<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:03384-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-09-26T17:28:20Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-09-26T17:28:20Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-09-26T17:28:20Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-49492: nvme-pci: fix a NULL pointer dereference in nvme_alloc_admin_tags (bsc#1238954).
- CVE-2022-50116: kernel: tty: n_gsm: fix deadlock and link starvation in outgoing data path (bsc#1244824).
- CVE-2023-53117: fs: prevent out-of-bounds array speculation when closing a file descriptor (bsc#1242780).
- CVE-2024-42265: protect the fetch of -&gt;fd[fd] in do_dup2() from mispredictions (bsc#1229334).
- CVE-2024-58239: tls: stop recv() if initial process_rx_list gave us non-DATA (bsc#1248614).
- CVE-2025-21971: net_sched: Prevent creation of classes with TC_H_ROOT (bsc#1240799).
- CVE-2025-22045: x86/mm: Fix flush_tlb_range() when used for zapping normal PMDs (bsc#1241433).
- CVE-2025-38180: net: atm: fix /proc/net/atm/lec handling (bsc#1245970).
- CVE-2025-38206: exfat: fix double free in delayed_free (bsc#1246073).
- CVE-2025-38323: net: atm: add lec_mutex (bsc#1246473).
- CVE-2025-38350: net/sched: Always pass notifications when child class becomes empty (bsc#1246781).
- CVE-2025-38352: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (bsc#1246911).
- CVE-2025-38460: atm: clip: Fix potential null-ptr-deref in to_atmarpd() (bsc#1247143).
- CVE-2025-38468: net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree (bsc#1247437).
- CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247314).
- CVE-2025-38498: do_change_type(): refuse to operate on unmounted/not ours mounts (bsc#1247374).
- CVE-2025-38499: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (bsc#1247976).
- CVE-2025-38546: atm: clip: Fix memory leak of struct clip_vcc (bsc#1248223).
- CVE-2025-38563: perf/core: Prevent VMA split of buffer mappings (bsc#1248306).
- CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248338).
- CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1248621).
- CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1248511).
- CVE-2025-38644: wifi: mac80211: reject TDLS operations when station is not associated (bsc#1248748).
    
The following non-security bugs were fixed:

