this same problem.</Note>
    </Notes>
    <CVE>CVE-2025-38424</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38424.html</URL>
        <Description>CVE-2025-38424</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247293</URL>
        <Description>SUSE Bug 1247293</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request

If the request being processed is not a v4 compound request, then
examining the cstate can have undefined results.

This patch adds a check that the rpc procedure being executed
(rq_procinfo) is the NFSPROC4_COMPOUND procedure.</Note>
    </Notes>
    <CVE>CVE-2025-38430</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38430.html</URL>
        <Description>CVE-2025-38430</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247160</URL>
        <Description>SUSE Bug 1247160</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/gem: Acquire references on GEM handles for framebuffers

A GEM handle can be released while the GEM buffer object is attached
to a DRM framebuffer. This leads to the release of the dma-buf backing
the buffer object, if any. [1] Trying to use the framebuffer in further
mode-setting operations leads to a segmentation fault. Most easily
happens with driver that use shadow planes for vmap-ing the dma-buf
during a page flip. An example is shown below.

[  156.791968] ------------[ cut here ]------------
[  156.796830] WARNING: CPU: 2 PID: 2255 at drivers/dma-buf/dma-buf.c:1527 dma_buf_vmap+0x224/0x430
[...]
[  156.942028] RIP: 0010:dma_buf_vmap+0x224/0x430
[  157.043420] Call Trace:
[  157.045898]  &lt;TASK&gt;
[  157.048030]  ? show_trace_log_lvl+0x1af/0x2c0
[  157.052436]  ? show_trace_log_lvl+0x1af/0x2c0
[  157.056836]  ? show_trace_log_lvl+0x1af/0x2c0
[  157.061253]  ? drm_gem_shmem_vmap+0x74/0x710
[  157.065567]  ? dma_buf_vmap+0x224/0x430
[  157.069446]  ? __warn.cold+0x58/0xe4
[  157.073061]  ? dma_buf_vmap+0x224/0x430
[  157.077111]  ? report_bug+0x1dd/0x390
[  157.080842]  ? handle_bug+0x5e/0xa0
[  157.084389]  ? exc_invalid_op+0x14/0x50
[  157.088291]  ? asm_exc_invalid_op+0x16/0x20
[  157.092548]  ? dma_buf_vmap+0x224/0x430
[  157.096663]  ? dma_resv_get_singleton+0x6d/0x230
[  157.101341]  ? __pfx_dma_buf_vmap+0x10/0x10
[  157.105588]  ? __pfx_dma_resv_get_singleton+0x10/0x10
[  157.110697]  drm_gem_shmem_vmap+0x74/0x710
[  157.114866]  drm_gem_vmap+0xa9/0x1b0
[  157.118763]  drm_gem_vmap_unlocked+0x46/0xa0
[  157.123086]  drm_gem_fb_vmap+0xab/0x300
[  157.126979]  drm_atomic_helper_prepare_planes.part.0+0x487/0xb10
[  157.133032]  ? lockdep_init_map_type+0x19d/0x880
[  157.137701]  drm_atomic_helper_commit+0x13d/0x2e0
[  157.142671]  ? drm_atomic_nonblocking_commit+0xa0/0x180
[  157.147988]  drm_mode_atomic_ioctl+0x766/0xe40
[...]
[  157.346424] ---[ end trace 0000000000000000 ]---

Acquiring GEM handles for the framebuffer's GEM buffer objects prevents
this from happening. The framebuffer's cleanup later puts the handle
references.