- Disable N_GSM (bsc#1244824 jsc#PED-8240).
- NFSv4.1: fix backchannel max_resp_sz verification check (bsc#1247518).
- scsi: iscsi: iscsi_tcp: Fix null-ptr-deref while calling getpeername() (bsc#1243278).
- scsi: iscsi_tcp: Check that sock is valid before iscsi_set_param() (git-fixes).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2025-3384,SUSE-SUSE-MicroOS-5.1-2025-3384,SUSE-SUSE-MicroOS-5.2-2025-3384</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503384-1/</URL>
      <Description>Link for SUSE-SU-2025:03384-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:03384-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229334</URL>
      <Description>SUSE Bug 1229334</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1238954</URL>
      <Description>SUSE Bug 1238954</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1240799</URL>
      <Description>SUSE Bug 1240799</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1241433</URL>
      <Description>SUSE Bug 1241433</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1242780</URL>
      <Description>SUSE Bug 1242780</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1243278</URL>
      <Description>SUSE Bug 1243278</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1244824</URL>
      <Description>SUSE Bug 1244824</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245970</URL>
      <Description>SUSE Bug 1245970</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246073</URL>
      <Description>SUSE Bug 1246073</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246473</URL>
      <Description>SUSE Bug 1246473</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246781</URL>
      <Description>SUSE Bug 1246781</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246911</URL>
      <Description>SUSE Bug 1246911</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247143</URL>
      <Description>SUSE Bug 1247143</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247314</URL>
      <Description>SUSE Bug 1247314</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247374</URL>
      <Description>SUSE Bug 1247374</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247437</URL>
      <Description>SUSE Bug 1247437</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247518</URL>
      <Description>SUSE Bug 1247518</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247976</URL>
      <Description>SUSE Bug 1247976</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1248223</URL>
      <Description>SUSE Bug 1248223</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1248306</URL>
      <Description>SUSE Bug 1248306</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1248338</URL>
      <Description>SUSE Bug 1248338</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1248511</URL>
      <Description>SUSE Bug 1248511</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1248614</URL>
      <Description>SUSE Bug 1248614</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1248621</URL>
      <Description>SUSE Bug 1248621</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1248748</URL>
      <Description>SUSE Bug 1248748</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-49492/</URL>
      <Description>SUSE CVE CVE-2022-49492 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-50116/</URL>
      <Description>SUSE CVE CVE-2022-50116 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-53117/</URL>
      <Description>SUSE CVE CVE-2023-53117 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-42265/</URL>
      <Description>SUSE CVE CVE-2024-42265 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-58239/</URL>
      <Description>SUSE CVE CVE-2024-58239 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-21971/</URL>
      <Description>SUSE CVE CVE-2025-21971 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-22045/</URL>
      <Description>SUSE CVE CVE-2025-22045 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38180/</URL>
      <Description>SUSE CVE CVE-2025-38180 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38206/</URL>
      <Description>SUSE CVE CVE-2025-38206 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38323/</URL>
      <Description>SUSE CVE CVE-2025-38323 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38350/</URL>
      <Description>SUSE CVE CVE-2025-38350 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38352/</URL>
      <Description>SUSE CVE CVE-2025-38352 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38460/</URL>
      <Description>SUSE CVE CVE-2025-38460 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38468/</URL>
      <Description>SUSE CVE CVE-2025-38468 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38477/</URL>
      <Description>SUSE CVE CVE-2025-38477 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38498/</URL>
      <Description>SUSE CVE CVE-2025-38498 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38499/</URL>
      <Description>SUSE CVE CVE-2025-38499 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38546/</URL>
      <Description>SUSE CVE CVE-2025-38546 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38563/</URL>
      <Description>SUSE CVE CVE-2025-38563 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38608/</URL>
      <Description>SUSE CVE CVE-2025-38608 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38617/</URL>
      <Description>SUSE CVE CVE-2025-38617 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38618/</URL>
      <Description>SUSE CVE CVE-2025-38618 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38644/</URL>
      <Description>SUSE CVE CVE-2025-38644 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Micro 5.1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Micro 5.1">
        <FullProductName ProductID="SUSE Linux Enterprise Micro 5.1" CPE="cpe:/o:suse:suse-microos:5.1">SUSE Linux Enterprise Micro 5.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Micro 5.2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Micro 5.2">
        <FullProductName ProductID="SUSE Linux Enterprise Micro 5.2" CPE="cpe:/o:suse:suse-microos:5.2">SUSE Linux Enterprise Micro 5.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="cluster-md-kmp-rt-5.3.18-150300.220.1">
      <FullProductName ProductID="cluster-md-kmp-rt-5.3.18-150300.220.1">cluster-md-kmp-rt-5.3.18-150300.220.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cluster-md-kmp-rt_debug-5.3.18-150300.220.1">
      <FullProductName ProductID="cluster-md-kmp-rt_debug-5.3.18-150300.220.1">cluster-md-kmp-rt_debug-5.3.18-150300.220.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dlm-kmp-rt-5.3.18-150300.220.1">
      <FullProductName ProductID="dlm-kmp-rt-5.3.18-150300.220.1">dlm-kmp-rt-5.3.18-150300.220.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dlm-kmp-rt_debug-5.3.18-150300.220.1">
      <FullProductName ProductID="dlm-kmp-rt_debug-5.3.18-150300.220.1">dlm-kmp-rt_debug-5.3.18-150300.220.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gfs2-kmp-rt-5.3.18-150300.220.1">
      <FullProductName ProductID="gfs2-kmp-rt-5.3.18-150300.220.1">gfs2-kmp-rt-5.3.18-150300.220.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gfs2-kmp-rt_debug-5.3.18-150300.220.1">
      <FullProductName ProductID="gfs2-kmp-rt_debug-5.3.18-150300.220.1">gfs2-kmp-rt_debug-5.3.18-150300.220.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-rt-5.3.18-150300.220.1">
      <FullProductName ProductID="kernel-devel-rt-5.3.18-150300.220.1">kernel-devel-rt-5.3.18-150300.220.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-5.3.18-150300.220.1">
      <FullProductName ProductID="kernel-rt-5.3.18-150300.220.1">kernel-rt-5.3.18-150300.220.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-devel-5.3.18-150300.220.1">
      <FullProductName ProductID="kernel-rt-devel-5.3.18-150300.220.1">kernel-rt-devel-5.3.18-150300.220.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-extra-5.3.18-150300.220.1">
      <FullProductName ProductID="kernel-rt-extra-5.3.18-150300.220.1">kernel-rt-extra-5.3.18-150300.220.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-livepatch-devel-5.3.18-150300.220.1">
      <FullProductName ProductID="kernel-rt-livepatch-devel-5.3.18-150300.220.1">kernel-rt-livepatch-devel-5.3.18-150300.220.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-optional-5.3.18-150300.220.1">
      <FullProductName ProductID="kernel-rt-optional-5.3.18-150300.220.1">kernel-rt-optional-5.3.18-150300.220.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt_debug-5.3.18-150300.220.1">
      <FullProductName ProductID="kernel-rt_debug-5.3.18-150300.220.1">kernel-rt_debug-5.3.18-150300.220.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt_debug-devel-5.3.18-150300.220.1">
      <FullProductName ProductID="kernel-rt_debug-devel-5.3.18-150300.220.1">kernel-rt_debug-devel-5.3.18-150300.220.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt_debug-extra-5.3.18-150300.220.1">
      <FullProductName ProductID="kernel-rt_debug-extra-5.3.18-150300.220.1">kernel-rt_debug-extra-5.3.18-150300.220.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt_debug-livepatch-devel-5.3.18-150300.220.1">
      <FullProductName ProductID="kernel-rt_debug-livepatch-devel-5.3.18-150300.220.1">kernel-rt_debug-livepatch-devel-5.3.18-150300.220.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt_debug-optional-5.3.18-150300.220.1">
      <FullProductName ProductID="kernel-rt_debug-optional-5.3.18-150300.220.1">kernel-rt_debug-optional-5.3.18-150300.220.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-rt-5.3.18-150300.220.1">
      <FullProductName ProductID="kernel-source-rt-5.3.18-150300.220.1">kernel-source-rt-5.3.18-150300.220.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kselftests-kmp-rt-5.3.18-150300.220.1">
      <FullProductName ProductID="kselftests-kmp-rt-5.3.18-150300.220.1">kselftests-kmp-rt-5.3.18-150300.220.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kselftests-kmp-rt_debug-5.3.18-150300.220.1">
      <FullProductName ProductID="kselftests-kmp-rt_debug-5.3.18-150300.220.1">kselftests-kmp-rt_debug-5.3.18-150300.220.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ocfs2-kmp-rt-5.3.18-150300.220.1">
      <FullProductName ProductID="ocfs2-kmp-rt-5.3.18-150300.220.1">ocfs2-kmp-rt-5.3.18-150300.220.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ocfs2-kmp-rt_debug-5.3.18-150300.220.1">
      <FullProductName ProductID="ocfs2-kmp-rt_debug-5.3.18-150300.220.1">ocfs2-kmp-rt_debug-5.3.18-150300.220.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="reiserfs-kmp-rt-5.3.18-150300.220.1">
      <FullProductName ProductID="reiserfs-kmp-rt-5.3.18-150300.220.1">reiserfs-kmp-rt-5.3.18-150300.220.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="reiserfs-kmp-rt_debug-5.3.18-150300.220.1">
      <FullProductName ProductID="reiserfs-kmp-rt_debug-5.3.18-150300.220.1">reiserfs-kmp-rt_debug-5.3.18-150300.220.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-rt-5.3.18-150300.220.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.1">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.220.1">kernel-rt-5.3.18-150300.220.1 as a component of SUSE Linux Enterprise Micro 5.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-rt-5.3.18-150300.220.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.1">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.220.1">kernel-source-rt-5.3.18-150300.220.1 as a component of SUSE Linux Enterprise Micro 5.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt-5.3.18-150300.220.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.2">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.220.1">kernel-rt-5.3.18-150300.220.1 as a component of SUSE Linux Enterprise Micro 5.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-rt-5.3.18-150300.220.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.2">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.220.1">kernel-source-rt-5.3.18-150300.220.1 as a component of SUSE Linux Enterprise Micro 5.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nvme-pci: fix a NULL pointer dereference in nvme_alloc_admin_tags