Commit 1a148af06000 ("drm/gem-shmem: Use dma_buf from GEM object
instance") triggers the segmentation fault easily by using the dma-buf
field more widely. The underlying issue with reference counting has
been present before.

v2:
- acquire the handle instead of the BO (Christian)
- fix comment style (Christian)
- drop the Fixes tag (Christian)
- rename err_ gotos
- add missing Link tag</Note>
    </Notes>
    <CVE>CVE-2025-38449</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38449.html</URL>
        <Description>CVE-2025-38449</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247255</URL>
        <Description>SUSE Bug 1247255</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247258</URL>
        <Description>SUSE Bug 1247258</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/sched: Abort __tc_modify_qdisc if parent class does not exist

Lion's patch [1] revealed an ancient bug in the qdisc API.
Whenever a user creates/modifies a qdisc specifying as a parent another
qdisc, the qdisc API will, during grafting, detect that the user is
not trying to attach to a class and reject. However grafting is
performed after qdisc_create (and thus the qdiscs' init callback) is
executed. In qdiscs that eventually call qdisc_tree_reduce_backlog
during init or change (such as fq, hhf, choke, etc), an issue
arises. For example, executing the following commands:

sudo tc qdisc add dev lo root handle a: htb default 2
sudo tc qdisc add dev lo parent a: handle beef fq

Qdiscs such as fq, hhf, choke, etc unconditionally invoke
qdisc_tree_reduce_backlog() in their control path init() or change() which
then causes a failure to find the child class; however, that does not stop
the unconditional invocation of the assumed child qdisc's qlen_notify with
a null class. All these qdiscs make the assumption that class is non-null.

The solution is ensure that qdisc_leaf() which looks up the parent
class, and is invoked prior to qdisc_create(), should return failure on
not finding the class.
In this patch, we leverage qdisc_leaf to return ERR_PTRs whenever the
parentid doesn't correspond to a class, so that we can detect it
earlier on and abort before qdisc_create is called.

[1] https://lore.kernel.org/netdev/d912cbd7-193b-4269-9857-525bee8bbb6a@gmail.com/</Note>
    </Notes>
    <CVE>CVE-2025-38457</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38457.html</URL>
        <Description>CVE-2025-38457</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247098</URL>
        <Description>SUSE Bug 1247098</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

atm: clip: Fix potential null-ptr-deref in to_atmarpd().

atmarpd is protected by RTNL since commit f3a0592b37b8 ("[ATM]: clip
causes unregister hang").

However, it is not enough because to_atmarpd() is called without RTNL,
especially clip_neigh_solicit() / neigh_ops-&gt;solicit() is unsleepable.

Also, there is no RTNL dependency around atmarpd.

Let's use a private mutex and RCU to protect access to atmarpd in
to_atmarpd().</Note>
    </Notes>
    <CVE>CVE-2025-38460</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38460.html</URL>
        <Description>CVE-2025-38460</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247143</URL>
        <Description>SUSE Bug 1247143</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tipc: Fix use-after-free in tipc_conn_close().

syzbot reported a null-ptr-deref in tipc_conn_close() during netns
dismantle. [0]

tipc_topsrv_stop() iterates tipc_net(net)-&gt;topsrv-&gt;conn_idr and calls
tipc_conn_close() for each tipc_conn.

The problem is that tipc_conn_close() is called after releasing the
IDR lock.

At the same time, there might be tipc_conn_recv_work() running and it
could call tipc_conn_close() for the same tipc_conn and release its
last -&gt;kref.

Once we release the IDR lock in tipc_topsrv_stop(), there is no
guarantee that the tipc_conn is alive.

Let's hold the ref before releasing the lock and put the ref after
tipc_conn_close() in tipc_topsrv_stop().

[0]:
BUG: KASAN: use-after-free in tipc_conn_close+0x122/0x140 net/tipc/topsrv.c:165
Read of size 8 at addr ffff888099305a08 by task kworker/u4:3/435