In nvme_alloc_admin_tags, the admin_q can be set to an error (typically
-ENOMEM) if the blk_mq_init_queue call fails to set up the queue, which
is checked immediately after the call. However, when we return the error
message up the stack, to nvme_reset_work the error takes us to
nvme_remove_dead_ctrl()
  nvme_dev_disable()
   nvme_suspend_queue(&amp;dev-&gt;queues[0]).

Here, we only check that the admin_q is non-NULL, rather than not
an error or NULL, and begin quiescing a queue that never existed, leading
to bad / NULL pointer dereference.</Note>
    </Notes>
    <CVE>CVE-2022-49492</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.220.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503384-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-49492.html</URL>
        <Description>CVE-2022-49492</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1238954</URL>
        <Description>SUSE Bug 1238954</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tty: n_gsm: fix deadlock and link starvation in outgoing data path

The current implementation queues up new control and user packets as needed
and processes this queue down to the ldisc in the same code path.
That means that the upper and the lower layer are hard coupled in the code.
Due to this deadlocks can happen as seen below while transmitting data,
especially during ldisc congestion. Furthermore, the data channels starve
the control channel on high transmission load on the ldisc.

Introduce an additional control channel data queue to prevent timeouts and
link hangups during ldisc congestion. This is being processed before the
user channel data queue in gsm_data_kick(), i.e. with the highest priority.
Put the queue to ldisc data path into a workqueue and trigger it whenever
new data has been put into the transmission queue. Change
gsm_dlci_data_sweep() accordingly to fill up the transmission queue until
TX_THRESH_HI. This solves the locking issue, keeps latency low and provides
good performance on high data load.
Note that now all packets from a DLCI are removed from the internal queue
if the associated DLCI was closed. This ensures that no data is sent by the
introduced write task to an already closed DLCI.