CPU: 0 PID: 435 Comm: kworker/u4:3 Not tainted 4.19.204-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: netns cleanup_net
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x1fc/0x2ef lib/dump_stack.c:118
 print_address_description.cold+0x54/0x219 mm/kasan/report.c:256
 kasan_report_error.cold+0x8a/0x1b9 mm/kasan/report.c:354
 kasan_report mm/kasan/report.c:412 [inline]
 __asan_report_load8_noabort+0x88/0x90 mm/kasan/report.c:433
 tipc_conn_close+0x122/0x140 net/tipc/topsrv.c:165
 tipc_topsrv_stop net/tipc/topsrv.c:701 [inline]
 tipc_topsrv_exit_net+0x27b/0x5c0 net/tipc/topsrv.c:722
 ops_exit_list+0xa5/0x150 net/core/net_namespace.c:153
 cleanup_net+0x3b4/0x8b0 net/core/net_namespace.c:553
 process_one_work+0x864/0x1570 kernel/workqueue.c:2153
 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296
 kthread+0x33f/0x460 kernel/kthread.c:259
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415

Allocated by task 23:
 kmem_cache_alloc_trace+0x12f/0x380 mm/slab.c:3625
 kmalloc include/linux/slab.h:515 [inline]
 kzalloc include/linux/slab.h:709 [inline]
 tipc_conn_alloc+0x43/0x4f0 net/tipc/topsrv.c:192
 tipc_topsrv_accept+0x1b5/0x280 net/tipc/topsrv.c:470
 process_one_work+0x864/0x1570 kernel/workqueue.c:2153
 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296
 kthread+0x33f/0x460 kernel/kthread.c:259
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415

Freed by task 23:
 __cache_free mm/slab.c:3503 [inline]
 kfree+0xcc/0x210 mm/slab.c:3822
 tipc_conn_kref_release net/tipc/topsrv.c:150 [inline]
 kref_put include/linux/kref.h:70 [inline]
 conn_put+0x2cd/0x3a0 net/tipc/topsrv.c:155
 process_one_work+0x864/0x1570 kernel/workqueue.c:2153
 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296
 kthread+0x33f/0x460 kernel/kthread.c:259
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415

The buggy address belongs to the object at ffff888099305a00
 which belongs to the cache kmalloc-512 of size 512
The buggy address is located 8 bytes inside of
 512-byte region [ffff888099305a00, ffff888099305c00)
The buggy address belongs to the page:
page:ffffea000264c140 count:1 mapcount:0 mapping:ffff88813bff0940 index:0x0
flags: 0xfff00000000100(slab)
raw: 00fff00000000100 ffffea00028b6b88 ffffea0002cd2b08 ffff88813bff0940
raw: 0000000000000000 ffff888099305000 0000000100000006 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
 ffff888099305900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
 ffff888099305980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
&gt;ffff888099305a00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
                      ^
 ffff888099305a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
 ffff888099305b00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb</Note>
    </Notes>
    <CVE>CVE-2025-38464</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38464.html</URL>
        <Description>CVE-2025-38464</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247112</URL>
        <Description>SUSE Bug 1247112</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netlink: Fix wraparounds of sk-&gt;sk_rmem_alloc.

Netlink has this pattern in some places

  if (atomic_read(&amp;sk-&gt;sk_rmem_alloc) &gt; sk-&gt;sk_rcvbuf)
  	atomic_add(skb-&gt;truesize, &amp;sk-&gt;sk_rmem_alloc);

, which has the same problem fixed by commit 5a465a0da13e ("udp:
Fix multiple wraparounds of sk-&gt;sk_rmem_alloc.").

For example, if we set INT_MAX to SO_RCVBUFFORCE, the condition
is always false as the two operands are of int.

Then, a single socket can eat as many skb as possible until OOM
happens, and we can see multiple wraparounds of sk-&gt;sk_rmem_alloc.

Let's fix it by using atomic_add_return() and comparing the two
variables as unsigned int.

Before:
  [root@fedora ~]# ss -f netlink
  Recv-Q      Send-Q Local Address:Port                Peer Address:Port
  -1668710080 0               rtnl:nl_wraparound/293               *

After:
  [root@fedora ~]# ss -f netlink
  Recv-Q     Send-Q Local Address:Port                Peer Address:Port
  2147483072 0               rtnl:nl_wraparound/290               *
  ^
  `--- INT_MAX - 576</Note>
    </Notes>
    <CVE>CVE-2025-38465</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38465.html</URL>
        <Description>CVE-2025-38465</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247118</URL>
        <Description>SUSE Bug 1247118</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: vlan: fix VLAN 0 refcount imbalance of toggling filtering during runtime

Assuming the "rx-vlan-filter" feature is enabled on a net device, the
8021q module will automatically add or remove VLAN 0 when the net device
is put administratively up or down, respectively. There are a couple of
problems with the above scheme.

The first problem is a memory leak that can happen if the "rx-vlan-filter"
feature is disabled while the device is running:

 # ip link add bond1 up type bond mode 0
 # ethtool -K bond1 rx-vlan-filter off
 # ip link del dev bond1

When the device is put administratively down the "rx-vlan-filter"
feature is disabled, so the 8021q module will not remove VLAN 0 and the
memory will be leaked [1].

Another problem that can happen is that the kernel can automatically
delete VLAN 0 when the device is put administratively down despite not
adding it when the device was put administratively up since during that
time the "rx-vlan-filter" feature was disabled. null-ptr-unref or
bug_on[2] will be triggered by unregister_vlan_dev() for refcount
imbalance if toggling filtering during runtime:

$ ip link add bond0 type bond mode 0
$ ip link add link bond0 name vlan0 type vlan id 0 protocol 802.1q
$ ethtool -K bond0 rx-vlan-filter off
$ ifconfig bond0 up
$ ethtool -K bond0 rx-vlan-filter on
$ ifconfig bond0 down
$ ip link del vlan0

Root cause is as below:
step1: add vlan0 for real_dev, such as bond, team.
register_vlan_dev
    vlan_vid_add(real_dev,htons(ETH_P_8021Q),0) //refcnt=1
step2: disable vlan filter feature and enable real_dev
step3: change filter from 0 to 1
vlan_device_event
    vlan_filter_push_vids
        ndo_vlan_rx_add_vid //No refcnt added to real_dev vlan0
step4: real_dev down
vlan_device_event
    vlan_vid_del(dev, htons(ETH_P_8021Q), 0); //refcnt=0
        vlan_info_rcu_free //free vlan0
step5: delete vlan0
unregister_vlan_dev
    BUG_ON(!vlan_info); //vlan_info is null

Fix both problems by noting in the VLAN info whether VLAN 0 was
automatically added upon NETDEV_UP and based on that decide whether it
should be deleted upon NETDEV_DOWN, regardless of the state of the
"rx-vlan-filter" feature.

[1]
unreferenced object 0xffff8880068e3100 (size 256):
  comm "ip", pid 384, jiffies 4296130254
  hex dump (first 32 bytes):
    00 20 30 0d 80 88 ff ff 00 00 00 00 00 00 00 00  . 0.............
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc 81ce31fa):
    __kmalloc_cache_noprof+0x2b5/0x340
    vlan_vid_add+0x434/0x940
    vlan_device_event.cold+0x75/0xa8
    notifier_call_chain+0xca/0x150
    __dev_notify_flags+0xe3/0x250
    rtnl_configure_link+0x193/0x260
    rtnl_newlink_create+0x383/0x8e0
    __rtnl_newlink+0x22c/0xa40
    rtnl_newlink+0x627/0xb00
    rtnetlink_rcv_msg+0x6fb/0xb70
    netlink_rcv_skb+0x11f/0x350
    netlink_unicast+0x426/0x710
    netlink_sendmsg+0x75a/0xc20
    __sock_sendmsg+0xc1/0x150
    ____sys_sendmsg+0x5aa/0x7b0
    ___sys_sendmsg+0xfc/0x180