BUG: spinlock recursion on CPU#0, test_v24_loop/124
 lock: serial8250_ports+0x3a8/0x7500, .magic: dead4ead, .owner: test_v24_loop/124, .owner_cpu: 0
CPU: 0 PID: 124 Comm: test_v24_loop Tainted: G           O      5.18.0-rc2 #3
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
Call Trace:
 &lt;IRQ&gt;
 dump_stack_lvl+0x34/0x44
 do_raw_spin_lock+0x76/0xa0
 _raw_spin_lock_irqsave+0x72/0x80
 uart_write_room+0x3b/0xc0
 gsm_data_kick+0x14b/0x240 [n_gsm]
 gsmld_write_wakeup+0x35/0x70 [n_gsm]
 tty_wakeup+0x53/0x60
 tty_port_default_wakeup+0x1b/0x30
 serial8250_tx_chars+0x12f/0x220
 serial8250_handle_irq.part.0+0xfe/0x150
 serial8250_default_handle_irq+0x48/0x80
 serial8250_interrupt+0x56/0xa0
 __handle_irq_event_percpu+0x78/0x1f0
 handle_irq_event+0x34/0x70
 handle_fasteoi_irq+0x90/0x1e0
 __common_interrupt+0x69/0x100
 common_interrupt+0x48/0xc0
 asm_common_interrupt+0x1e/0x40
RIP: 0010:__do_softirq+0x83/0x34e
Code: 2a 0a ff 0f b7 ed c7 44 24 10 0a 00 00 00 48 c7 c7 51 2a 64 82 e8 2d
e2 d5 ff 65 66 c7 05 83 af 1e 7e 00 00 fb b8 ff ff ff ff &lt;49&gt; c7 c2 40 61
80 82 0f bc c5 41 89 c4 41 83 c4 01 0f 84 e6 00 00
RSP: 0018:ffffc90000003f98 EFLAGS: 00000286
RAX: 00000000ffffffff RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffffffff82642a51 RDI: ffffffff825bb5e7
RBP: 0000000000000200 R08: 00000008de3271a8 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000030 R14: 0000000000000000 R15: 0000000000000000
 ? __do_softirq+0x73/0x34e
 irq_exit_rcu+0xb5/0x100
 common_interrupt+0xa4/0xc0
 &lt;/IRQ&gt;
 &lt;TASK&gt;
 asm_common_interrupt+0x1e/0x40
RIP: 0010:_raw_spin_unlock_irqrestore+0x2e/0x50
Code: 00 55 48 89 fd 48 83 c7 18 53 48 89 f3 48 8b 74 24 10 e8 85 28 36 ff
48 89 ef e8 cd 58 36 ff 80 e7 02 74 01 fb bf 01 00 00 00 &lt;e8&gt; 3d 97 33 ff
65 8b 05 96 23 2b 7e 85 c0 74 03 5b 5d c3 0f 1f 44
RSP: 0018:ffffc9000020fd08 EFLAGS: 00000202
RAX: 0000000000000000 RBX: 0000000000000246 RCX: 0000000000000000
RDX: 0000000000000004 RSI: ffffffff8257fd74 RDI: 0000000000000001
RBP: ffff8880057de3a0 R08: 00000008de233000 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000100 R14: 0000000000000202 R15: ffff8880057df0b8
 ? _raw_spin_unlock_irqrestore+0x23/0x50
 gsmtty_write+0x65/0x80 [n_gsm]
 n_tty_write+0x33f/0x530
 ? swake_up_all+0xe0/0xe0
 file_tty_write.constprop.0+0x1b1/0x320
 ? n_tty_flush_buffer+0xb0/0xb0
 new_sync_write+0x10c/0x190
 vfs_write+0x282/0x310
 ksys_write+0x68/0xe0
 do_syscall_64+0x3b/0x90
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f3e5e35c15c
Code: 8b 7c 24 08 89 c5 e8 c5 ff ff ff 89 ef 89 44 24
---truncated---</Note>
    </Notes>
    <CVE>CVE-2022-50116</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.220.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503384-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-50116.html</URL>
        <Description>CVE-2022-50116</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244824</URL>
        <Description>SUSE Bug 1244824</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

fs: prevent out-of-bounds array speculation when closing a file descriptor

Google-Bug-Id: 114199369</Note>
    </Notes>
    <CVE>CVE-2023-53117</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.220.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503384-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-53117.html</URL>
        <Description>CVE-2023-53117</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1242780</URL>
        <Description>SUSE Bug 1242780</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

protect the fetch of -&gt;fd[fd] in do_dup2() from mispredictions

both callers have verified that fd is not greater than -&gt;max_fds;
however, misprediction might end up with
        tofree = fdt-&gt;fd[fd];
being speculatively executed.  That's wrong for the same reasons
why it's wrong in close_fd()/file_close_fd_locked(); the same
solution applies - array_index_nospec(fd, fdt-&gt;max_fds) could differ
from fd only in case of speculative execution on mispredicted path.</Note>
    </Notes>
    <CVE>CVE-2024-42265</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.220.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503384-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-42265.html</URL>
        <Description>CVE-2024-42265</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1229334</URL>
        <Description>SUSE Bug 1229334</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tls: stop recv() if initial process_rx_list gave us non-DATA

If we have a non-DATA record on the rx_list and another record of the
same type still on the queue, we will end up merging them:
 - process_rx_list copies the non-DATA record
 - we start the loop and process the first available record since it's
   of the same type
 - we break out of the loop since the record was not DATA

Just check the record type and jump to the end in case process_rx_list
did some work.</Note>
    </Notes>
    <CVE>CVE-2024-58239</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.220.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503384-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-58239.html</URL>
        <Description>CVE-2024-58239</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248614</URL>
        <Description>SUSE Bug 1248614</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248615</URL>
        <Description>SUSE Bug 1248615</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net_sched: Prevent creation of classes with TC_H_ROOT

The function qdisc_tree_reduce_backlog() uses TC_H_ROOT as a termination
condition when traversing up the qdisc tree to update parent backlog
counters. However, if a class is created with classid TC_H_ROOT, the
traversal terminates prematurely at this class instead of reaching the
actual root qdisc, causing parent statistics to be incorrectly maintained.
In case of DRR, this could lead to a crash as reported by Mingi Cho.

Prevent the creation of any Qdisc class with classid TC_H_ROOT
(0xFFFFFFFF) across all qdisc types, as suggested by Jamal.</Note>
    </Notes>
    <CVE>CVE-2025-21971</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.220.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503384-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-21971.html</URL>
        <Description>CVE-2025-21971</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1240799</URL>
        <Description>SUSE Bug 1240799</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245794</URL>
        <Description>SUSE Bug 1245794</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

x86/mm: Fix flush_tlb_range() when used for zapping normal PMDs

On the following path, flush_tlb_range() can be used for zapping normal
PMD entries (PMD entries that point to page tables) together with the PTE
entries in the pointed-to page table:

    collapse_pte_mapped_thp
      pmdp_collapse_flush
        flush_tlb_range

The arm64 version of flush_tlb_range() has a comment describing that it can
be used for page table removal, and does not use any last-level
invalidation optimizations. Fix the X86 version by making it behave the
same way.

Currently, X86 only uses this information for the following two purposes,
which I think means the issue doesn't have much impact:

 - In native_flush_tlb_multi() for checking if lazy TLB CPUs need to be
   IPI'd to avoid issues with speculative page table walks.
 - In Hyper-V TLB paravirtualization, again for lazy TLB stuff.

The patch "x86/mm: only invalidate final translations with INVLPGB" which
is currently under review (see
&lt;https://lore.kernel.org/all/20241230175550.4046587-13-riel@surriel.com/&gt;)
would probably be making the impact of this a lot worse.</Note>
    </Notes>
    <CVE>CVE-2025-22045</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.220.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503384-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-22045.html</URL>
        <Description>CVE-2025-22045</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1241433</URL>
        <Description>SUSE Bug 1241433</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: atm: fix /proc/net/atm/lec handling

/proc/net/atm/lec must ensure safety against dev_lec[] changes.

It appears it had dev_put() calls without prior dev_hold(),
leading to imbalance and UAF.</Note>
    </Notes>
    <CVE>CVE-2025-38180</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.220.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503384-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38180.html</URL>
        <Description>CVE-2025-38180</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245970</URL>
        <Description>SUSE Bug 1245970</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245971</URL>
        <Description>SUSE Bug 1245971</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

exfat: fix double free in delayed_free

The double free could happen in the following path.

exfat_create_upcase_table()
        exfat_create_upcase_table() : return error
        exfat_free_upcase_table() : free -&gt;vol_utbl
        exfat_load_default_upcase_table : return error
     exfat_kill_sb()
           delayed_free()
                  exfat_free_upcase_table() &lt;--------- double free
This patch set -&gt;vol_util as NULL after freeing it.</Note>
    </Notes>
    <CVE>CVE-2025-38206</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.220.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503384-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38206.html</URL>
        <Description>CVE-2025-38206</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246073</URL>
        <Description>SUSE Bug 1246073</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246075</URL>
        <Description>SUSE Bug 1246075</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: atm: add lec_mutex

syzbot found its way in net/atm/lec.c, and found an error path
in lecd_attach() could leave a dangling pointer in dev_lec[].

Add a mutex to protect dev_lecp[] uses from lecd_attach(),
lec_vcc_attach() and lec_mcast_attach().

Following patch will use this mutex for /proc/net/atm/lec.

BUG: KASAN: slab-use-after-free in lecd_attach net/atm/lec.c:751 [inline]
BUG: KASAN: slab-use-after-free in lane_ioctl+0x2224/0x23e0 net/atm/lec.c:1008
Read of size 8 at addr ffff88807c7b8e68 by task syz.1.17/6142

CPU: 1 UID: 0 PID: 6142 Comm: syz.1.17 Not tainted 6.16.0-rc1-syzkaller-00239-g08215f5486ec #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
Call Trace:
 &lt;TASK&gt;
  __dump_stack lib/dump_stack.c:94 [inline]
  dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120
  print_address_description mm/kasan/report.c:408 [inline]
  print_report+0xcd/0x680 mm/kasan/report.c:521
  kasan_report+0xe0/0x110 mm/kasan/report.c:634
  lecd_attach net/atm/lec.c:751 [inline]
  lane_ioctl+0x2224/0x23e0 net/atm/lec.c:1008
  do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159
  sock_do_ioctl+0x118/0x280 net/socket.c:1190
  sock_ioctl+0x227/0x6b0 net/socket.c:1311
  vfs_ioctl fs/ioctl.c:51 [inline]
  __do_sys_ioctl fs/ioctl.c:907 [inline]
  __se_sys_ioctl fs/ioctl.c:893 [inline]
  __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:893
  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
  do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
 &lt;/TASK&gt;