[2]
kernel BUG at net/8021q/vlan.c:99!
Oops: invalid opcode: 0000 [#1] SMP KASAN PTI
CPU: 0 UID: 0 PID: 382 Comm: ip Not tainted 6.16.0-rc3 #61 PREEMPT(voluntary)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),
BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
RIP: 0010:unregister_vlan_dev (net/8021q/vlan.c:99 (discriminator 1))
RSP: 0018:ffff88810badf310 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffff88810da84000 RCX: ffffffffb47ceb9a
RDX: dffffc0000000000 RSI: 0000000000000008 RDI: ffff88810e8b43c8
RBP: 0000000000000000 R08: 0000000000000000 R09: fffffbfff6cefe80
R10: ffffffffb677f407 R11: ffff88810badf3c0 R12: ffff88810e8b4000
R13: 0000000000000000 R14: ffff88810642a5c0 R15: 000000000000017e
FS:  00007f1ff68c20c0(0000) GS:ffff888163a24000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f1ff5dad240 CR3: 0000000107e56000 CR4: 00000000000006f0
Call Trace:
 &lt;TASK
---truncated---</Note>
    </Notes>
    <CVE>CVE-2025-38470</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38470.html</URL>
        <Description>CVE-2025-38470</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247288</URL>
        <Description>SUSE Bug 1247288</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="47">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Fix null-ptr-deref in l2cap_sock_resume_cb()

syzbot reported null-ptr-deref in l2cap_sock_resume_cb(). [0]

l2cap_sock_resume_cb() has a similar problem that was fixed by commit
1bff51ea59a9 ("Bluetooth: fix use-after-free error in lock_sock_nested()").

Since both l2cap_sock_kill() and l2cap_sock_resume_cb() are executed
under l2cap_sock_resume_cb(), we can avoid the issue simply by checking
if chan-&gt;data is NULL.

Let's not access to the killed socket in l2cap_sock_resume_cb().

[0]:
BUG: KASAN: null-ptr-deref in instrument_atomic_write include/linux/instrumented.h:82 [inline]
BUG: KASAN: null-ptr-deref in clear_bit include/asm-generic/bitops/instrumented-atomic.h:41 [inline]
BUG: KASAN: null-ptr-deref in l2cap_sock_resume_cb+0xb4/0x17c net/bluetooth/l2cap_sock.c:1711
Write of size 8 at addr 0000000000000570 by task kworker/u9:0/52

CPU: 1 UID: 0 PID: 52 Comm: kworker/u9:0 Not tainted 6.16.0-rc4-syzkaller-g7482bb149b9f #0 PREEMPT
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
Workqueue: hci0 hci_rx_work
Call trace:
 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:501 (C)
 __dump_stack+0x30/0x40 lib/dump_stack.c:94
 dump_stack_lvl+0xd8/0x12c lib/dump_stack.c:120
 print_report+0x58/0x84 mm/kasan/report.c:524
 kasan_report+0xb0/0x110 mm/kasan/report.c:634
 check_region_inline mm/kasan/generic.c:-1 [inline]
 kasan_check_range+0x264/0x2a4 mm/kasan/generic.c:189
 __kasan_check_write+0x20/0x30 mm/kasan/shadow.c:37
 instrument_atomic_write include/linux/instrumented.h:82 [inline]
 clear_bit include/asm-generic/bitops/instrumented-atomic.h:41 [inline]
 l2cap_sock_resume_cb+0xb4/0x17c net/bluetooth/l2cap_sock.c:1711
 l2cap_security_cfm+0x524/0xea0 net/bluetooth/l2cap_core.c:7357
 hci_auth_cfm include/net/bluetooth/hci_core.h:2092 [inline]
 hci_auth_complete_evt+0x2e8/0xa4c net/bluetooth/hci_event.c:3514
 hci_event_func net/bluetooth/hci_event.c:7511 [inline]
 hci_event_packet+0x650/0xe9c net/bluetooth/hci_event.c:7565
 hci_rx_work+0x320/0xb18 net/bluetooth/hci_core.c:4070
 process_one_work+0x7e8/0x155c kernel/workqueue.c:3238
 process_scheduled_works kernel/workqueue.c:3321 [inline]
 worker_thread+0x958/0xed8 kernel/workqueue.c:3402
 kthread+0x5fc/0x75c kernel/kthread.c:464
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:847</Note>
    </Notes>
    <CVE>CVE-2025-38473</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38473.html</URL>
        <Description>CVE-2025-38473</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247289</URL>
        <Description>SUSE Bug 1247289</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="48">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