Allocated by task 6132:
  kasan_save_stack+0x33/0x60 mm/kasan/common.c:47
  kasan_save_track+0x14/0x30 mm/kasan/common.c:68
  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
  __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394
  kasan_kmalloc include/linux/kasan.h:260 [inline]
  __do_kmalloc_node mm/slub.c:4328 [inline]
  __kvmalloc_node_noprof+0x27b/0x620 mm/slub.c:5015
  alloc_netdev_mqs+0xd2/0x1570 net/core/dev.c:11711
  lecd_attach net/atm/lec.c:737 [inline]
  lane_ioctl+0x17db/0x23e0 net/atm/lec.c:1008
  do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159
  sock_do_ioctl+0x118/0x280 net/socket.c:1190
  sock_ioctl+0x227/0x6b0 net/socket.c:1311
  vfs_ioctl fs/ioctl.c:51 [inline]
  __do_sys_ioctl fs/ioctl.c:907 [inline]
  __se_sys_ioctl fs/ioctl.c:893 [inline]
  __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:893
  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
  do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 6132:
  kasan_save_stack+0x33/0x60 mm/kasan/common.c:47
  kasan_save_track+0x14/0x30 mm/kasan/common.c:68
  kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:576
  poison_slab_object mm/kasan/common.c:247 [inline]
  __kasan_slab_free+0x51/0x70 mm/kasan/common.c:264
  kasan_slab_free include/linux/kasan.h:233 [inline]
  slab_free_hook mm/slub.c:2381 [inline]
  slab_free mm/slub.c:4643 [inline]
  kfree+0x2b4/0x4d0 mm/slub.c:4842
  free_netdev+0x6c5/0x910 net/core/dev.c:11892
  lecd_attach net/atm/lec.c:744 [inline]
  lane_ioctl+0x1ce8/0x23e0 net/atm/lec.c:1008
  do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159
  sock_do_ioctl+0x118/0x280 net/socket.c:1190
  sock_ioctl+0x227/0x6b0 net/socket.c:1311
  vfs_ioctl fs/ioctl.c:51 [inline]
  __do_sys_ioctl fs/ioctl.c:907 [inline]
  __se_sys_ioctl fs/ioctl.c:893 [inline]
  __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:893</Note>
    </Notes>
    <CVE>CVE-2025-38323</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.220.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503384-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38323.html</URL>
        <Description>CVE-2025-38323</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246473</URL>
        <Description>SUSE Bug 1246473</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246525</URL>
        <Description>SUSE Bug 1246525</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/sched: Always pass notifications when child class becomes empty

Certain classful qdiscs may invoke their classes' dequeue handler on an
enqueue operation. This may unexpectedly empty the child qdisc and thus
make an in-flight class passive via qlen_notify(). Most qdiscs do not
expect such behaviour at this point in time and may re-activate the
class eventually anyways which will lead to a use-after-free.

The referenced fix commit attempted to fix this behavior for the HFSC
case by moving the backlog accounting around, though this turned out to
be incomplete since the parent's parent may run into the issue too.
The following reproducer demonstrates this use-after-free:

    tc qdisc add dev lo root handle 1: drr
    tc filter add dev lo parent 1: basic classid 1:1
    tc class add dev lo parent 1: classid 1:1 drr
    tc qdisc add dev lo parent 1:1 handle 2: hfsc def 1
    tc class add dev lo parent 2: classid 2:1 hfsc rt m1 8 d 1 m2 0
    tc qdisc add dev lo parent 2:1 handle 3: netem
    tc qdisc add dev lo parent 3:1 handle 4: blackhole

    echo 1 | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888
    tc class delete dev lo classid 1:1
    echo 1 | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888

Since backlog accounting issues leading to a use-after-frees on stale
class pointers is a recurring pattern at this point, this patch takes
a different approach. Instead of trying to fix the accounting, the patch
ensures that qdisc_tree_reduce_backlog always calls qlen_notify when
the child qdisc is empty. This solves the problem because deletion of
qdiscs always involves a call to qdisc_reset() and / or
qdisc_purge_queue() which ultimately resets its qlen to 0 thus causing
the following qdisc_tree_reduce_backlog() to report to the parent. Note
that this may call qlen_notify on passive classes multiple times. This
is not a problem after the recent patch series that made all the
classful qdiscs qlen_notify() handlers idempotent.</Note>
    </Notes>
    <CVE>CVE-2025-38350</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.220.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503384-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38350.html</URL>
        <Description>CVE-2025-38350</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246781</URL>
        <Description>SUSE Bug 1246781</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247043</URL>
        <Description>SUSE Bug 1247043</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()

If an exiting non-autoreaping task has already passed exit_notify() and
calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent
or debugger right after unlock_task_sighand().

If a concurrent posix_cpu_timer_del() runs at that moment, it won't be
able to detect timer-&gt;it.cpu.firing != 0: cpu_timer_task_rcu() and/or
lock_task_sighand() will fail.

Add the tsk-&gt;exit_state check into run_posix_cpu_timers() to fix this.

This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because
exit_task_work() is called before exit_notify(). But the check still
makes sense, task_work_add(&amp;tsk-&gt;posix_cputimers_work.work) will fail
anyway in this case.</Note>
    </Notes>
    <CVE>CVE-2025-38352</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.220.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503384-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38352.html</URL>
        <Description>CVE-2025-38352</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246911</URL>
        <Description>SUSE Bug 1246911</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1249205</URL>
        <Description>SUSE Bug 1249205</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

atm: clip: Fix potential null-ptr-deref in to_atmarpd().

atmarpd is protected by RTNL since commit f3a0592b37b8 ("[ATM]: clip
causes unregister hang").

However, it is not enough because to_atmarpd() is called without RTNL,
especially clip_neigh_solicit() / neigh_ops-&gt;solicit() is unsleepable.

Also, there is no RTNL dependency around atmarpd.