usb: net: sierra: check for no status endpoint

The driver checks for having three endpoints and
having bulk in and out endpoints, but not that
the third endpoint is interrupt input.
Rectify the omission.</Note>
    </Notes>
    <CVE>CVE-2025-38474</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38474.html</URL>
        <Description>CVE-2025-38474</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247311</URL>
        <Description>SUSE Bug 1247311</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="49">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

do_change_type(): refuse to operate on unmounted/not ours mounts

Ensure that propagation settings can only be changed for mounts located
in the caller's mount namespace. This change aligns permission checking
with the rest of mount(2).</Note>
    </Notes>
    <CVE>CVE-2025-38498</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38498.html</URL>
        <Description>CVE-2025-38498</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247374</URL>
        <Description>SUSE Bug 1247374</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247499</URL>
        <Description>SUSE Bug 1247499</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="50">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns

What we want is to verify there is that clone won't expose something
hidden by a mount we wouldn't be able to undo.  "Wouldn't be able to undo"
may be a result of MNT_LOCKED on a child, but it may also come from
lacking admin rights in the userns of the namespace mount belongs to.

clone_private_mnt() checks the former, but not the latter.

There's a number of rather confusing CAP_SYS_ADMIN checks in various
userns during the mount, especially with the new mount API; they serve
different purposes and in case of clone_private_mnt() they usually,
but not always end up covering the missing check mentioned above.</Note>
    </Notes>
    <CVE>CVE-2025-38499</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38499.html</URL>
        <Description>CVE-2025-38499</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247976</URL>
        <Description>SUSE Bug 1247976</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248673</URL>
        <Description>SUSE Bug 1248673</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="51">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: prevent A-MSDU attacks in mesh networks

This patch is a mitigation to prevent the A-MSDU spoofing vulnerability
for mesh networks. The initial update to the IEEE 802.11 standard, in
response to the FragAttacks, missed this case (CVE-2025-27558). It can
be considered a variant of CVE-2020-24588 but for mesh networks.

This patch tries to detect if a standard MSDU was turned into an A-MSDU
by an adversary. This is done by parsing a received A-MSDU as a standard
MSDU, calculating the length of the Mesh Control header, and seeing if
the 6 bytes after this header equal the start of an rfc1042 header. If
equal, this is a strong indication of an ongoing attack attempt.

This defense was tested with mac80211_hwsim against a mesh network that
uses an empty Mesh Address Extension field, i.e., when four addresses
are used, and when using a 12-byte Mesh Address Extension field, i.e.,
when six addresses are used. Functionality of normal MSDUs and A-MSDUs
was also tested, and confirmed working, when using both an empty and
12-byte Mesh Address Extension field.

It was also tested with mac80211_hwsim that A-MSDU attacks in non-mesh
networks keep being detected and prevented.

Note that the vulnerability being patched, and the defense being
implemented, was also discussed in the following paper and in the
following IEEE 802.11 presentation:

https://papers.mathyvanhoef.com/wisec2025.pdf
https://mentor.ieee.org/802.11/dcn/25/11-25-0949-00-000m-a-msdu-mesh-spoof-protection.docx</Note>
    </Notes>
    <CVE>CVE-2025-38512</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38512.html</URL>
        <Description>CVE-2025-38512</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248178</URL>
        <Description>SUSE Bug 1248178</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="52">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: zd1211rw: Fix potential NULL pointer dereference in zd_mac_tx_to_dev()

There is a potential NULL pointer dereference in zd_mac_tx_to_dev(). For
example, the following is possible:

    	T0			    		T1
zd_mac_tx_to_dev()
  /* len == skb_queue_len(q) */
  while (len &gt; ZD_MAC_MAX_ACK_WAITERS) {

					  filter_ack()
					    spin_lock_irqsave(&amp;q-&gt;lock, flags);
					    /* position == skb_queue_len(q) */
					    for (i=1; i&lt;position; i++)
				    	      skb = __skb_dequeue(q)

					    if (mac-&gt;type == NL80211_IFTYPE_AP)
					      skb = __skb_dequeue(q);
					    spin_unlock_irqrestore(&amp;q-&gt;lock, flags);

    skb_dequeue() -&gt; NULL

Since there is a small gap between checking skb queue length and skb being
unconditionally dequeued in zd_mac_tx_to_dev(), skb_dequeue() can return NULL.
Then the pointer is passed to zd_mac_tx_status() where it is dereferenced.

In order to avoid potential NULL pointer dereference due to situations like
above, check if skb is not NULL before passing it to zd_mac_tx_status().

Found by Linux Verification Center (linuxtesting.org) with SVACE.</Note>
    </Notes>
    <CVE>CVE-2025-38513</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38513.html</URL>
        <Description>CVE-2025-38513</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248179</URL>
        <Description>SUSE Bug 1248179</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="53">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/sched: Increment job count before swapping tail spsc queue

A small race exists between spsc_queue_push and the run-job worker, in
which spsc_queue_push may return not-first while the run-job worker has
already idled due to the job count being zero. If this race occurs, job
scheduling stops, leading to hangs while waiting on the job's DMA
fences.

Seal this race by incrementing the job count before appending to the
SPSC queue.

This race was observed on a drm-tip 6.16-rc1 build with the Xe driver in
an SVM test case.</Note>
    </Notes>
    <CVE>CVE-2025-38515</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38515.html</URL>
        <Description>CVE-2025-38515</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248212</URL>
        <Description>SUSE Bug 1248212</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="54">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

atm: clip: Fix memory leak of struct clip_vcc.

ioctl(ATMARP_MKIP) allocates struct clip_vcc and set it to
vcc-&gt;user_back.

The code assumes that vcc_destroy_socket() passes NULL skb
to vcc-&gt;push() when the socket is close()d, and then clip_push()
frees clip_vcc.

However, ioctl(ATMARPD_CTRL) sets NULL to vcc-&gt;push() in
atm_init_atmarp(), resulting in memory leak.

Let's serialise two ioctl() by lock_sock() and check vcc-&gt;push()
in atm_init_atmarp() to prevent memleak.</Note>
    </Notes>
    <CVE>CVE-2025-38546</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38546.html</URL>
        <Description>CVE-2025-38546</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248223</URL>
        <Description>SUSE Bug 1248223</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="55">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

HID: core: Harden s32ton() against conversion to 0 bits

Testing by the syzbot fuzzer showed that the HID core gets a
shift-out-of-bounds exception when it tries to convert a 32-bit
quantity to a 0-bit quantity.  Ideally this should never occur, but
there are buggy devices and some might have a report field with size
set to zero; we shouldn't reject the report or the device just because
of that.

Instead, harden the s32ton() routine so that it returns a reasonable
result instead of crashing when it is called with the number of bits
set to 0 -- the same as what snto32() does.</Note>
    </Notes>
    <CVE>CVE-2025-38556</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38556.html</URL>
        <Description>CVE-2025-38556</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248296</URL>
        <Description>SUSE Bug 1248296</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="56">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

perf/core: Prevent VMA split of buffer mappings

The perf mmap code is careful about mmap()'ing the user page with the
ringbuffer and additionally the auxiliary buffer, when the event supports
it. Once the first mapping is established, subsequent mapping have to use
the same offset and the same size in both cases. The reference counting for
the ringbuffer and the auxiliary buffer depends on this being correct.