Let's use a private mutex and RCU to protect access to atmarpd in
to_atmarpd().</Note>
    </Notes>
    <CVE>CVE-2025-38460</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.220.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503384-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38460.html</URL>
        <Description>CVE-2025-38460</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247143</URL>
        <Description>SUSE Bug 1247143</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree

htb_lookup_leaf has a BUG_ON that can trigger with the following:

tc qdisc del dev lo root
tc qdisc add dev lo root handle 1: htb default 1
tc class add dev lo parent 1: classid 1:1 htb rate 64bit
tc qdisc add dev lo parent 1:1 handle 2: netem
tc qdisc add dev lo parent 2:1 handle 3: blackhole
ping -I lo -c1 -W0.001 127.0.0.1

The root cause is the following:

1. htb_dequeue calls htb_dequeue_tree which calls the dequeue handler on
   the selected leaf qdisc
2. netem_dequeue calls enqueue on the child qdisc
3. blackhole_enqueue drops the packet and returns a value that is not
   just NET_XMIT_SUCCESS
4. Because of this, netem_dequeue calls qdisc_tree_reduce_backlog, and
   since qlen is now 0, it calls htb_qlen_notify -&gt; htb_deactivate -&gt;
   htb_deactiviate_prios -&gt; htb_remove_class_from_row -&gt; htb_safe_rb_erase
5. As this is the only class in the selected hprio rbtree,
   __rb_change_child in __rb_erase_augmented sets the rb_root pointer to
   NULL
6. Because blackhole_dequeue returns NULL, netem_dequeue returns NULL,
   which causes htb_dequeue_tree to call htb_lookup_leaf with the same
   hprio rbtree, and fail the BUG_ON

The function graph for this scenario is shown here:
 0)               |  htb_enqueue() {
 0) + 13.635 us   |    netem_enqueue();
 0)   4.719 us    |    htb_activate_prios();
 0) # 2249.199 us |  }
 0)               |  htb_dequeue() {
 0)   2.355 us    |    htb_lookup_leaf();
 0)               |    netem_dequeue() {
 0) + 11.061 us   |      blackhole_enqueue();
 0)               |      qdisc_tree_reduce_backlog() {
 0)               |        qdisc_lookup_rcu() {
 0)   1.873 us    |          qdisc_match_from_root();
 0)   6.292 us    |        }
 0)   1.894 us    |        htb_search();
 0)               |        htb_qlen_notify() {
 0)   2.655 us    |          htb_deactivate_prios();
 0)   6.933 us    |        }
 0) + 25.227 us   |      }
 0)   1.983 us    |      blackhole_dequeue();
 0) + 86.553 us   |    }
 0) # 2932.761 us |    qdisc_warn_nonwc();
 0)               |    htb_lookup_leaf() {
 0)               |      BUG_ON();
 ------------------------------------------

The full original bug report can be seen here [1].

We can fix this just by returning NULL instead of the BUG_ON,
as htb_dequeue_tree returns NULL when htb_lookup_leaf returns
NULL.

[1] https://lore.kernel.org/netdev/pF5XOOIim0IuEfhI-SOxTgRvNoDwuux7UHKnE_Y5-zVd4wmGvNk2ceHjKb8ORnzw0cGwfmVu42g9dL7XyJLf1NEzaztboTWcm0Ogxuojoeo=@willsroot.io/</Note>
    </Notes>
    <CVE>CVE-2025-38468</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.220.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503384-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38468.html</URL>
        <Description>CVE-2025-38468</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247437</URL>
        <Description>SUSE Bug 1247437</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_qfq: Fix race condition on qfq_aggregate

A race condition can occur when 'agg' is modified in qfq_change_agg
(called during qfq_enqueue) while other threads access it
concurrently. For example, qfq_dump_class may trigger a NULL
dereference, and qfq_delete_class may cause a use-after-free.

This patch addresses the issue by:

1. Moved qfq_destroy_class into the critical section.

2. Added sch_tree_lock protection to qfq_dump_class and
qfq_dump_class_stats.</Note>
    </Notes>
    <CVE>CVE-2025-38477</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.220.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503384-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38477.html</URL>
        <Description>CVE-2025-38477</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247314</URL>
        <Description>SUSE Bug 1247314</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247315</URL>
        <Description>SUSE Bug 1247315</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

do_change_type(): refuse to operate on unmounted/not ours mounts

Ensure that propagation settings can only be changed for mounts located
in the caller's mount namespace. This change aligns permission checking
with the rest of mount(2).</Note>
    </Notes>
    <CVE>CVE-2025-38498</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.220.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503384-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38498.html</URL>
        <Description>CVE-2025-38498</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247374</URL>
        <Description>SUSE Bug 1247374</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247499</URL>
        <Description>SUSE Bug 1247499</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns

What we want is to verify there is that clone won't expose something
hidden by a mount we wouldn't be able to undo.  "Wouldn't be able to undo"
may be a result of MNT_LOCKED on a child, but it may also come from
lacking admin rights in the userns of the namespace mount belongs to.

clone_private_mnt() checks the former, but not the latter.

There's a number of rather confusing CAP_SYS_ADMIN checks in various
userns during the mount, especially with the new mount API; they serve
different purposes and in case of clone_private_mnt() they usually,
but not always end up covering the missing check mentioned above.</Note>
    </Notes>
    <CVE>CVE-2025-38499</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.220.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503384-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38499.html</URL>
        <Description>CVE-2025-38499</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247976</URL>
        <Description>SUSE Bug 1247976</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248673</URL>
        <Description>SUSE Bug 1248673</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

atm: clip: Fix memory leak of struct clip_vcc.

ioctl(ATMARP_MKIP) allocates struct clip_vcc and set it to
vcc-&gt;user_back.