Though perf does not prevent that a related mapping is split via mmap(2),
munmap(2) or mremap(2). A split of a VMA results in perf_mmap_open() calls,
which take reference counts, but then the subsequent perf_mmap_close()
calls are not longer fulfilling the offset and size checks. This leads to
reference count leaks.

As perf already has the requirement for subsequent mappings to match the
initial mapping, the obvious consequence is that VMA splits, caused by
resizing of a mapping or partial unmapping, have to be prevented.

Implement the vm_operations_struct::may_split() callback and return
unconditionally -EINVAL.

That ensures that the mapping offsets and sizes cannot be changed after the
fact. Remapping to a different fixed address with the same size is still
possible as it takes the references for the new mapping and drops those of
the old mapping.</Note>
    </Notes>
    <CVE>CVE-2025-38563</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38563.html</URL>
        <Description>CVE-2025-38563</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248306</URL>
        <Description>SUSE Bug 1248306</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248307</URL>
        <Description>SUSE Bug 1248307</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="57">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

perf/core: Exit early on perf_mmap() fail

When perf_mmap() fails to allocate a buffer, it still invokes the
event_mapped() callback of the related event. On X86 this might increase
the perf_rdpmc_allowed reference counter. But nothing undoes this as
perf_mmap_close() is never called in this case, which causes another
reference count leak.

Return early on failure to prevent that.</Note>
    </Notes>
    <CVE>CVE-2025-38565</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38565.html</URL>
        <Description>CVE-2025-38565</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248377</URL>
        <Description>SUSE Bug 1248377</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="58">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/packet: fix a race in packet_set_ring() and packet_notifier()

When packet_set_ring() releases po-&gt;bind_lock, another thread can
run packet_notifier() and process an NETDEV_UP event.

This race and the fix are both similar to that of commit 15fe076edea7
("net/packet: fix a race in packet_bind() and packet_notifier()").

There too the packet_notifier NETDEV_UP event managed to run while a
po-&gt;bind_lock critical section had to be temporarily released. And
the fix was similarly to temporarily set po-&gt;num to zero to keep
the socket unhooked until the lock is retaken.

The po-&gt;bind_lock in packet_set_ring and packet_notifier precede the
introduction of git history.</Note>
    </Notes>
    <CVE>CVE-2025-38617</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38617.html</URL>
        <Description>CVE-2025-38617</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248621</URL>
        <Description>SUSE Bug 1248621</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1249208</URL>
        <Description>SUSE Bug 1249208</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="59">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

vsock: Do not allow binding to VMADDR_PORT_ANY

It is possible for a vsock to autobind to VMADDR_PORT_ANY. This can
cause a use-after-free when a connection is made to the bound socket.
The socket returned by accept() also has port VMADDR_PORT_ANY but is not
on the list of unbound sockets. Binding it will result in an extra
refcount decrement similar to the one fixed in fcdd2242c023 (vsock: Keep
the binding until socket destruction).

Modify the check in __vsock_bind_connectible() to also prevent binding
to VMADDR_PORT_ANY.</Note>
    </Notes>
    <CVE>CVE-2025-38618</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38618.html</URL>
        <Description>CVE-2025-38618</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248511</URL>
        <Description>SUSE Bug 1248511</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1249207</URL>
        <Description>SUSE Bug 1249207</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="60">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: reject TDLS operations when station is not associated

syzbot triggered a WARN in ieee80211_tdls_oper() by sending
NL80211_TDLS_ENABLE_LINK immediately after NL80211_CMD_CONNECT,
before association completed and without prior TDLS setup.

This left internal state like sdata-&gt;u.mgd.tdls_peer uninitialized,
leading to a WARN_ON() in code paths that assumed it was valid.

Reject the operation early if not in station mode or not associated.</Note>
    </Notes>
    <CVE>CVE-2025-38644</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_272-default-1-8.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.272.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.272.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38644.html</URL>
        <Description>CVE-2025-38644</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248748</URL>
        <Description>SUSE Bug 1248748</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248749</URL>
        <Description>SUSE Bug 1248749</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