The code assumes that vcc_destroy_socket() passes NULL skb
to vcc-&gt;push() when the socket is close()d, and then clip_push()
frees clip_vcc.

However, ioctl(ATMARPD_CTRL) sets NULL to vcc-&gt;push() in
atm_init_atmarp(), resulting in memory leak.

Let's serialise two ioctl() by lock_sock() and check vcc-&gt;push()
in atm_init_atmarp() to prevent memleak.</Note>
    </Notes>
    <CVE>CVE-2025-38546</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.220.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503384-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38546.html</URL>
        <Description>CVE-2025-38546</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248223</URL>
        <Description>SUSE Bug 1248223</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

perf/core: Prevent VMA split of buffer mappings

The perf mmap code is careful about mmap()'ing the user page with the
ringbuffer and additionally the auxiliary buffer, when the event supports
it. Once the first mapping is established, subsequent mapping have to use
the same offset and the same size in both cases. The reference counting for
the ringbuffer and the auxiliary buffer depends on this being correct.

Though perf does not prevent that a related mapping is split via mmap(2),
munmap(2) or mremap(2). A split of a VMA results in perf_mmap_open() calls,
which take reference counts, but then the subsequent perf_mmap_close()
calls are not longer fulfilling the offset and size checks. This leads to
reference count leaks.

As perf already has the requirement for subsequent mappings to match the
initial mapping, the obvious consequence is that VMA splits, caused by
resizing of a mapping or partial unmapping, have to be prevented.

Implement the vm_operations_struct::may_split() callback and return
unconditionally -EINVAL.

That ensures that the mapping offsets and sizes cannot be changed after the
fact. Remapping to a different fixed address with the same size is still
possible as it takes the references for the new mapping and drops those of
the old mapping.</Note>
    </Notes>
    <CVE>CVE-2025-38563</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.220.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503384-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38563.html</URL>
        <Description>CVE-2025-38563</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248306</URL>
        <Description>SUSE Bug 1248306</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248307</URL>
        <Description>SUSE Bug 1248307</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls

When sending plaintext data, we initially calculated the corresponding
ciphertext length. However, if we later reduced the plaintext data length
via socket policy, we failed to recalculate the ciphertext length.

This results in transmitting buffers containing uninitialized data during
ciphertext transmission.

This causes uninitialized bytes to be appended after a complete
"Application Data" packet, leading to errors on the receiving end when
parsing TLS record.</Note>
    </Notes>
    <CVE>CVE-2025-38608</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.220.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503384-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38608.html</URL>
        <Description>CVE-2025-38608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248338</URL>
        <Description>SUSE Bug 1248338</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248670</URL>
        <Description>SUSE Bug 1248670</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/packet: fix a race in packet_set_ring() and packet_notifier()

When packet_set_ring() releases po-&gt;bind_lock, another thread can
run packet_notifier() and process an NETDEV_UP event.

This race and the fix are both similar to that of commit 15fe076edea7
("net/packet: fix a race in packet_bind() and packet_notifier()").

There too the packet_notifier NETDEV_UP event managed to run while a
po-&gt;bind_lock critical section had to be temporarily released. And
the fix was similarly to temporarily set po-&gt;num to zero to keep
the socket unhooked until the lock is retaken.

The po-&gt;bind_lock in packet_set_ring and packet_notifier precede the
introduction of git history.</Note>
    </Notes>
    <CVE>CVE-2025-38617</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.220.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503384-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38617.html</URL>
        <Description>CVE-2025-38617</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248621</URL>
        <Description>SUSE Bug 1248621</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1249208</URL>
        <Description>SUSE Bug 1249208</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

vsock: Do not allow binding to VMADDR_PORT_ANY

It is possible for a vsock to autobind to VMADDR_PORT_ANY. This can
cause a use-after-free when a connection is made to the bound socket.
The socket returned by accept() also has port VMADDR_PORT_ANY but is not
on the list of unbound sockets. Binding it will result in an extra
refcount decrement similar to the one fixed in fcdd2242c023 (vsock: Keep
the binding until socket destruction).

Modify the check in __vsock_bind_connectible() to also prevent binding
to VMADDR_PORT_ANY.</Note>
    </Notes>
    <CVE>CVE-2025-38618</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.220.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503384-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38618.html</URL>
        <Description>CVE-2025-38618</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248511</URL>
        <Description>SUSE Bug 1248511</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1249207</URL>
        <Description>SUSE Bug 1249207</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: reject TDLS operations when station is not associated

syzbot triggered a WARN in ieee80211_tdls_oper() by sending
NL80211_TDLS_ENABLE_LINK immediately after NL80211_CMD_CONNECT,
before association completed and without prior TDLS setup.

This left internal state like sdata-&gt;u.mgd.tdls_peer uninitialized,
leading to a WARN_ON() in code paths that assumed it was valid.

Reject the operation early if not in station mode or not associated.</Note>
    </Notes>
    <CVE>CVE-2025-38644</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.220.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.220.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503384-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38644.html</URL>
        <Description>CVE-2025-38644</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248748</URL>
        <Description>SUSE Bug 1248748</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248749</URL>
        <Description>SUSE Bug 1248749</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
